Search found 173 matches

Return to advanced search

Re: A little pen test help

if (msg == 1) { sessvars.myObj = { name: $("#txtName").val() }; window.location.href = "jfdjfdsjkfs.htm"; } ya, seems like legal hacking challenge. so set sessvars.myObj to some value and do javascript:window.location.href = "jfdjfdsjkfs.htm" or something like tha...
by r-ID
on Thu Jul 04, 2013 5:25 pm
 
Forum: General
Topic: A little pen test help
Comments: 14
Views: 14424

Re: Euler #9

i think ^ doesn't work that way. max = 1000 def main(): for a in xrange(1,max): print a; for b in xrange(1,max): for c in xrange(1,max): if triplit(a,b,c): if (a+b+c) == max: print a; print b; print c; return (a*b*c) def triplit(a,b,c): if a<b and b<c: if (a*a)+...
by r-ID
on Wed Aug 03, 2011 6:42 am
 
Forum: Interpreted Languages
Topic: Euler #9
Comments: 8
Views: 8988

Re: The need for Change

Theory can be added before video or as text or in the video itself. Video can highly upgrade learning, it's a lot faster to learn from videos. :) And I'm not afraid of that. :) I wish to learn :) Sometimes i read an hour or two, but once i see it, i understand it completely.
by r-ID
on Sun Jul 24, 2011 7:43 pm
 
Forum: Comments & Suggestions
Topic: The need for Change
Comments: 65
Views: 59652

Re: The need for Change

I'm gonna brainstorm new ideas: I think Hackipedia instead of articles section is better. It might be far more organized and the accuracy of information can always be upgraded. Video tuts. I do like to see video better then to read papers, i think a lot of ppl do. It's very effective way to learn. I...
by r-ID
on Sun Jul 24, 2011 8:53 am
 
Forum: Comments & Suggestions
Topic: The need for Change
Comments: 65
Views: 59652

Re: How exploits and payloads work

Looks like you understood basic principles of BOF. The very basic sample i have seen was a simple c program which takes command line argument as a parameter and does only one thing, copy to the buffer your argument (few lines of code). Very easy to understand and very easy to try it yourself. Google...
by r-ID
on Fri Jul 22, 2011 2:49 pm
 
Forum: Programming
Topic: How exploits and payloads work
Comments: 5
Views: 9782

Re: How exploits and payloads work

Let's speak about BOF, the idea of BOF is to copy some data out of buffer. If memcpy (or any similar function) copies more data then the buffer can hold then other parts of the memory gets overwritten. So you can construct such a data that you override return pointer (return pointer is memory addres...
by r-ID
on Fri Jul 22, 2011 12:45 pm
 
Forum: Programming
Topic: How exploits and payloads work
Comments: 5
Views: 9782

Re: Getting back into programming... Sort of

i think the problem is that a lot of sites return 200 response even if such page doesn't exist
you need to do something smarter, like comparing a header, or page content,
btw nice list :)
by r-ID
on Thu Jul 14, 2011 7:04 pm
 
Forum: Interpreted Languages
Topic: Getting back into programming... Sort of
Comments: 20
Views: 28138

Re: Anonymity

Bad thing about tor is that anonymity is supported by volunteers, so anyone can track you, there were research made, guy volunteered, put a sniffer and got some very interesting data, porn accounts mostly. Bad thing about proxies is that there are some honey pots. Proxies and tor are cheap and are o...
by r-ID
on Tue Jul 12, 2011 5:13 pm
 
Forum: Networking
Topic: Anonymity
Comments: 8
Views: 9174

Re: help

Ya, and he likes to teach kids too.
by r-ID
on Mon Jul 11, 2011 2:39 pm
 
Forum: Graveyard
Topic: help
Comments: 18
Views: 6368

Re: How to notify someone of a vulnerability.

Depends on what you mean by "admin account", when you say admin account i think of login information on some kind of CMS, and CMS functionality is limited. You should tell root account or rooted if you mean total control of the box. What SQL injection does it allows you to execute sql requ...
by r-ID
on Sun Jul 10, 2011 8:22 pm
 
Forum: NZone
Topic: How to notify someone of a vulnerability.
Comments: 5
Views: 7092
Next

Return to advanced search