Jump to content

u0m3

Active Members
  • Posts

    543
  • Joined

  • Last visited

  • Days Won

    25

Posts posted by u0m3

  1. 8 hours ago, mironion said:

    Mdaa.Mai ajutat foarte mult! Îți mulțumesc 

     

    Cu placere! Si vezi ca e "M-ai ajutat foarte mult".

     

     

    Acum serios, eu pot sa iti dau si mura-n gura, dar nu vei invata nimic asa...

    Spoiler
    
    #define E_ASSIGNMENT_OK                            0
    #define E_ASSIGNMENT_INVALID_MATRIX_DIMENSIONS    -1
    #define E_ASSIGNMENT_INVALID_RESULT_POINTER       -2
    
    struct result_holder
    {
    	float sum_0based_index;
    	float sum_1based_index;
    	unsigned int count_0based_index;
    	unsigned int count_1based_index;
    };
    
    int assignment(float const * const matrix, unsigned int const num_rows, unsigned int const num_cols, result_holder * const result)
    {
    	unsigned int idx = 0
    	
    	if(num_cols <= 0 || num_rows <= 0)
    		return E_INVALID_MATRIX_DIMENSIONS;
    	
    	if(result_holder == NULL)
    		return E_INVALID_RESULT_POINTER;
    	
    	result.sum_0based_index = 0;
    	result.sum_1based_index = 0;
    	result.count_0based_index = 0;
    	result.count_1based_index = 0;
    	
    	for(unsigned int row = 0; row < num_rows; ++row)
    	{
    		for(unsigned int col = 0; col < num_cols; ++col)
    		{
    			idx = row * num_cols + col;
    			if(col % 2 == 0 && matrix[idx] > 0)
    			{
    				result.sum_0based_index += matrix[idx];
    				++result.count_0based_index;
    			}
    			else
    			{
    				result.sum_1based_index += matrix[idx];
    				++result.count_1based_index;
    			}
    		}
    	}
    	return E_OK;
    }

     

     

    • Like 1
  2. #define E_ASSIGNMENT_OK                            0
    #define E_ASSIGNMENT_INVALID_MATRIX_DIMENSIONS    -1
    #define E_ASSIGNMENT_INVALID_RESULT_POINTER       -2
    
    struct result_holder
    {
    	float sum_0based_index;
    	float sum_1based_index;
    	unsigned int count_0based_index;
    	unsigned int count_1based_index;
    };
    
    int assignment(float const * const matrix, unsigned int const num_rows, unsigned int const num_cols, result_holder * const result)
    {
    	unsigned int idx = 0
    	
    	if(num_cols <= 0 || num_rows <= 0)
    		return E_INVALID_MATRIX_DIMENSIONS;
    	
    	if(result_holder == NULL)
    		return E_INVALID_RESULT_POINTER;
    	
    	result.sum_0based_index = 0;
    	result.sum_1based_index = 0;
    	result.count_0based_index = 0;
    	result.count_1based_index = 0;
    	
    	for(unsigned int row = 0; row < num_rows; ++row)
    	{
    		for(unsigned int col = 0; col < num_cols; ++col)
    		{
    			idx = row * num_cols + col;
    			if(col % 2 == 0 && matrix[idx] > 0)
    			{
    				result.sum_0based_index += matrix[idx];
    				++result.count_0based_index;
    			}
    			else
    			{
    				result.sum_1based_index += matrix[idx];
    				++result.count_1based_index;
    			}
    		}
    	}
    	return E_OK;
    }

     

  3. 4 hours ago, mironion said:

    Un program ce calculeaza suma si numarul elementelor pozitive din coloane pare.

    1. Acesta este un forum, nu "ghiseul" unde plasezi comanda la McDonald's... Exprima si tu, in cuvinte, preferabil si cat de cat coerent, ce doresti.
    2. Acesta este un forum, nu fabrica de facut teme, nu e colegu' de clasa pe care il ameniti ca il bati daca nu iti face tema. Nu te astepta sa ne scrii enuntul problemei si noi sa ti-o rezolvam; arata si tu ca ti-ai dat un minim interes...
    • Upvote 6
  4. 5 hours ago, Silviu said:

    Nu-s erori de niciun fel. @Nytro,verifică treaba cu cachingul. Sunt aproape sigur că de la aia e.

    Nu chiar. Cred ca mai de graba tine de browser internals...

