root(717)
-
one way web hacking (pretty old but useful for script kiddies)
One-way Web Hacking Saumil Shah saumil@net-square.com 8th December, 2003 "Necessity is the mother of invention" Table of Contents 1.0 Introduction 1.1 Components of a generic web application system 1.2 URL mappings to the web application system 2.0 Flowchart for a one-way web hack 3.0 Finding the entry point 3.0.1 Exploiting URL parsing 3.0.2 Exploiting poorly validated input parameters 3.0.3 Ex..
2012.02.05 -
Searching passwords by using searching tool google.com
QueryDescription inurl:/db/main.mdbASP-Nuke passwords filetype:cfm "cfapplication name" passwordColdFusion source with potential passwords filetype:pass pass intext:useriddbman credentials allinurl:auth_user_file.txtDCForum user passwords eggdrop filetype:user userEggdrop IRC user credentials filetype:ini inurl:flashFXP.iniFlashFXP FTP credentials filetype:url +inurl:"ftp://" +inurl:"@"FTP bookm..
2012.02.05 -
Using the Metasploit Console to Launch Exploits
$ ./msfconsole 888 888 d8b888 888 888 Y8P888 888 888 88888888b.d88b. .d88b. 888888 8888b. .d8888b 88888b. 888 .d88b. 888888888888 "888 "88bd8P Y8b888 "88b88K 888 "88b888d88""88b888888888 888 88888888888888 .d888888"Y8888..
2012.02.05 -
Apache Killer" a DDoS using the Range HTTP Header
In 2007, a Google engineer, Michal Zalewski, published a memo detailing a potential vulnerability of both Apache and IIS Web Servers after investigating the HTTP/1.1 "Range" header implementation. He reported then: it is my impression that a lone, short request can be used to trick the server into firing gigabytes of bogus data into the void, regardless of the server file size, connection count,..
2012.02.05 -
JSUNPACK
JSUNPACK A Generic JavaScript Unpacker CAUTION: jsunpack was designed for security researchers and computer professionals http://jsunpack.jeek.org/dec/go?report=8f3d0bc86a4041333de321f968d69d8c488b8812 다음 문서의 내용을 실행 할때 자바스크립트를 중지 하십시오 Submission permanent link 8f3d0bc86a4041333de321f968d69d8c488b8812 (Received 2010-10-21 07:26:09, img.js ) URL Status All Malicious or Suspicious Elements of Submi..
2012.02.05 -
MS Windows GDI Image Parsing Stack Overflow Exploit
4월 14일 공개된 MS GDI Image Parsing 관련 Exploit Code. Shellcode 는 넘 커서 파일첨부로 따로 ;; MS Windows GDI Image Parsing Stack Overflow Exploit (MS08-021) ///////////////////////////////////////////////////////////// ///Exploit the MS08-021 : Stack Overflow on GDI API ///Author: Lamhtz ///Date: April 14th, 2008 ///Usage: [filename] ///Function: Generate a crafted emf file which could /// automatically run cal..
2012.02.05