Jump to content

Sub_Zero

Active Members
  • Posts

    331
  • Joined

  • Last visited

Everything posted by Sub_Zero

  1. Sub_Zero

    salut

    bun venit pe forum
  2. ID:sticlii
  3. Link: http://rapidshare.de/files/23996997/Renegade.Inc.Ultimate.MSN.AIO.2006.Full.rar
  4. super beton,mersi mult amu incep sa invat reverse engineering si aceste unelte sunt foarte folositoare
  5. ce beton ii siteu-l siteul,ador desgne-ul ,iti urez mult noroc si succes in dezvoltarea site-ului
  6. netexec - Remote Command Execution The command shell is a method of directly communicating with a remote system via an instruction, or command-line interface. Existing remote command execution tools besides being difficult to set up, require client software to be installed on the remote systems that you wish to access. netexec allows you to execute a command on a remote machine without physically logging in to that machine. Full interactivity for console applications is provided. No client software installation is required. This tool helps system administrators perform housekeeping tasks and helps security auditors to execute programs on remote systems as the direct access to those are not always possible. netexec's uses include - * launching command shells to remote systems * remote copy capabilities to specified directories * enabling tools and applications to display information about remote systems * enabling upload and download of files at runtime Installation Just copy netexec onto your executable path. Executing "netexec" with no command line options displays usage syntax. Usage The syntax is straightforward and easy to learn, making remote command-line administration and security auditing much more efficient. Usage : netexec <computer> [options..] <program> [arguments] <computer> Remote computer name or IP address. This is a mandatory parameter. -u <user> Username for logging on remote computer. Logs in with current credentials, if not supplied. -p <password> Password for logging on remote computer. Prompts for password, if not supplied. -dir <directory> Set remote computer's working directory.. The default is %SystemRoot%system32 -cp First copy the specified program on the remote machine. The application must be in the system's current directory. -i Allows the remote program to interact with the desktop -upload <file> Upload a file to the remote computer's working directory -download <file> Download a file from the remote computer's working directory -nowait Do not wait for the program to complete -script <file> Record an entire session to a file -e <cmd> To execute this program from the remote machine, it should be available in the remote computer's working directory. -? / -h Displays the help screen -args <arguments> Supply arguments of the program. -shell Use %COMSPEC% to run the shell. In the absence of a program, this is the default behaviour. Menu at runtime By pressing the Ctrl+C key combination, the runtime menu will appear as shown below Ctrl+U:Upload file Ctrl+D:Download file Ctrl+X:Cancel Ctrl+C:Terminate process You can enclose applications that have spaces in their name with quotation marks e.g. netexec 10.10.8.7 "c:long nameapplication.exe". Input is only passed to the remote system when you press the Enter key. Typing Ctrl-C terminates the remote process. Alternatively, you could also write the above command in the following manner: netexec 10.10.8.7 application.exe -dir "c:long name" If you fail to specify a user name, the remote process runs with the credentials of the logged-in user. Note that the password is transmitted in clear text to the remote system. Arguments supplied to netexec are case sensitive. netexec sets %SystemRoot%system32 as the default directory on the remote computer. Download netexec (72 KB) Examples To launch an interactive command prompt on 10.10.8.7 using administrator credentials: netexec 10.10.8.7 -u administrator cmd To upload the file a.exe on the remote system, with the directory on the remote system set to c:myprogram, type netexec 10.10.8.7 -u administrator -upload a.exe -dir c:myprogram NOTE: Only files in the current directory on the local system can be uploaded. To execute the application a.exe on the remote system, type netexec 10.10.8.7 -u administrator