    Am deschis WebApp-ul in mai multe browsere in ferestre incognito si singurul care face pe nebunul pare sa fie Google Chrome:

    Daca va uitati atent, Google Chrome ramane blocat la un "Establishing secure connection..." desi in "Network" pane nu apare sa fie vre-o conexiune initializata si neterminata... Nu stiu ce asteapta.

    Ce este "clar" este ca nu ruleaza niciodata app.js, adica aplicatia.

    Si mai ciudat de atat, daca il opresti din incarcat (ramane in "Establishing secure connection..." mult si bine), si ii ceri sa reincarce pagina (permitand folosirea fisierelor din cache), va functiona corect.

     

    L.E.: Daca pui un break-point pe linia 3 in app.js (unde este definita aplicatia) si ii dai "Resume script execution" dupa ce a fost atins, WebApp-ul functioneaza. Concluzia mea este ca problema apare din modul in care incarca angularjs (sau modul in care vede incarcate) anumite fisiere/module.

    Thoughts @Gecko?

    • Upvote 4
  5. Synopsis:
    CarHacking.Tools is a script I built to help people who are interested in exploring car hacking and research to get a quick start. I decided to invest the time into building this script after spending many hours finding, installing, configuring many of the tools available and very little of it actually "hacking" a car.

     

    Linkhttps://carhacking.tools/

    • Upvote 2
  6. Synopsis:

    As of early 2018, the Facebook-owned messaging application, WhatsApp, has over 1.5 billion users with over one billion groups and 65 billion messages sent every day. With so much chatter, the potential for online scams, rumours and fake news is huge. It doesn’t help then, if threat actors have an additional weapon in their arsenal to leverage the platform for their malicious intentions.

    Check Point Research, however, recently unveiled new vulnerabilities in the popular messaging application that could allow threat actors to intercept and manipulate messages sent in both private and group conversations, giving attackers immense power to create and spread misinformation from what appear to be trusted sources.

    Our team observed three possible methods of attack exploiting this vulnerability – all of which involve social engineering tactics to fool end-users. A threat actor can:

    1. Use the ‘quote’ feature in a group conversation to change the identity of the sender, even if that person is not a member of the group.
    2. Alter the text of someone else’s reply, essentially putting words in their mouth.
    3. Send a private message to another group participant that is disguised as a public message for all, so when the targeted individual responds, it’s visible to everyone in the conversation.

    Following the process of Responsible Disclosure, Check Point Research informed WhatsApp of their findings. From Check Point Research’s view, we believe these vulnerabilities to be of the utmost importance and require attention.

     

    Linkhttps://research.checkpoint.com/fakesapp-a-vulnerability-in-whatsapp/

    • Upvote 1
  7. Synopsis

    In this writeup, I'll describe a new technique to crack WPA PSK (Pre-Shared Key) passwords.

    In order to make use of this new attack you need the following tools:

    • hcxdumptool v4.2.0 or higher
    • hcxtools v4.2.0 or higher
    • hashcat v4.2.0 or higher

    This attack was discovered accidentally while looking for new ways to attack the new WPA3 security standard. WPA3 will be much harder to attack because of its modern key establishment protocol called "Simultaneous Authentication of Equals" (SAE).

    The main difference from existing attacks is that in this attack, capture of a full EAPOL 4-way handshake is not required. The new attack is performed on the RSN IE (Robust Security Network Information Element) of a single EAPOL frame.

    At this time, we do not know for which vendors or for how many routers this technique will work, but we think it will work against all 802.11i/p/q/r networks with roaming functions enabled (most modern routers).

    The main advantages of this attack are as follow:

    • No more regular users required - because the attacker directly communicates with the AP (aka "client-less" attack)
    • No more waiting for a complete 4-way handshake between the regular user and the AP
    • No more eventual retransmissions of EAPOL frames (which can lead to uncrackable results)
    • No more eventual invalid passwords sent by the regular user
    • No more lost EAPOL frames when the regular user or the AP is too far away from the attacker
    • No more fixing of nonce and replaycounter values required (resulting in slightly higher speeds)
    • No more special output format (pcap, hccapx, etc.) - final data will appear as regular hex encoded string

    Sourcehttps://hashcat.net/forum/thread-7717.html

    • Upvote 3
  8. Synopsis:

    Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packed and obfuscated before they are executed in order to avoid AV scanners, however when these files are executed they will often unpack or inject a clean version of the malware code in memory. A common task for malware researchers when analyzing malware is to dump this unpacked code back from memory to disk for scanning with AV products or for analysis with static analysis tools such as IDA.

