Explains how you can from a SQL injection gain access to the administration console, where you can then run commands on the system. From fingerprinting to injection, to cracking the md5 passwords, to writing a phpshell, where you can easily run commands. src: pentesterlab.com
@ponez released his POC code for the MS12-042 flaw on his website You can snag the POC source and exe ::HERE::
perl script can be used to unlock apache tomcat servers remotely by using the collected login combinations. Tt will retrieve either a ROOT or SYSTEM reverse shell depending on the operating system. More info
Dumps login cleartext passwords stored by Windows Digest Auth pkg. Download it ::HERE::
This is a program illwill made in assembly that does a reverse Caller ID lookup. Just type or paste the number in the box and press ‘lookup’, if it finds any data it’ll display it on the screen above. Works with some cell phone numbers too. Download it ::HERE::
The WiFi Protected Setup (WPS) protocol is vulnerable to a brute force attack that allows an attacker to recover an access point’s WPS pin, and subsequently the WPA/WPA2 passphrase, in just a matter of hours, using the open source tool called Reaver. Think your 32 character alpha-numeric password is uncrackable? If your wireless router is … Read More “WPA/WPA2 Cracking with Reaver” »
Added a program I made a few years ago that simulates phone box tones (DTMF, Blue, red,orange,silver,etc…) Download it our ::files section::
Went to Derbycon last week and it was awesome. The people were all great and it wasn’t a scenewhore con like Defcon. Also I got a shout-out during Mubix & carnal0wnage’s talk @ 49:07 đŸ™‚
Started working on re-adding files to the files section, this will include programs and assembly source code from our past programs. Most of our old programs will definitely be detected by antivirus so don’t be an idiot and email us saying there’s virus on the files, they are virus related obviously, the ones with included … Read More “Files Section” »