a.exe -dir c:myprogram NOTE: Ensure that the file a.exe exists on the remote system To copy and execute the application myexe.exe on a remote system without leaving a copy of the application on the remote machine, netexec 10.10.8.7 -u administrator -cp myexe.exe To connect to a remote host by the name "foo" with the currently logged in user’s credentials and obtain a shell, netexec foo Operating Systems supported: netexec has been tested on Windows NT 4.0 Server, Windows NT 4.0 workstation, Windows 2000, Windows XP and Windows 2003. netexec is the first in an entire command-line toolkit named NSTools from Net-Square, that aid in the administration and audit of remote Windows NT/2K/XP/2003 systems. Link: http://share.urbanfriends.us/uploads/7d6c20b992.rar
  7. bun venit si sper sa te simti bine printre noi
  8. sal si bun venit pe forum
  9. :@ :@ :@ :@ :@
  10. [scRiPt iNfO]??????????????????????????????????????????????????????? ? Script name : vBulletin 3.6.2 ? Supplied by : DGT ? Nullified by : DGT ? Tested by : DGT ? Protection : Callhome, Hotlinks, License & Version Checks ? Homepage : http://www.vbulletin.com/ ? Release date : 10-10-2006 ? Release type : PHP/MySQL ? Price : $160 ? Under music : Madonna [DeScRiPtIoN]???????????????????????????????????????????????????????? vBulletin is a powerful, scalable and fully customizable forums package for your web site. It has been written using the Web's quickest-growing scripting language; PHP, and is complimented with a highly efficient and ultra fast back-end database engine built using MySQL. [/End DeScRiPtIoN]??????????????????????????????????????????????????? [iNfO aBouT rElEaSe] Upload all files in BINARY mode. Run validator.php before editing files to verify release. Use online verifier of validator.php file and you will see NFO file. Remove both files from server after checking and enjoy. Remember, we include validator.php and checksums.md5 in our releases. If you don't see these files, don't trust. Do not modify validator.php. If you can't pass online check - it isn't our release. Online tool: verify [dot] grinderz [dot] info. [/End iNfO aBouT rElEaSe] [iNfO aBouT gRoUp]??????????????????????????????????????????????????? DGT is looking for: - Professional Scripts Suppliers - Professional Nullifiers - Professional Testers If you like this script, just buy it. [/End iNfO aBouT gRoUp]??????????????????????????????????????????????? [gReEtZ]?????????????????????????????????????????????????????????????? Our greetz fliez to SCRiPTMAFiA, WST, RU, WDYL-WTN, CHT and all other groups in the warez scriptz scene. [/End gReEtZ]????????????????????????????????????????????????????????? [/End ScRiPt iNfO]???????????????????????????????????????????????????? Link: http://rapidshare.de/files/36315303/263.rar
      • 1
      • Downvote
  11. BUN VENIT PE FORUM
  12. uite cum https://addons.mozilla.org/ scrie la search "cookie editor" de obicei ii al treilea rezultat
  13. Hiding ctrl-alt-del in asm just a simple example.. Credit to CybOrgAsm .386 .model flat, stdcall include windows.inc include user32.inc include kernel32.inc includelib user32.lib includelib kernel32.lib .data mens1 db 'This process was hidden of control+alt+del box!', 0 mens2 db 'Now, you can see it...', 0 mcaption db 'Program: Hidden Process... by CybOrgAsm, POA - Brasil', 0 kernel32 db 'kernel32.dll', 0 func db 'RegisterServiceProcess', 0 ; undocumented. .data? RSP dd ? .code start: invoke GetModuleHandle, ADDR kernel32 ; get module handle of kernel32.dll or eax, eax ; you must LoadLibrary if your program jz sair ; doesn't call any function in kernel32.dll invoke GetProcAddress, eax, ADDR func ; we must get the address ; of undocumented function or eax, eax jz sair mov [RSP], eax ; save the address push 1 ; hide push 0 ; 0 = this process call RSP ; call it invoke MessageBox, NULL, ADDR mens1, ADDR mcaption, MB_OK push 0 ; well.. we don't have a function called ; "UnRegisterServiceProcess" BUT... ; if you put a 0 , you will "unhide" it >Smile push 0 ; this process. (but what about unhide others?) call RSP ; call it invoke MessageBox, NULL, ADDR mens2, ADDR mcaption, MB_OK sair: invoke ExitProcess, 0 ; cya! end start
