Jump to content
Under Attack Mode

we are under attack,
For 2 days we have been the target of DDOS attack by small ScriptKiddies.
We are deploying a solution to solve the problem
Please stay tunned !


If you encounter problems with the new theme please inform the staff

@AdminSec   @mister     @SC_z     @Naylor

Search In
  • More options...
Find results that contain...
Find results in...

Microsoft Releases Patch for Wormable Bug That Threatens Corporate LANs

Microsoft Releases Patch for Wormable Bug That Threatens Corporate LANs
Read more...

Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords

Beware of 'Coronavirus Maps' – It's a malware infecting PCs to steal passwords
Read more...

Try challenges

Register & Join The Game

Break It

CEH V10

Proposal Name : Document Version
Document Release Date :
: CEH v10: EC-Council Certified Ethical
Hacker Complete Training Guide with
Practice Labs
1.0
14-May-18
Reference : Certified Ethical Hacking Workbook
View file...

Welcome to Exploit Zone

Become a ninja in the shadow !

News
  • Welcome To Exploit Zone
  • The kingdom of knowledge sharing in hacking
  • New Updates ! Stay Tunned !
  • Share your knowledge here !
  • unlash your power on our challenges !
  • Become a ninja in the Shadow !

All Activity

This stream auto-updates     

  1. Today
  2. Age 41 Why did you come to this forum? google What do you think you learn on the forum? ce que je peu What do you think you give to the forum ? des config ou comptes What's your best specialty? script php Tell something about you moi c'est floflo je suis dans le script php pour sortir chaines tv etc... What do you want to do ? Learn Rate the forum design Sponsor Invité
  3. Yesterday
  4. Hi, Thanks for the tricks very usefull , didn't know parsehub . Idk why, but i could have a result of only 30 lines when selection was of 500 lines 😕 So i just copy the 500 line -> excel Paste -> Click On the column , copy -> file txt past -> cat <file.txt> | grep ":" > file_clean.txt cat file_clean.txt | wc -l result : 500 Thanks for the share ! Now we need a solution for test every IP from the list on [Hidden Content] that tell you if your IP is hide or if the proxy let know the origin IP with the " X-Forwarded-For " header. Exemple : 178.76.69.132:45014 -> don't have X-Forwarded-For header 87.250.109.174:8080 -> have it ... In this website there is a column " nonymity " NOA - non anonymous proxy, ANM - anonymous proxy server, HIA - high anonymous proxy I guess this (not sure): NOA : keep your IP in database , track your searchs and let know the origin source ANM : keep your IP in database, track your searchs HIA : i hope do nothing
  5. Last week
  6. seseseseaa

    Rules

    Accept Read and understood
  7. Age 19 Why did you come to this forum? hck What do you think you learn on the forum? hackin What do you think you give to the forum ? good stuff What's your best specialty? hckaa Tell something about you my nammmee bbhh What do you want to do ? Learn Rate the forum design Sponsor Guest
  8. SC_z

    DarkComet

    Project stoped by the creator. Website still alive in another name. Maybe there is an alternative ? (or we could code it maybe)
  9. Hello and welcome on the Exploit Zone ShineLoliMC !
  10. ShineLoliMC

    Rules

    Accept Read and understood
  11. Age 18 Why did you come to this forum? For learn cyber-security What do you think you learn on the forum? Cyber-security What do you think you give to the forum ? Maybe help What's your best specialty? Web Tell something about you I develop on CPP,C-Sharp,JS,NodeJS,Python and PHP and I'm French. What do you want to do ? Learn Train Rate the forum design Sponsor Invité
  12. yes we are setting up a rfcomm connection to bdaddr and send/recv AT command from gsm extension with no exploit (in reality bluesnarfer is made with a POC but it doesn't really matter right ?) I juste moved the topic to Exploit bc after reflexion it is a kind of exploitation
  13. Hi, Thanks for the share, my VM which use the bluetooth card of the Windows host find nothing in the scan, i'll try it when i'll receive new dongle bluetooth USB. 0 exploit for this attack is used ?
  14. Hi, Another post about shred (here) 🙂 I tested this : rm -rf /var/log ls /var/log -> ls: cannot access '/var/log': No such file or directory sudo apt-get install foremost df -h -> for find the good /dev/sda sudo foremost all /dev/sdc // very longtime sudo chown -R <utilisateur> output // beaceau the user didn't have the permission to acces it with his file manager Source : doc.ubuntu-fr then i recovery /var/log , great ! But care, my /dev/sda 10Go/40 Used become 39Go/40 used And the recovery is sorted by type not by folder (so i reb-builded my vm after) So yes, the command : sudo above all -w -i / dev / sda1 -o / Recup is wrong.
  15. Hi, Thanks for this little teach, shred is a great idea ! I find "Eraser" for windows . I test >.bash_history but keep this command on .bash_history , and still have a copy in the memory and it will flush back to the file when you log out. (src: askubuntu) So i find this command : cat /dev/null > ~/.bash_history && history -c && exit
  16. SC_z

    0x0-logs

    Hi, there is a problem, all path started with "..." doesn't exist.
  17. Hi, Thanks for the share. I have to say, don't miss the dependency ! Personnaly i tested it, but i don't know how to choose the crypter so i used this program directly in CLI as explain in the readme. But didn't had a single fud payload.
  18. SC_z

    SecLists

    Hi, Thanks for the share, is great to have list like that up to date, and it give somes other repos git usefulls
  19. Earlier
  20. Hi, Thanks for the share, i tested it and yes this tool enumerate a lot of information on the system. But the output is too verbose for me, you have to know what you are looking for, for exploit this ^^
  21. Thanks for the share, I tested it on windows 10. It look very usefull for enumerate the rights of the user actual, but for moment 2 CVE didn't worked for me ^^ and smartscreen block the installation 😕 But still usefull.
  22. Ichinose approved the submission
  23. Age 22 Why did you come to this forum? to learn about penetration testing What do you think you learn on the forum? penetration testing network security What do you think you give to the forum ? when i learn more i can make code that people can test and use What's your best specialty? java programming Tell something about you i like gaming What do you want to do ? Learn Rate the forum design Sponsor Guest
  24. LordFrieza

    Rules

    Accept Read and understood
  25. This is the Level 3 if you miss the other level they are Here. In this one we'll see how to bypass the PHP split filter. the PHP line look like that: $splitedFileName = explode('.', $_POST['FileName']); This line will split the content of $_POST['FileName'] where is the '.' in the string. How to Bypass it ? As you may know string are a kind of tab that always end with a null byte his hex value is 00. the null byte mean the end of the string, so you may already guess what we are going to do next. In order to do it we will rename the File with a double extension like in level 1 but with a little modification, so it will be File.phpA.png (you can change the A with any letter). Then you will have to intercept w/ Burp Suite the request and go on the hex section : Then go where you can see the filename with the extension and change the Value of the 'A' character by a null byte: Become : So that way the PHP explode function will understand that the string end to .php but like there is a .png in the request the MIME Type is image/png. But some times that's not working . So why is it not working ?! It because the null byte is not interpreted as want, so to arrange that we can use other methods. we can only rename the file not by change the Hex value to 00 but to make the browser interpreting the null byte. so we can use url encoded format so we will change the A with a %OO Remember that the null bytes can be the hex value 00 the url format %00 , the html entities &#00 after it's up to you to find you way. Leave a Like 😁
  1. Load more activity

Announcements

×
×
  • Create New...