|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 57
Members: 0
Total: 57
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
|
2.6.27 doesn't seem to be common on most of the exploit sites like milw0rm and inj3ct0r... and i don't know C or assembly to make my own exploit, so i guess i'll have to look for another target |
|
|
|
|
Sorry for bumping an old topic, but heres a good one:
http://PRIVATE.pastebin.com/m4e158486 |
|
|
|
|
BUMP, Did newbies corner die or something? |
|
|
|
|
Is there any good backdoor shells that I can run so I can just netcat into boxes. I need one like w4ck1ng's backdoor shell, but doesn't suddenly die after a minute |
|
|
|
|
Nope, gibbocool, I've uploaded a shell to my hosting account, binded a backdoor, I've uploaded an exploit that causes the server to go into a kernel panic, I got their server to suddenly go offline fo ... |
|
|
|
|
I've just got into a free hosts server, they run the 2.6.27.4 linux kernel and mmap is blocked, what exploit do i need to use to gain access? milw0rm is down so I can't look there, h00lyshit failed to ... |
|
|
|
|
I got this hash out of a db and looked on the site, I can't figure out what software it is using to crack the hash with my passwordspro, anyone got an idea?
Hash: 8f3c4be91fb43a922d7e803857c08e6a:g ... |
|
|
|
|
get [url=http://www.insidepro.com/eng/passwordspro.shtml]passwordspro and put all the info into it with the method md5(md5($salt).md5($pass)) and then you can crack it. |
|
|
|
|
hey, you could use http://co.cc and attach a free domain from them to your host |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|