Search:

Type: Posts; User: karavay; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.02 seconds.

  1. Replies
    5
    Views
    9,282

    gonna to try those tmorrow

    gonna to try those tmorrow
  2. Replies
    5
    Views
    9,282

    ive tried a couple Packet Tracer from cisco and...

    ive tried a couple Packet Tracer from cisco
    and net notepad neither of these is what i am after :(
  3. Replies
    5
    Views
    9,282

    Network Diagram software

    Hey guys just spent 2hrs looking for a suitable software to draw nice network diagrams with a function of animating the process and possibility of adding additional devices (e.g pictures) of e.g...
  4. Replies
    10
    Views
    10,193

    yes it is e.g. creating an optional on-line...

    yes it is e.g. creating an optional on-line keybord on the authenication page!
    user will type the password by clicking his mouse on the keybord! - that minimizes the chances of your input being...
  5. Replies
    3
    Views
    8,571

    nop .... :) ...

    nop .... :)

    http://www.microsoft.com/mind/0598/browhelp.asp
  6. Replies
    3
    Views
    8,571

    creating Browser Helper Object

    Hey guys any ideas on how to create BHOs in windows environment ?!

    I know alot of malicious softwae use this technology to load with the browser but the method is kinda undiscovered by me!

    So...
  7. Replies
    8
    Views
    25,963

    I think it uses off algorithm - every 7th byte is...

    I think it uses off algorithm - every 7th byte is active in cfinal executable compilation...very interesting and smart - almost endless mutation capabilities :)
  8. Replies
    8
    Views
    25,963

    It seems like it! :)

    It seems like it! :)
  9. Replies
    8
    Views
    25,963

    worm sould contain the addresses of SMTP server...

    worm sould contain the addresses of SMTP server it uses to destribute itself.......or a source from where it gets them..information like that!

    yes ive analysed the code and there is some very...
  10. Replies
    8
    Views
    25,963

    polymorphic worm decryption

    Hey guyz alittle problem I encountered today - about 6 workstations on my net were infected by the Scano.l worm -

    some details are clear but would be really great to know more!

    heres the body...
  11. Replies
    8
    Views
    6,609

    how about local security where does it store...

    how about local security where does it store passwords / conversation history / crypted or not?
  12. Replies
    8
    Views
    6,609

    it uses RC5 to chiper its text chat communication...

    it uses RC5 to chiper its text chat communication but the key can be recoverd from outgoing UDP datagam... whats the point !!:) script kiddie protection :)
  13. Replies
    8
    Views
    6,609

    http://www.simson.net/ref/2005/OSI_Skype6.pdf -...

    http://www.simson.net/ref/2005/OSI_Skype6.pdf - Security Overview
  14. Replies
    8
    Views
    6,609

    Skype - exposed

    Hey guys as the popularity of this messenger-voip communication software, grows I was thinking to investigate the security side of this software:

    -Communication security
    -Local security
    -overall...
  15. Replies
    9
    Views
    8,561

    shell

    try telnet www.megasecurity.org 23
    decent & FReE shell account you can use for practising
  16. Replies
    11
    Views
    11,283

    To TheSpecialist How did you un-decoded it ? i...

    To TheSpecialist How did you un-decoded it ? i tried using perl ::B64 mod it didnt work ... i know this is a lame q but I cant get it done :)
  17. Replies
    11
    Views
    11,283

    i2c ....do u want me to post a half dozen links...

    i2c ....do u want me to post a half dozen links which lead to the exploit code (3 versions of it + 1 unpublished)!

    **** guys the question was how to uudecode ... it not laming me!!!!

    theres no...
  18. Replies
    11
    Views
    11,283

    guys...what you have made form my post........is ...

    guys...what you have made form my post........is it an exploit the answer is yes
    is an example on which I wanna learn how to convert base64 to readable (compile-able )c file the answer is yes......
  19. Replies
    11
    Views
    11,283

    Base64 convertion

    guys ......... how can i convert this in to "readable" file

    in *nix environment

    begin-base64 644 patch.diff
    LS0tIFRIQ0lJU1NMYW1lLmMJU2F0IEFwciAyNCAwMDowMDowMCAyMDA0Cisr...
  20. Thread: ASM backdoor

    by karavay
    Replies
    11
    Views
    7,353

    thanks tyfon ! Camon guys what is this all...

    thanks tyfon !
    Camon guys what is this all about.....I mean what is this site about........ ask yourself this burning question.......I didnt ask you how TO hack microsoft did I ... the question was...
  21. Thread: ASM backdoor

    by karavay
    Replies
    11
    Views
    7,353

    who's talking about lamers here.....I sad that...

    who's talking about lamers here.....I sad that ASM is not my powerful side....
    here's the diffcult way of doing it....

    anyway

    :ml /c /coff backdor.asm
    link /base:0x13140000...
  22. Thread: ASM backdoor

    by karavay
    Replies
    11
    Views
    7,353

    ASM backdoor

    Guys I’m NOT very good with ASM / C (have abit different approach)
    How could I compile the following code in to executable PE (.exe) or convert it in to compil-eable C code ?
    ...
  23. Replies
    1
    Views
    4,461

    the beginning of the end or ptrace(2)

    mremap missing do_munmap return check kernel exploit -

    working one :)


    http://www.securitylab.ru/_Exploits/2004/03/linuxmmap.c.txt
  24. Replies
    45
    Views
    143,879

    GooD one bro.......keep on !!! :cool:

    GooD one bro.......keep on !!! :cool:
  25. Replies
    9
    Views
    8,153

    thanks guys!!! :)

    thanks guys!!! :)
Results 1 to 25 of 36
Page 1 of 2 1 2