  14. ----------- Injection DLL into a target process ---------------------------- (((((((((((((( by berniee/faked_minded )))))))))))))))) In This Article I will discuss how to inject a simple silly dll into a remote process... I will not get you wait any longer... *Note: My code that i use mostly is assembley ..so ...if u dont know assembley..you may just have a look that may help you to understand the whole idea.(SINCE I AM NOT A COMPUTER SPECIALIST THIS CODE PRESENTS THE IDEA THAT I MADE FROM MY PERSONAL EXPERIENCE) and aslo note that my english is not my native language so sorry for not being english !! --------------------------------------------------------------------------------------------------------------------------------------------- first of all lets start our miny tutorial ..with ..the stuff we need (apis), are: -FindWindow---->to find the target process window handle(hWnd) -GetWindowThreadProcessId-----> to get process id from hWnd -OpenProcess ---> to get the handle to the target process -VirtualAllocEx ---->to allocate memory within target process -CreateRemoteThread--->to run our thread in that process that will load the dll that is all lets get start it... ...BUT first YOU MUST NOTICE that the dll path that should be loaded must be well defined ..b/c the dll will load from target process's current directory or windowsystem32 if the dll name was naked -means without drive letter (full path)- it will not be loaded. I will go with plain code i will discuss a little more :- ;--------------------------------------------------------------------KUT FRUM HEER---------------------------------------------- ;this example will try to find notepad.exe id and then open it to get process handle ,so you must run ;notepad.exe first;and then it will inject a silly simple dll to the notepad process.. ; ; .586 .model flat,stdcall option casemap:none include masm32includewindows.inc include masm32includekernel32.inc include masm32includeuser32.inc includelib masm32libkernel32.lib includelib masm32libuser32.lib .data kernel32 db "kernel32.dll",0 mydll db "c:mydll.dll",0 ;here were the whole path of our dll LoadLib db "LoadLibraryA",0 classname db "Notepad",0 ; notepad.exe classname .data? PID dd ? asd dd ? hProcess dd ? newhandle dd ? ProcAdd dd ? bwr dd ? .code start: invoke FindWindow,offset classname,0 ;here we start..by finding window handle invoke GetWindowThreadProcessId,eax,addr PID ;take the PID invoke OpenProcess,PROCESS_ALL_ACCESS,FALSE,PID ; Open the process cmp eax,0 je exit_all mov hProcess,eax invoke VirtualAllocEx,hProcess,0,sizeof mydll,MEM_COMMIT,PAGE_READWRITE ; allocate enough space for mov newhandle,eax ;dll name,,ok see extended explanation below ok!! cmp eax,0 je exit_all invoke WriteProcessMemory,hProcess,newhandle,offset mydll,sizeof mydll,addr bwr ;write the name of our dll invoke LoadLibrary,offset kernel32 ;get kerel32 base u can use also GetModuleHandle,offset kerenl32 invoke GetProcAddress,eax,offset LoadLib ;get LoadLibrary process address mov ProcAdd ,eax invoke CreateRemoteThread,hProcess,0,0,ProcAdd,newhandle,0,0 ;bingo !! we did it ,see below the code exit_all: invoke ExitProcess,0 end start ;-------------------KUT stop------------------------------------------- ------------------->>>and here is the silly dll ;-------------kut frum here ;
  15. MAMA CE CHESTIE BETON
  16. multumim ca ne-ai iluminat Shocker
  17. hai sa va zic cum am facut,dupa ce dai pe link sa-ti downloadeze ceva iti apare o casuta unde vrei sa salvezi las-o asa un minut sa mai mult (mai mult timp,mai mare vitza),dupa ce dai save vei vedea ca deja a downloadat din el si viteza imensa va incepe sa scada la viteza reala .Cred ca or facut o smecherie programatori ca sa te faca sa crezi ca downloadezi cu o viteza mai mare ca sa atraga mai multi spre firefox :@
  18. :@ :@ :@ :@
  19. da tu esti VIP cumva de sti ce-i acolo :?
  20. mai astept oleaca sa vad ce zic si ceilalti
  21. Link: http://rapidshare.de/files/35512468/TheMida_1.7.rar
  22. nu-i photoshop,numa ENCODED putea face una ca asta :@ :@ :@ I pwned SpiridusuCaddy :@ :@ nu va temeti nu am un astfel de net,am folosit o smecherie in firefox Firefox rullezzzzzz sa vad daca stiti cum am facut
  23. Sub_Zero

    CERERE

    sunt complet de acord cu tine,is prea multi lameri pe forum :@
  24. salut si bun venit
×
×
  • Create New...