Jump to content

Search the Community

Showing results for tags 'server'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

  1. Vand server dedicat entry level (cu resurse relativ mici) pe datacenter Iomart in UK si suport 24/7 (email, telefonic sau ticket) in UK (lb. engleza). Se aplica legislatia in vigoare. Model: Dell PowerEdge D9-200 OS: Linux la alegere (sau cost in plus lunar pentru Win server) CPU: Quad Core: Intel® Xeon® X3450 (8M Cache, 2.66 GHz) RAM: 32GB DDR3 HDD: 2 x 2TB SATA 7,200 RPM (se poate schimba la cerere pe SSD insa marime mai mica) Raid: H200 Raid Controller - Raid 1 Remote Management: DRAC Enterprise (Virtual KVM) Bandwidth: Port de 1Gbps cu 500Mbps garantat (trafic nelimitat) IP: 4 ip-ur
  2. HL -PROGRAM V2.6 FLOOD SERVER AND DOWN !!! SCREN: // Warning: Downloadati doar pentru analiza malware D O W N L O A D: HL -PROGRAM v2.6 [FLOOD SERVER AND DOWN].rar — RGhost — file sharing FileShare Download HL -PROGRAM v2.6 [FLOOD SERVER AND DOWN].rar Zippyshare.com - HL -PROGRAM v2.6 [FLOOD SERVER AND DOWN].rar
  3. # Exploit Title: Persistent Systems Client Automation (PSCA, formerly HPCA or Radia) Command Injection Remote Code Execution Vulnerability # Date: 2014-10-01 # Exploit Author: Ben Turner # Vendor Homepage: Previosuly HP, now http://www.persistentsys.com/ # Version: 7.9, 8.1, 9.0, 9.1 # Tested on: Windows XP, Windows 7, Server 2003 and Server 2008 # CVE-2015-1497 # CVSS: 10 require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking # Exploit mixins should be called first include Msf::Exploit::Remote::SMB include Msf::Exploit::EXE include Msf:
  4. DeMeDeu

