Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: karavay; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    5
    Views
    1,130

    gonna to try those tmorrow

    gonna to try those tmorrow
  2. Replies
    5
    Views
    1,130

    ive tried a couple Packet Tracer from cisco and...

    ive tried a couple Packet Tracer from cisco
    and net notepad neither of these is what i am after :(
  3. Replies
    5
    Views
    1,130

    Network Diagram software

    Hey guys just spent 2hrs looking for a suitable software to draw nice network diagrams with a function of animating the process and possibility of adding additional devices (e.g pictures) of e.g...
  4. Replies
    10
    Views
    3,326

    yes it is e.g. creating an optional on-line...

    yes it is e.g. creating an optional on-line keybord on the authenication page!
    user will type the password by clicking his mouse on the keybord! - that minimizes the chances of your input being...
  5. Replies
    3
    Views
    1,558

    nop .... :) ...

    nop .... :)

    http://www.microsoft.com/mind/0598/browhelp.asp
  6. Replies
    3
    Views
    1,558

    creating Browser Helper Object

    Hey guys any ideas on how to create BHOs in windows environment ?!

    I know alot of malicious softwae use this technology to load with the browser but the method is kinda undiscovered by me!

    So...
  7. Replies
    8
    Views
    5,380

    I think it uses off algorithm - every 7th byte is...

    I think it uses off algorithm - every 7th byte is active in cfinal executable compilation...very interesting and smart - almost endless mutation capabilities :)
  8. Replies
    8
    Views
    5,380

    It seems like it! :)

    It seems like it! :)
  9. Replies
    8
    Views
    5,380

    worm sould contain the addresses of SMTP server...

    worm sould contain the addresses of SMTP server it uses to destribute itself.......or a source from where it gets them..information like that!

    yes ive analysed the code and there is some very...
  10. Replies
    8
    Views
    5,380

    polymorphic worm decryption

    Hey guyz alittle problem I encountered today - about 6 workstations on my net were infected by the Scano.l worm -

    some details are clear but would be really great to know more!

    heres the body...
  11. Replies
    8
    Views
    1,523

    how about local security where does it store...

    how about local security where does it store passwords / conversation history / crypted or not?
  12. Replies
    8
    Views
    1,523

    it uses RC5 to chiper its text chat communication...

    it uses RC5 to chiper its text chat communication but the key can be recoverd from outgoing UDP datagam... whats the point !!:) script kiddie protection :)
  13. Replies
    8
    Views
    1,523

    http://www.simson.net/ref/2005/OSI_Skype6.pdf -...

    http://www.simson.net/ref/2005/OSI_Skype6.pdf - Security Overview
  14. Replies
    8
    Views
    1,523

    Skype - exposed

    Hey guys as the popularity of this messenger-voip communication software, grows I was thinking to investigate the security side of this software:

    -Communication security
    -Local security
    -overall...
  15. Replies
    9
    Views
    911

    shell

    try telnet www.megasecurity.org 23
    decent & FReE shell account you can use for practising
  16. Replies
    11
    Views
    1,178

    To TheSpecialist How did you un-decoded it ? i...

    To TheSpecialist How did you un-decoded it ? i tried using perl ::B64 mod it didnt work ... i know this is a lame q but I cant get it done :)
  17. Replies
    11
    Views
    1,178

    i2c ....do u want me to post a half dozen links...

    i2c ....do u want me to post a half dozen links which lead to the exploit code (3 versions of it + 1 unpublished)!

    **** guys the question was how to uudecode ... it not laming me!!!!

    theres no...
  18. Replies
    11
    Views
    1,178

    guys...what you have made form my post........is ...

    guys...what you have made form my post........is it an exploit the answer is yes
    is an example on which I wanna learn how to convert base64 to readable (compile-able )c file the answer is yes......
  19. Replies
    11
    Views
    1,178

    Base64 convertion

    guys ......... how can i convert this in to "readable" file

    in *nix environment

    begin-base64 644 patch.diff
    LS0tIFRIQ0lJU1NMYW1lLmMJU2F0IEFwciAyNCAwMDowMDowMCAyMDA0Cisr...
  20. Thread: ASM backdoor

    by karavay
    Replies
    11
    Views
    1,700

    thanks tyfon ! Camon guys what is this all...

    thanks tyfon !
    Camon guys what is this all about.....I mean what is this site about........ ask yourself this burning question.......I didnt ask you how TO hack microsoft did I ... the question was...
  21. Thread: ASM backdoor

    by karavay
    Replies
    11
    Views
    1,700

    who's talking about lamers here.....I sad that...

    who's talking about lamers here.....I sad that ASM is not my powerful side....
    here's the diffcult way of doing it....

    anyway

    :ml /c /coff backdor.asm
    link /base:0x13140000...
  22. Thread: ASM backdoor

    by karavay
    Replies
    11
    Views
    1,700

    ASM backdoor

    Guys Iím NOT very good with ASM / C (have abit different approach)
    How could I compile the following code in to executable PE (.exe) or convert it in to compil-eable C code ?
    ...
  23. Replies
    1
    Views
    763

    the beginning of the end or ptrace(2)

    mremap missing do_munmap return check kernel exploit -

    working one :)


    http://www.securitylab.ru/_Exploits/2004/03/linuxmmap.c.txt
  24. Replies
    45
    Views
    39,117

    Sticky: GooD one bro.......keep on !!! :cool:

    GooD one bro.......keep on !!! :cool:
  25. Replies
    9
    Views
    909

    thanks guys!!! :)

    thanks guys!!! :)
Results 1 to 25 of 36
Page 1 of 2 1 2