-
Posts
543 -
Joined
-
Last visited
-
Days Won
25
Everything posted by u0m3
-
A avut probleme la open-vm-tools & company?
-
Yep... I'm done.
-
Felicitari. Nu mi-a trecut prin cap sa caut pe Google the code of holy bible. Also, poti extrage foarte usor arhivele din poze folosind binwalk. Doar aveti grija ca e cam entuziast si le si dezarhiveaza si cand sunt parolate, rezultand intr-un mic fiasco uneori.
-
Se pare ca nu esti atent: ce vrei tu sa faci (indiferent ca are ca scop obtinerea unui interviu/job sau ca serveste in cadrul unei farse) se cheama Fals in acte si este ilegal https://www.avocatnet.ro/forum/discutie_200724/care-este-pedeapsa-pentru-fals-in-acte.html Daca tu ai chef sa ajungi la inchisoare e treaba ta, dar ce te face sa crezi ca vrem sa fim, careva de pe aici, colegi cu tine?
-
Blogul lui aelius, nginx tags: https://www.unixteacher.org/blog/tag/nginx/ Daca vrei raspunsuri mai concrete (aka mura-n-gura), avem nevoie de mai multe detalii legate de ce vrei sa obtii.
-
Poti mentiona care au? Intreb deoarece am incercat CobaltStrike si nu pare sa sune acasa
-
Asa fac astia de la packetstormsecurity, mai fac "teste" pentru tools. Sau unele fake.
- 5 replies
-
- 1
-
- python
- bruteforce
-
(and 1 more)
Tagged with:
-
'sup with the As? Skiddie protection?
- 5 replies
-
- 1
-
- python
- bruteforce
-
(and 1 more)
Tagged with:
-
How Just Opening A Malicious PowerPoint File Could Compromise Your PC
u0m3 replied to Fi8sVrs's topic in Stiri securitate
O fi ca asta? http://thehackernews.com/2017/09/backdoored-hacking-tools.html- 5 replies
-
- rtf
- cve-2017-0199
-
(and 4 more)
Tagged with:
-
bot Automatizare FileList 10th Year Anniversary Gift
u0m3 replied to u0m3's topic in Tutoriale in romana
Versiunea Python2 dupa cum am promis. Imi cer scuze legat de calitatea codului.- 1 reply
-
- 4
-
- automatizare
- bot
-
(and 1 more)
Tagged with:
-
Cu ocazia aniversarii a zece ani de FileList, au decis sa lanseze mai multe surprize, unda dintre acestea fiind: Toate bune si frumoase, doar ca, daca esti tampit ca mine si ai gasit prima data giftbox-ul la ora 5 dimineata (sau pentru oamenii normali, esti ocupat) si nu ai cum sa verifici la 24 de ore, vei pierde din premii*. Si cum suntem cu totii 0xH4X0R1 pe aici am decis sa fac un mic script in PowerShell (daca am chef/rabdare il voi face si in Python) care sa se ocupe de problema: Mod de utilizare: Copy - Paste la cod intr-o fereastra de PowerShell apoi rulati Invoke-FileListGetGift. Salvati codul intr-un fisier *.ps1 apoi din PowerShell ii faceti source: adica scrieti in consola ". .\NumeFisier.ps1" (atentie la punctul din fata - e ca la bash) apoi rulati Invoke-FileListGetGift. Daca doriti sa vedeti mesajele de debug setati $DebugPreference = "Continue" in consola din care rulati apoi apelati Invoke-FileListGetGift.
- 1 reply
-
- 9
-
- automatizare
- bot
-
(and 1 more)
Tagged with:
-
Mastercard Internet Gateway Service: Hashing Design Flaw
u0m3 replied to Nytro's topic in Stiri securitate
Seems legit. -
La multi ani!
-
Other 26,000 MongoDB servers hit in a new wave of ransom attacks
u0m3 replied to Fi8sVrs's topic in Stiri securitate
Ferir-ar Sfantu' sa le puna o parola sau mai rau, filtre din firewall.- 1 reply
-
- dylan katz
- victor gevers
-
(and 3 more)
Tagged with:
-
Vezi ca btc_address = rpc_conn.getnewaddress('accountname') are un spatiu in plus.
-
Abstract: Microcode is an abstraction layer on top of the physical components of a CPU and present in most general-purpose CPUs today. In addition to facilitate complex and vast instruction sets, it also provides an update mechanism that allows CPUs to be patched in-place without requiring any special hardware. While it is well-known that CPUs are regularly updated with this mechanism, very little is known about its inner workings given that microcode and the update mechanism are proprietary and have not been throughly analyzed yet. In this paper, we reverse engineer the microcode semantics and inner workings of its update mechanism of conventional COTS CPUs on the example of AMD’s K8 and K10 microarchitectures. Furthermore, we demonstrate how to develop custom microcode updates. We describe the microcode semantics and additionally present a set of microprograms that demonstrate the possibilities offered by this technology. To this end, our microprograms range from CPU-assisted instrumentation to microcoded Trojans that can even be reached from within a web browser and enable remote code execution and cryptographic implementation attacks. Link: https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/koppe (via https://twitter.com/x0rz/status/903668526333997057)
-
Interesanta tehnica. Sunt curios daca se poate aplica ceva similar si pe cod compilat...
-
Incercam sa fiu delicat. De curiozitate, ce recomanda ca masura de siguranta cand firewall-ul ruleaza pe un procesor Intel?
-
Un articol interesant ce descrie relativ detaliat modul de functionare al sistemelor auxiliare dintr-un PC modern, cu accent pe modul de functionare al Intel Management Engine si cum poate fi dezactivat acesta. Conform articolului, este primul capitol dintr-o serie. Articol: http://blog.ptsecurity.com/2017/08/disabling-intel-me.html
-
Varianta PowerShell pentru utilizatorii Windows care nu doresc sa instaleze MareleSharpe $request = Invoke-WebRequest -Uri 'https://www.vpnbook.com/'; if( $request.StatusCode -ne 200 ) { Write-Error -Message $('Failed to access website. StatusCode ' + $request.StatusCode + ': ' + $request.StatusDescription + '.' ); break; } if( $request.RawContent -inotmatch 'username:\s+([\w\d]+)' ) { Write-Error -Message 'Failed to find username.'; break; } $username = $Matches[1]; if( $request.RawContent -inotmatch 'password:\s+([\w\d]+)' ) { Write-Error -Message 'Failed to find password.'; break; } $password = $Matches[1]; Set-Content -Path "D:\vpn_book.txt" -Force -Value $($username + "`r`n" + $password) -NoNewline -Encoding ASCII