    Server SMS

    Salut baieti. Am si eu o nelamurire. Sa zicem ca vreau sa creez un server pentru mesaje SMS, atat sa trimita cat si sa primesc. Nu ma intereseaza momentan sa il leg de vreun site dar vreau ca pe viitor sa fie posibil(spre exemplu daca da o comanda sau newsletter, etc.). De ce am nevoie ? Teoretic sa zicem ca detin o cartela cu mesaje nelimitate in orice retea romaneasca si un PC care sa fie folosit ca server. De ce mai am nevoie ? Nu vreau explicatia da capo al fine, ci doar instrumentele necesare pentru a face asa ceva, e ceva ce vreau sa folosesc in viitor. Explicatiile de pe google nu m-au
  5. Cum monetizezi un server de CS 1.6 sau CS:GO ? Din ce scot baietii astia cu serverele $$$ ? (excluzand vandutul de admine si alte balarii)
  6. ======================================================== I. Overview ======================================================== Multiple CSRF & Cross-Site Scripting (XSS) vulnerabilities have been identified in Crushftp 7.2.0 (Web Interface) on default configuration. These vulnerabilities allows an attacker to gain control over valid user accounts, perform operations on their behalf, redirect them to malicious sites, steal their credentials, and more. ======================================================== II. Severity ======================================================== Rati
  7. Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris. Changes: Added non-existent file to the regression test config. Multiple bug fixes. Link download: here
  8. -----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 PHP Code Execution in jui_filter_rules Parsing Library ====================================================== Researcher: Timo Schmid <tschmid@ernw.de> Description =========== jui_filter_rules[1] is a jQuery plugin which allows users to generate a ruleset which could be used to filter datasets inside a web application. The plugin also provides a PHP library to turn the user submitted ruleset into SQL where statements for server side filtering. This PHP library contains a feature which allows to convert the submitted filter values wit
  9. Requirements PHP 5 A distribution of Linux. I haven’t and won’t test this on Windows. IP Cam Shell Usage Using IPCS is pretty straight forward. You pass the URL to ipcs.php via the -u option. $ php ipcs.php -u http://192.168.0.3:8080 If the camera is vulnerable you’ll be dropped in to a “shell” as root and be able to exploit the camera further. $ php ipcs.php -u http://192.168.0.3:8080 Those who do not understand UNIX are condemned to reinvent it, poorly. — Henry Spencer ipcamshell> It’s very much like being logged in to a stripped down Unix server as root. ipcamshell> whoami roo
  10. ## # This module requires Metasploit: http://www.metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## require 'msf/core' require 'uri' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {}) super(update_info( info, 'Name' => 'Maarch LetterBox 2.8 Unrestricted File Upload', 'Description' => %q{ This module exploits a file upload vulnerability on Maarch LetterBox 2.8 due to a lack of
  11. Security researchers with Russian anti-virus company Doctor Web have examined a complex, multi-purpose backdoor for Linux. This malicious program can execute various commands issued by intruders such as to mount DDoS attacks and to perform a wide range of other malicious tasks. To spread the new Linux backdoor, dubbed Linux.BackDoor.Xnote.1, criminals mount a brute force attack to establish an SSH connection with a target machine. Doctor Web security researchers believe that the Chinese hacker group ChinaZ may be behind this backdoor. Once Linux.BackDoor.Xnote.1 gets in, it checks to see wheth
  12. Salut, asa cum spune si topic-ul, pun in folosinta un server de TS3, voi adauga si licenta saptamana asta... Administratorii Moderatorii, cat si membrii sunt bine veniti, adresa este : rst.god.ro sau ts.god.ro, cum va vine mai usor. Multumesc. bump'
  13. Here we will be looking a kernel level privilege escalation vulnerability CVE - 2014 - 4113 . The vulnerability is exploited by creating tagWND structure at NULL page (0x000 00000). We’ll see here why control is transferred to the shellcode and the reason the malicious tagWND structure is th e crafted the way it is. User - Mode Code The exe first tries to determine the OS it is running on and stores the following data in the vari able based on the OS version and build: Windows Xp S p2 0c8 Windows Xp S p1 12c Windows Xp S p3 0d8 Windows Server 2008 0e0 windows 7 / Windows Server 2008 R2 0f8 R
  14. SEC Consult Vulnerability Lab Security Advisory < 20150122-0 > ======================================================================= title: Multiple critical vulnerabilities products: Symantec Data Center Security: Server Advanced (SDCS:SA) Symantec Critical System Protection (SCSP) vulnerable version: see: Vulnerable / tested versions fixed version: SCSP 5.2.9 MP6, SDCS:SA 6.0 MP1 - not all vulnerabilities were fixed, but mitigations exist impact: Critical CVE number: CVE-2014-7289, CVE-201
