• Content count

  • Joined

  • Last visited

Community Reputation

-1 Noobie

About Venom

  • Rank
    SUPR3M3 31337 Mack Daddy P1MP
  • Birthday 12/24/1986

Contact Methods

  • AIM
    Sioc Solas
  • Website URL
  • ICQ

Profile Information

  • Interests
    General network programming, general programming, *nix in general...<br />I port between different languages all the time, right now most of my time is dedicated to the NewIO project
  • Location
  1. My new home. #ot #newio #promethean Now you all know where to find me. My nick on there is Jason. Peace out!
  2. No there can also be SQL injection vulnerabilities. I would only use hardcoded values for include() and require(). I would not use strings of data gathered from databases for include() and require(). Check for more info
  3. I started out on an old school Apple Macintosh coding C when I was about 6. Didn't do much hacking till I started gaming, played an old game back in the day called Jedi Knight-Dark Forces II when I was around 9 or 10. Anyway, so that game was based on C, and it had action/animation/object scripts in .cog files. I realized that the .cog's were based in C, so I started making my machine gun shoot concussion missiles and shit like that. Eventually I moved on to Buffer Overflows and Database injection - also escape string vulns and other stuff. The more I learned about coding, the more I learned about hacking. My parents used to ground me a lot and put local restrictive programs on the PC to keep me off. I started using keyloggers and stuff like that to get around it - eventually writing my own circumvention software etc. Then I went to military school, had a hayday and got kicked out. Learned a lot from having the hayday though After that I joined binrev, and I've been learning ever since. (that's the short version ) [KIDS, SKIDDIES, and NOOBS: I DONT ENDORSE JACKING WITH YOUR SCHOOL. IT IS HAZARDOUS TO YOUR GROWTH IN SOCIETY AS AN ADULT. STUFF FOLLOWS YOU AROUND FOR THINGS OTHER PEOPLE DON'T UNDERSTAND. EVEN IF YOU JUST CHECKED YOUR EMAIL, IF YOUR EMAIL WAS BLOXORED, THEY'LL SEE THAT AS MALICIOUS.]
  4. Well functions are vulnerable when used improperly because of faulty input sanitation. Basically, if you check your input on every function you should be fine, except for vulns within the php parser itself, and then its up to the guys who wrote php to fix it. SQL injection is a result of not filtering out all the '`"; and other chars, RFI is a result of someone using a <?include()> or <?require()> where there shouldn't be one. Ultimately it boils down to having a strong code base and using good coding practices to prevent your site from being vulnerable.
  5. 01010011:01110101:01100011:01101011:00100000:01110100:01101000:01100101:00100000:01110011



  6. IIRC, the current garage door openers work over one of four different frequencies with a 1 byte binary code. I could be wrong, though.
  7. Hey... It's a funny thing, I was just looking at this empty comment box of yours and I heard it calling my name...

    So here, Have a comment!

    love and such,


  8. Use a different port scanner. AATools for example has a large database of commonly 'misused' ports. Google it. As far as the "planted" netcat, I assume you just mean a listening port. If there's not a daemon listening behind the port and its just a listening socket there is no true way to determine exactly what the socket's purpose is. And I assume when you 'plant' a netcat you just mean doing an nc -l -p ###. That's not planting a netcat; that's simply listening on a port, and that's all. AATools is good for identifying trojan-infected hosts, though. You should check it out.
  9. I'm familiar with using the mysql_real_escape_string() function with sprintf(), however I wasn't aware that addslashes is defaulted to 'on' these days. Thanks for the info. Just using addslashes() function as an example of input sanitizing. EDIT: And sorry about the syntax error, that was a quickie off the top of my head =P
  10. SQL injection works mostly because of bad input handling like jabzor mentioned. In php, let's say we've got the following code : $user = $POST['user']; $pass = $POST['pass']; $result = mysql_query("SELECT * FROM `users` WHERE `user='$user'` AND `pass='$pass'`); if !sql_error($result) { login(); } The above code more or less checks the database to see if there is a user and password combination matching that which is inputted by the user. If there is no error (like 0 lines returned) then it will allow the user to login. Now on the HTML form, if you were to enter ' OR 1=1 OR user=' into the username field and nothing into the password field the query will become : SELECT * FROM `users` WHERE `user = ' ' OR 1=1 OR user=' '` AND `pass=''` Because the logic becomes sound, because 1 will always equal 1, there is no sql error generated and the malicious hacker is allowed to login. However, if the code looked like : $user = $POST['user']; $pass = $POST['pass']; $query=addslashes("SELECT * FROM `users` WHERE `user='$user'` AND `pass='$pass'`); $result = mysql_query($query); if !sql_error($result) { login(); } Then when the malicious attacker entered the ', ", or ` characters, the characters would be changed to \', \", and \`, respectively, preventing the string from executing the malicious code because of an escape sequence. Ultimately SQL injection is possible due to insecure coding.
  11. Yes. It is called a fuzz tester. Google is your friend.
  12. Heh lets throw that box the rooting I'm all up for some teamwork. Livinded, count me in!
  13. Sent you an email on that
  14. Well, if you sent him an email pretending to forget the password from someone else's account, when he replies to it telling them the password, uh, how are you going to get it? And just wondering why the admin would believe he forgot his password if he was able to login to send the admin his email? Just a thought.
  15. I think that filters can be good but can also be misused. The only thing they really protect kids or anyone else from is "accidental access". Has a hacker its pretty easy to get bypassing these things and as a result they have little or no value towards those bent on bypassing them.