 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 82
Members: 0
Total: 82
|
|
|
|
|
 |
Full disclosure |
 |
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
|
|
a "jpg cookie stealer" can't exist, because jpg is no executable... i presume antichat.ru redirectq (with .htaccess) http://antichat.ru/cgi-bin/s.jpg to the real stealer script.
if you want to use ... |
|
|
|
|
the password of this user : dupa400 |
|
|
|
|
when i call http://mysite.com/cookies.php
there's in cookies.txt :
Cookie: <br> IP: [color=#FF0000]myIP[/color]<br> Date and Time: 10 July, 2005, 3:11 pm& ... |
|
|
|
|
after a quick look to the index of this forum, it seems to me there's no place here to speak about trojan/rat.
Search in google for these words, and binder.
Finally, netbus is an old trojan.
My ... |
|
|
|
|
verbatim
have u set chmod 777 to the cookies.txt ?
yes i have... but this file is still empty
any ideas ?
is there a mistake here :
[color=#EFEFEF][url]www.ut[url=ww ... |
|
|
|
|
i'm sorry, i won't go on this topic which isn't at the right place. |
|
|
|
|
ok, so imagine
1- i create a file cookie.php with inside :
<?
if(isset($_GET["c"]))
{
$file = fopen("cookies.txt", "a");
fw ... |
|
|
|
|
hi, your post isn't in the right place, we here talk about phpBB issues.
by the way, netbus is a trojan/rat, not a virus, so you can't "infect" (but bind) a file with netbus. |
|
|
|
|
great video subzero !
1- i still wonder... when you write
template color,so no one can see it.
// you can do it.. by viewing page source code.
the template has many color... wich one do yo ... |
|
|
|
|
First, thank you for your answers and your help !
this exploit original come from http://antichat.ru/txt/phpbb/
and not ccteam as you can see from the exploit banner in milworm site.
htt ... |
|
|
|
|
waouh, a new flaw in phpBB !
i'm totally new in XSS Remote Cookie exploit, would you be kind to explain me (personnaly or with a good tutorial) how to use this exploit ?
thank you in advance. ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|