  15. Oracle’s first Critical Patch Update of the year arrived Tuesday with its usual volume, and some disturbing fanfare. Oracle admins today are staring at 169 patches on their collective plates across the company’s product line. One of the more pressing fixes is for a an issue in the Oracle E-Business Suite, a bundle of applications that includes CRM, financial, supply chain and project management software. Noted Oracle bug-hunter David Litchfield last June 11 alerted Oracle to a serious flaw that he said behaved like a backdoor, though he told Threatpost he did not believe it was an intentional
  16. =====[Alligator Security Team - Security Advisory]======== CVE-2015-1169 - CAS Server 3.5.2 allows remote attackers to bypass LDAP authentication via crafted wildcards. Reporter: José Tozo < juniorbsd () gmail com > =====[Table of Contents]================================== 1. Background 2. Detailed description 3. Other contexts & solutions 4. Timeline 5. References =====[1. Background]====================================== CAS is an authentication system originally created by Yale University to provide a trusted way for an application to authenticate a user. =====[2. De
  17. ‘Session Hijacking’ is an old and routine topic in the field of application security. To make it more interesting, in this article, we are going to focus on different ways it can be performed. Introduction for beginners Web applications communicate using HTTP protocol. HTTP is stateless, which means there is no support at the protocol level to identify the state of a particular request. In other words, web servers don’t have any mechanism to know whether the request is coming from a new client from a client which is already communicating with it. So from the server perspective, every reques
  18. CapTipper: Omri Herscovici: CapTipper - Malicious HTTP traffic explorer tool CapTipper is a python tool to analyze, explore and revive HTTP malicious traffic. CapTipper sets up a web server that acts exactly as the server in the PCAP file, and contains internal tools, with a powerful interactive console, for analysis and inspection of the hosts, objects and conversations found. The tool provides the security researcher with easy access to the files and the understanding of the network flow, and is useful when trying to research exploits, pre-conditions, versions, obfuscations, plugins and shel
  19. Tor-ramdisk is a uClibc-based micro Linux distribution whose sole purpose is to securely host a Tor server purely in RAM. For those not familiar with Tor, it is a system which allows the user to construct encrypted virtual tunnels which are randomly relayed between Tor servers (nodes) until the connection finally exits to its destination on the internet. The encryption and random relaying resist traffic analysis in that a malicious sniffer cannot easily discover where the traffic is coming from or what data it contains. While not perfect in its efforts to provide users with anonymity, Tor does
  20. Daca stiti si voi cum sa dau flood la un server de minecraft nu prea po****t , atunci plz un tutorial video sau scris plz !
  21. Da... este gratis poti sa alegi ori icecast ori shoutcast, faza e ca sunt max 50 ascultatori si 100 mb autodj, dar e foarte bine si asa. Web radio Grátis - Streaming de radio online Serios acum am nevoie de un cont steam hai baieti, donati. again .
  22. hello guys Once Again ===> HIdeMyAss Premium proxies 19/11/2013 46.47.98.192:1080 109.207.61.158:8090 109.207.61.163:8090 109.207.61.152:8090 194.141.96.251:8080 62.253.249.2:8080 23.81.65.178:1080 89.200.252.149:3128 109.207.61.156:8090 109.207.61.189:8090 109.207.61.218:8090 91.203.140.46:3128 94.198.34.230:80 62.253.249.150:8080 109.207.61.62:8090 217.12.62.194:8080 109.207.61.178:8090 212.116.131.205:8080 95.110.225.65:3128 109.207.61.208:8090 46.165.193.67:9183 77.120.126.35:3128 178.207.11.98:1080 97.95.225.218:31813 78.130.201.110:8080 94.154.26.24:8090 193.68.120.65:8080 94.154.31.1
  23. hello HideMyAss Premium Proxies 11/11/2013 146.185.62.50:8080 199.30.136.117:7808 198.24.181.73:8089 69.197.132.80:8089 137.88.169.25:8080 66.35.68.146:7808 173.213.113.111:8089 205.202.37.39:8090 173.213.96.229:3127 69.197.132.80:7808 66.35.68.145:3127 173.213.96.229:8089 198.204.245.212:8089 198.204.245.212:7808 54.200.176.207:80 Full List==> HideMyAss Premium Proxies 11 Nov 2013ProxyGratuit-Proxy Server/free proxy sites/Online Proxy/Proxy Website Enjoy
  24. Salutare din nou, Am la birou un "server" Linux (CentOS) care are asa: 2 placi gigabit onboard si alte 2 separata pe PCI sau PCIe. Se fac destule transferuri pe zi si am decis sa schimbam cele 2 placi de retea separata cu alte 2 tot gigabit dar profi (gasisem de la Intel la 160 lei/buc). Acuma sunt tot gigabit dar ceva la 30 de lei .... Daca inlocuiesc cele 2 placi de retea, mai trebuie sa fac ceva modificari in server la networking sau le vede si atat ? Ramane tot ifconfig-ul, eth-uri tot ? PS: am pus server intre " " deoarece este un desktop facut server. Multumesc.
  25. http://www.youtube.com/watch?v=zccI-O3dm38
×
×
  • Create New...