Posted Ausome1
byHow the myspace SWF hack worked First note: I DID NOT MAKE THE HACK. I simply downloaded the .swf's, decompiled them, looked at the actionscript, worked out what it did, found the Javascript that it uses, and tidied it up & commented it. I've probably got some bits wrong, feel free to contact me ...
Posted Ausome1
byinurl:index.of.password Directory listing contains password file(s)? intitle:"Index of" service.pwd Directory listing contains service.pwd file(s) intitle:"Index of" view-source Directory listing contains view-source file(s) intitle:"Index of" admin Direcory listing contains administrat...
Posted Ausome1
byWhat is a Denial of Service (DoS) attack? Well, its the most common form of security attack, the easiest to perform and the hardest to track down and stop. A DoS (Denial of Service) attack by design sends a large enough amount of traffic to a host, group of hosts or network in order to overwhelm ...
Posted Ausome1
byTakeaway: Learn to forward a port on a remote machine to a local machine while initiating the SSH tunnel from the local machine. SSH is an extremely useful tool in that it allows you to do many things in a secure fashion that you might not otherwise be able to do. One of the things SSH allows yo...
Posted Ausome1
by-- Channel And User Modes -- Channels can have additional constraints, which can be set by the MODE command. To understand this, recall that the first person that joined a channel effectively creates it and is, at least initially, in charge of the channel. He or she becomes a Channel Operator or ...
Posted Ausome1
by-- Some Less Basic Commands. -- /MSG {nickname|channel} {text} Sends a (private) message to specified nickname or channel. Besides chatting on IRC Channels you can also have private conversations or queries with other people on IRC. On most clients these conversations will be handled by separate...
Posted Ausome1
by-- Basic Commands -- With most windows IRC clients an extensive help file is included. Dont hesitate to try the /help command. IMPORTANT NOTE : ALL IRC COMMANDS START WITH A "/". The forward slash is the default command character. Commands on IRC are not case sensitive, and can be abbreviat...
Posted Ausome1
byHiding files, directories, or even to the names of the files themselves. A useful CLSID is the Control Panel one: {21EC2020-3AEA-1069-A2DD-08002B30309D}. Example 1: - Create a text file test.txt - Rename it: Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D} Its icon changes and looks li...
Posted haZed
by[+]-----------------------------------------------------------------------[+] Disclosure [+]-----------------------------------------------------------------------[+] ------------------------------------------------------------------------------ What is Full Path Disclosure? -----------...
Posted Ausome1
byAddresses //Address: State code (US) '/\b(?:A[KLRZ]|C[AOT]|D[CE]|FL|GA|HI|I[ADLN]|K[SY]|LA|M[ADEINOST]|N[CDEHJMVY]|O[HKR]|PA|RI|S[CD]|T[NX]|UT|V[AT]|W[AIVY])\b/' //Address: ZIP code (US) 'b[0-9]{5}(?:-[0-9]{4})?b' Columns //Columns: Match a regex starting at a specific column on a line...
Posted RedEvolution
byWell, this is an article on how to "hack" and ATM. This still works, as masses of people are unaware of its existence. (X)Briefing (X)Cards (X)Machines (X)Changes (X)Hitting It (X)Reverse (X)Stores (X)Parking (X)Briefing Starting off, there is a common misconception of what really take...
Posted CrashOverron
byCommon Internet Exploits/Vulnerabilites 2 written by Crash Overron .:::.Contesnts.:::. 0. Introduction 1. Full Path Disclosure 2. RCE 3. Log Posioning 4. SQL Injection 5. EXIF 6. Conclusion [b]0. Introduction[/b] Hello once again from Crash Overron, hopefully this article will be bette...
Posted Evo
byClientless WEP Cracking by: Evo Before Starting, Ensure: Your hardware supports packet injection. You can verify this by using Wireshark. You are within range of an ap. Just because you can see packets transmitted from the ap, doesn't mean you can send them to the ap if the distance is too...
Posted Ausome1
byAn A-Z Index of the Linux BASH command line alias (Create an alias) awk (Find and Replace text, database sort/validate/index) break (Exit from a loop) builtin (Run a shell builtin) cal (Display a calendar) case (Conditionally perform a command) cat (Display the...