Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - hacker@sr.gov.yu

Pages: [1] 2 3 ... 5
1






Break Security pwnd  :D


Code: [Select]
http://translate.google.com/translate?sl=auto&tl=en&js=n&prev=_t&hl=sr&ie=UTF-8&u=http%3A%2F%2Fwww.nadlanu.com%2Fpocetna%2Fzabava%2Fzanimljivosti%2FSrpski-haker-quothaknuoquot-najveceg-svetskog-hakera.a-202471.299.html

Source:
Code: [Select]
http://balcan-underground.net/whitehat-show-off/nir-breaksec-com-t667.html

2
Found it on the Webs / n00b SSH access username and password lol :)
« on: August 17, 2013, 04:09:14 pm »

Code: [Select]
http://pastebin.com/YFQGBK7X
lol  :D




3
General discussion / Re: Some really old EZ stuff
« on: July 16, 2013, 06:04:22 pm »



lol, the good, old times  :D

4
Hacking and Security / Re: DDOS attack - How to detect one
« on: May 14, 2013, 05:33:57 pm »

Here is one  :)

Code: [Select]
https://code.google.com/p/httpflooder/
HTTPFlooder is a tool that can perform stress tests, load tests, botnet simulation, DoS/DDoS tests and fuzzing for HTTP protocol.
It supports the following attack types:
GET Flood
POST Flood
Slow Headers (Slowlories)
Slow POST
Hash DoS
Mix Flood (mixing GET/POST Flood)
Range Bytes
HTTP Header Fuzzing
Slow Header Fuzzing
MX Flooder over Balancer


And:


What a DDoS Attack Looks Like:
Code: [Select]
http://www.youtube.com/watch?feature=player_embedded&v=hNjdBSoIa8k
Code: [Select]
http://gizmodo.com/5995429/how-a-ddos-attack-looks-as-it-happens

5
And the biggest problem are the themes. So don't use a leaked old premium theme, or be sure it's clean and every addon included (timthumb) is updated :D
Yep, plugins are also a big threat.

6
Better WP Security + Cloud Flare + Mod_Secuity(with OWASP rules) is quite good :)

9
Hacking and Security / Re: webGOAT a good tool?
« on: March 19, 2013, 07:52:14 pm »
About GameOver:
Project GameOver was started with the objective of training and educating newbies about the basics of web security and educate them about the common web attacks and help them understand how they work. 

GameOver has been broken down into two sections.
Section 1 consists of special web applications that are designed especially to teach the basics of Web Security. This seciton will cover 
XSS
CSRF
RFI & LFI
BruteForce Authentication
Directory/Path traversal
Command execution
SQL injection

Section 2  is a collection of dileberately insecure Web applications. This section provides a legal platform to test your skills and to try and exploit the vulnerabilities and sharpen your skills before you pentest live sites.
We would advice newbies to try and exploit these web applications. These applications provide real life environments and  will boost their confidence.


System Requirements :
In order to run the VM image, you need to have a VM Player 4.0.2 or higher.(We have not tested it in lower versions of VM Player). You may allocate 256MB or higher RAM to this instance. In case you do not have a VM Player installed or for some reason you prefer another virtualization software, you may download the .iso and run it in a 'Live' mode.

Getting Started :
In case you have chosen the Live CD, select 'Live' from the grub menu and Enter
Login with the following credentials.
username: root
password: gameover

Once you login, type 'ifconfig' in your GameOver machine command prompt and hit Enter.     
This will give you the ip address of the GameOver machine (Server).
Now in your client browser enter this IP address and hit Enter.
You should be able to access GameOver now.


Credits:
Voyage Linu:  GameOver has Voyage Linux as its base OS. Voyage is a minimilistic Linux distribution which is in turn based on Debian. For more information regarding Voyage Linux we encourage you to check out their website:  http://linux.voyage.hk/.
 
Web Applications (section 1):

1. Damn Vulneable Web Application:  (http://www.dvwa.co.uk/)
2. OWASP  WebGoat:(https://www.owasp.org/index.php/Category:OWASP_WebGoat_Project)
3. Ghost (http://www.gh0s7.net/)
4. Mutillidae (http://www.irongeek.com/i.php?page=mutillidae/mutillidae-deliberately-vulnerable-php-owasp-top-10)
5. Zap-Wave: (http://code.google.com/p/zaproxy/)


Web Applications (section 2):

1. Owasp Hacademic Challenges : (https://www.owasp.org/index.php/OWASP_Hackademic_Challenges_Project)
2. Owasp Vicnum: (https://www.owasp.org/index.php/Category:OWASP_Vicnum_Project)
3. WackoPicko: (http://www.aldeid.com/wiki/WackoPicko)
4. Owasp Insecure Web App: (https://www.owasp.org/index.php/Category:OWASP_Insecure_Web_App_Project)
5. BodgeIT: (http://code.google.com/p/bodgeit/)
6. PuzzleMall: (https://code.google.com/p/puzzlemall/)
7. WAVSEP: (https://code.google.com/p/wavsep/)

Known Bugs :(
The .iso cannot be installed on a Virtual machine, but works perfectly in the 'Live mode'.

Bug Report:
In case you encounter any bug or issue in this Project, you may report it to  j0k3r@null.co.in (Jovin Lobo).

Conclusion:
We encourage users to tryout GameOver and learn more about Web security. There are tons of other deliberately insecure applications on the Internet. If you find any such interesting/useful application we would be glad to append it to this existing collection of insecure Apps. You can send your suggestions/improvements to  j0k3r@null.co.in (Jovin Lobo).
 

Road Map:
We have currently only included Web based applications in this current release of GameOver.
In the future releases we plan to include system level CTF's along with Web based applications to give the users a complete hands-on experience.


NULLCON CHALLENGES:
You can also visit this link http://www.nullcon.net/challenge/archives.asp to play NULLCON challenges. The challenges are broadly categorized into  Web , Cryptography, Trivia, Log, analysis, Reverse engineering, Forensics, System  and Programming.


Code: [Select]
http://sourceforge.net/projects/null-gameover/files/

10
Hacking and Security / DarkLeech - malware mod for Apache
« on: September 17, 2012, 11:18:03 am »

DarkLeech - malware mod for Apache


Next level of infecting web server gone public:

Code: [Select]
http://ondailybasis.com/blog/?p=1368

11
General discussion / Re: which antivirus to use free ?
« on: April 16, 2012, 10:12:53 am »
Avast is the best choice.

12
Hacking and Security / Re: rootkits.com?
« on: March 28, 2012, 01:57:59 pm »
dang it the link is broken!
I couldnt download the database!

Here you are:
Code: [Select]
www.janoweb.net/wordlists/rootkit_com_mysqlbackup_02_06_11.7z
Google is your friend. :)

13
Android / Re: Any benefits of using CyanogenMod?
« on: February 22, 2012, 05:25:23 pm »

14
If the tool is in Serbian as well, then you lost my interest.
Nope, its a web based service: http://www.pingdom.com

15
Pingdom - monitor the "uptime" and performance of your site

Serbian:
Code: [Select]
http://www.cujanovic.com/pingdom-pratite-uptime-i-performanse-vaseg-sajta/
English:
Code: [Select]
http://translate.googleusercontent.com/translate_c?client=tmpg&hl=en&langpair=sr|en&rurl=translate.google.com&twu=1&u=http://www.cujanovic.com/pingdom-pratite-uptime-i-performanse-vaseg-sajta/&usg=ALkJrhiPOUWQiWKKY9SM__e97qQKT6ZesA

Pages: [1] 2 3 ... 5