-
May 23rd, 2003, 06:48 PM
#1
Member
New Tut questions
would anyone be interested in how netbios is effectivly compromised, or iis unicode? Or how many current worms work with many examples? Also how credit cards go from numbers online to cash? any number of things i can discuss or write tuts about. Also Anonymous e-mail and how to block it, webroot = ftproot exploits, and more
sectac
The Hack Back Revolution
irc.dal.net:#guesswhatyourhacked
-
May 23rd, 2003, 06:57 PM
#2
If you plan on writeing a tutorial on exploits make sure you provide explanations on what to look for in log files and how to prevent them. Just so people dont get the wrong idea
By the sacred **** of the sacred psychedelic tibetan yeti ....We\'ll smoke the chinese out
The 20th century pharoes have the slaves demanding work
http://muaythaiscotland.com/
-
May 23rd, 2003, 07:01 PM
#3
Member
yea, the problem is, once the machine is compromised, it is very easy to hide it and delete log entrys, and hiding procs, i will go over every part of it, i was just wondering if anyone was interested in the subjects
sectac
The Hack Back Revolution
irc.dal.net:#guesswhatyourhacked
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|