     

    Sourcehttp://split-code.com/processdump.html (side-note: unul dintre cele mai interesante website-uri din punc de vedere al design-ului)

    GitHub Repositoryhttps://github.com/glmcdona/Process-Dump

    Via:

     

    • Thanks 1
    • Upvote 1
  9. Synopsis:

    The recent DDoS drama with Dyn has had me reading up on Domain Name Systems (DNS). Time and time again, bad guys have proved that one of the best ways to execute a successful Distributed Denial of Service (DDoS) is to hit DNS servers.

    As a pentester,  name servers do come up a lot during assessments, especially during the reconnaissance phases. We still come across a few public name servers allowing zone transfers every now and then, which is always a treat, but I hardly ever look at DNS servers as an actual target. I still haven’t come across a client that’s actually willing to pay anyone to bring their services down.

    The DDoS against Dyn was particularly troublesome because Dyn is a major DNS provider and the attacks caused serious outages to a number of popular sites; Twitter, Paypal, Reddit, Github, Spotify and more.

    Which got me thinking; if I was a bad guy doing my recon, looking for the best name servers to hit, how would I go about it? Which name servers would I pick? Querying a domain for the name server(s) it uses is pretty straight forward, but if the name server was my target and a denial of service was my goal, I’d want to find out the opposite; how many domain names are using the target name server?

     

    Sourcehttps://thevivi.net/2016/11/17/dnsnitch-reverse-ns-lookups-zone-transfers/

    GitHub Repositoryhttps://github.com/V1V1/DNSnitch

    Bonus: axfr.py - https://github.com/V1V1/axfr.py (script that takes a list of domains as input and attempts zone transfers on all of them against a specified name server)

    • Upvote 2
  10. Synopsis:

    As an emerging concept, the industry has yet to settle on a definitive definition of adversarial simulation, but it involves simulating [components of] targeted attacks in order to test both an organization’s instrumentation stacks and their ability to respond to the attack via their incident response process.

    This differs from Red Teaming in that adversarial simulation is typically a cooperative activity between the simulation runners and the simulation recipients with an end goal of validating defensive telemetry and testing incident response plans and playbooks. Raphael Mudge wrote a great blog post on the subject, which I recommend.

     

    Sourcehttps://medium.com/uber-security-privacy/uber-security-metta-open-source-a8a49613b4a

    GitHub Repositoryhttps://github.com/uber-common/metta

    • Upvote 2
  11. Synopsis

    Skilled attackers continually seek out new attack vectors, while employing evasion techniques to maintain the effectiveness of old vectors, in an ever-changing defensive landscape. Many of these threat actors employ obfuscation frameworks for common scripting languages such as JavaScript and PowerShell to thwart signature-based detections of common offensive tradecraft written in these languages.

    However, as defenders' visibility into these popular scripting languages increases through better logging and defensive tooling, some stealthy attackers have shifted their tradecraft to languages that do not support this additional visibility. At a minimum, determined attackers are adding dashes of simple obfuscation to previously detected payloads and commands to break rigid detection rules.

     

    Whitepaperhttps://www.fireeye.com/blog/threat-research/2018/03/dosfuscation-exploring-obfuscation-and-detection-techniques.html

    GitHub Repositoryhttps://github.com/danielbohannon/Invoke-DOSfuscation

    Source:

     

    • Upvote 2
  12. Synopsis:

    A Scary Thought: I’ve worked in the Cyber Security space performing a wide breadth of penetration and red team services for years. Yes it’s still as easy (if not more so in this day and age!) to obtain Domain Admin “before lunch” as it was when I first started pen-testing.

    Back in September of 2013, Spider Labs wrote an article titled “Top Five Ways SpiderLabs Got Domain Admin on Your Internal Network” This article is written to compliment and serve as a Part 2 of sorts to the original SpiderLabs Blog post.

     

    Linkhttps://medium.com/@adam.toscher/top-five-ways-i-got-domain-admin-on-your-internal-network-before-lunch-2018-edition-82259ab73aaa

    Via:

     

    • Upvote 3
×
×
  • Create New...