Downtime
Sorry for the downtime, had some noobs trying to own the site, finding that they couldn’t do shit but ddos the site. So we switched to a better server and fixed a few things. Better luck next time clowns.
Sorry for the downtime, had some noobs trying to own the site, finding that they couldn’t do shit but ddos the site. So we switched to a better server and fixed a few things. Better luck next time clowns.
Explains how you can from a SQL injection gain access to the administration console, where you can then run commands on the system. From fingerprinting to injection, to cracking the md5 passwords, to writing a phpshell, where you can easily run commands.
src: pentesterlab.com
@ponez released his POC code for the MS12-042 flaw on his website
You can snag the POC source and exe ::HERE::
Just a little tool that will BSOD a machine vulnerable to MS12-020. Tested on XP sp3 & Win2k3 Sp2. Download ::HERE::
perl script can be used to unlock apache tomcat servers
remotely by using the collected login combinations.
Tt will retrieve either a ROOT or SYSTEM reverse shell depending on the operating system. More info
Dumps login cleartext passwords stored by Windows Digest Auth pkg. Download it ::HERE::
This is a program illwill made in assembly that does a reverse Caller ID lookup. Just type or paste the number in the box and press ‘lookup’, if it finds any data it’ll display it on the screen above. Works with some cell phone numbers too.
Download it ::HERE::
The WiFi Protected Setup (WPS) protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours, using the open source tool called Reaver...
Added a program I made a few years ago that simulates phone box tones
(DTMF, Blue, red,orange,silver,etc…)
Download it our ::files section::
Went to Derbycon last week and it was awesome. The people were all great and it wasn’t a scenewhore con like Defcon. Also I got a shout-out during Mubix & carnal0wnage’s talk @ 49:07 🙂