• Content count

  • Joined

  • Last visited

Community Reputation

0 Neutral

About n00b

  • Rank
  1. Skiddy tool and by the look's of thing's there is a skiddy posting it.Your first post and you think people are going to run that shit..?
  2. thank's made an interesting read.!
  3. Wow haw small did she feel in there,There only there to try and make the defcon people look bad and the people who attend good one guy's nice keep the dirty reporter's out.!! Ffs wish i could have been there oh well guna save for next year..
  4. Cygnus Hex Editor 30 day free trial period but it get's the job done
  5. lol you got to be winding us up or some thing..
  6. Well not alway's unless you are wanting to launch a attack with a oday exploit for pure-ftpd but it's only really any good for collecting information about the service running on the port.
  7. 220---------- Welcome to Pure-FTPd [TLS] ---------- 220-You are user number 2 of 50 allowed. 220-Local time is now 13:21. Server port: 21. 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity. User (binrev.com:(none)): well its a banner for pure-ftp lol..>??
  8. Have a read of this it should be in there some where on haw to do this m8.Also look at the top link here very informative nvrmm strange why don't you just install gcc m8 it would make your life alot more easyer.As you know then you could find the environment variable and display the correct adress.Also will be able to enable you to see if the address is changing. http://www.google.co.uk/search?hl=en&q...earch&meta= http://www.milw0rm.com/papers/6 Ive done this before i just cant remember haw lol was so long ago since i messed with linux.Also might be worth a look have a read of some of the paper's by Xpl017Elz. http://x82.inetcop.org/h0me/papers/FC_exploit/
  9. Dev c++ command prompt and also python Ida pro objdump and that's about it.
  10. Lol big brother lmfao agrr the good old day's .
  11. First real hack was when i managed to break into nasa complaint's department,I noticed in the source code there was a few thing's not properly sanitized and just so happen's some one picked a login some thing like the following username :"billy" password :"muhaa" So with them using " it seamed to cancel out any thing that was in between the the letter's so i was able to just log in with username :"" password :"" Let me straight in made a few complaint's changed the guy's profile sent a few email's and changed alot of his stuff where he had wrote note's was funny,There is a video of it on the web some where,Even funny still i went back to there web site a few month's later only to notice a little message at the bottom of the page saying some shit about updated security any attempt's to login will be logged and dealt with according,But i have a few more but im not willing to share due to fear of come back's.Oh them were the day's but now i don't hack just exploit development.
  12. Just a few asm link's to get you started. http://www.xs4all.nl/~smit/asm01001.htm http://thsun1.jinr.ru/%7Ealvladim/man/asm.html http://goforit.unk.edu/asm/p386_1.htm http://win32assembly.online.fr/tut1.html http://win32assembly.online.fr/tutorials.html http://www.thefreecountry.com/compilers/assemblers.shtml http://www.freeprogrammingresources.com/assembly.html http://www.programmingtutorials.com/assembly.aspx http://www.drpaulcarter.com/pcasm/ nice ebook professional ASM Language & Guide to ASM in Linux lol. http://blackb0x.de.hm/philes/ASM.rar programing from the ground up.Nice little pdf made for a good read. http://austin.youareinferior.net/books/Pro...Ground%20up.pdf Basic differences between x86 Assembly and X86-64 Assembly http://www.milw0rm.com/papers/110 The Shellcoders Handbook Discovering And Exploiting Security. http://www.megaupload.com/?d=WM5QTHUL nice post purple decent explanation.
  13. Hey ok first off text to hex or byte2hex here is a nifty app i use from a m8 http://aluigi.altervista.org/ Look for a program called byte2hex some where in the download's. The usage is as follow's..Byte2hex -o file. file.txt the first file. is the out put and the second file is the input file you wish to turn into hex. Read this might help i can upload the shell coder's hand book if you need it. http://www.vijaymukhi.com/vmis/vmchap7.htm
  14. This is haw the skiddy got in lmfao. As reported by the attacker, the page contains a SQL Injection flaw in the Login field, by which he got to execute arbitrary sql commands and inject the html content that altered the page of Microsoft IEAK web site.... Flaws of SQL Injection are in general as common as ' OR ' =', and thanks to the improvements in technology and in web coders’ skills, cyber attackers could learn lots of things on SQL , and subsequently they perfected their ability to provoke headaches to web admins…
  15. I was told this one was fake..Nvrmm lmfao Win 2000 not suprising really.It just look amateur even for a defacement .