anath3ma
Members-
Posts
597 -
Joined
-
Last visited
-
Feedback
0%
Content Type
Articles
Profiles
Forums
Store
Everything posted by anath3ma
-
while im searching for weponstacking and found this: if u eqip the 2handed Corupted ash bringer u are able to hit everything like ur same fanction etc so if are not able to hit him with this sword u can
-
ascent 4 its very good and the most bugs have fixed
-
ego psitevo pados pados pos prepi na klisoume ta sinora na skotosoume osous exoun mini stin elada kai opios pernai ta sinora na ektelite me tin mia
-
yes this maybe work i dont have try it looks easy and logical very simple my Id=12 12 12 12 12 12 12 12 12 12 12 12 12 another acc ID =13 13 13 13 13 13 13 13 13 13 change the first with the second
-
Changing your IP when you're using an dynamic IP + modem!
anath3ma replied to DreaM's topic in Off-Topics
just make a program with C+ its not hard and u can change ip easy no need to restart ruters etc -
kirie root haha :P
-
i can do header injections to ur site fix it before is to late :P invul with XSS attacks <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <HTML><HEAD> <TITLE>417 Expectation Failed</TITLE> </HEAD><BODY> <H1>Expectation Failed</H1> The expectation given in the Expect request-header field could not be met by this server.<P> The client sent<PRE> [glow=red,2,300]Expect: <script>alert(OWNED :))</script>[/glow] </PRE> but we only allow the 100-continue expectation. <HR> <ADDRESS>Apache/1.3.33 Server at livedimension.net Port 80</ADDRESS> </BODY></HTML> alrdy hacked :P ah and update ur php and check this is ur backup page got the true page source http://livedimension.net/index.php~ hide it many ways to OWN ur site:) i think i have help u
-
i have upload my vid on rapidshare download it and see http://rapidshare.com/files/93672127/Untitled2.rar.html as u can see its very simple to spoof mail accounts etc and ofc u can do more have a nice day :)
-
matrix oso gia to rename p thes na kanis tha s po ti ginete ean exis katevasi tis kenourgies ekdoseis mirc exoun klidomeno kodika k den ginode modify pia katevase pio palio version edo ine to mirc modifyed http://rapidshare.com/files/93431501/l2.rar.html apla vale to ico tou l2 sta proc episeis to dixni san l2.exe
-
oute ego ipa pos ine diskolo kai den ksero an ine kapia klemeni idea
-
dld me to dll afto to mirc apla ginete arato diafanes dld oxi sto task apla den fenete stin othoni opote stelnoume afto to mirc sto thima san l2.exe a episis ama thes na modify to mirc.exe katevase to resource hacker ego to douleva afto to programa s leo oti gamaei kanis renames alazeis ta menus k alla pola episi boro na s ftiakso to mirc na trexi se hide mod k apo to task k apo padou an ine etsi opos katalava to dll den to katevasa giati ime se ubuntu k den exi mirc edo :P alla katalava ti les
-
nai re si poli kalo share den pigene gia sena to "kako meros tou post" esto k tixeia vrikes ena xploit :)
-
ego pistevo pos ginete giati na min ginete dld nice share marios asxeta an k den me niazi to lineage mathame oli k apo packets tora...
-
o monos tropos gia na xrisimopoihseis dll sta project s ine me API declarations alios i etima ocx i mrcscript den nomizo na ipostirizei tetia pragmata bori declare kathos den grafo mrcscript tsp nomizo pos katalava ti thes na peis oti otan kapios treksi to script s k anigi to parathilo tou l2 to fake parathiro k grafi to pass stelni ta stixia t meso mirc se prive chat ston user p tha kathoriseis an afto isxei tote ine ena mirc exploit omos an den exi mirc to to "thima" to arxiaki sou ine agnosto ston ipologisti kai i edoles aftes den tha metafrastoun se glosa sistimatos eksigise perisotera pia dll xrisimopoiei? pos ta dilonis ston mirc kodika? to script kani injection sto l2?
-
de litourgi ine apla ena form me buttons etc mono afto visual den pezi na exi oute grami kodika mesa kai aploustata ine scam den ine diskolo na grapseis ena programa pou na stelni packets se ena sigekrimeno target alla den m fente gia tpt sovaro afto bourdes... oute epilogi gia ports den exi kai oute inject tha kani gia na vrei remote add & ports k oute tha alazei to BF gia ta cronicles hah ScAMMMM eftiaksa k ego meta apo 5 lepta ena l2 ultra packet analyzer dite dite perilamvani SQL injections sto database brute force hash cracking WPA cracking packet snifing Overfload exploits and many more ONLY 1000 EURO FOR 5 MIN WORK DOTN LOOSE IT!!!!
-
re pedia den isxioun afta p lei k logika na to deis i mirc script den exi toses dinatotites na kani tetia pragmata afti i glosa ine adinamin telios oso gia to alo p kolai to rar kai to sfx ine kati edelos akiro
-
http://www.maxcheaters.com/forum/index.php?topic=8211.0 diladi ine ena fake login p perni tin thesi tou kanonikou login tou l2 --tha mou liseis omos tin aporia pos emfanizete to fake login? xrisimopiodas ms kodika? k an nai pos ginete afto pos giente na kanis CreateObject otidipote meso ms script --thes na peis dld pos to rar exi self-execution? ---episis ta scripts p diavazi to mirc ine mrc k mts k ini ----bori na katalava lathos eksigise afto pou thes na peis kalitera
-
if u want to 'hack' administrators etc u must do : sql injections or try other remote exploits to the database find hash or files with encryped keys crack the hash or the files with md5 cracker or maybe other cracker
-
i have check sources again and again and again program dont ignore ports or use some ports and dont have problem with ports becouse it use the port of every program u add what i mean the program inject to the selected app and recives the remote address and port i have test it with other aplication i have make a small client server system to test it i have test and on WoW clietn and look at this Οπξοΰςχεν νξβϋι κλθενς wow.exe (1872) <------- application ID [glow=red,2,300]Οεπευβΰχεν κξννεκς νΰ 127.0.0.1:1208 Οεπευβΰχεν κξννεκς νΰ 80.239.186.34:80# <-------This is bypass Ρξηδΰνξ νξβξε ρξεδθνενθε - 0 # <-------This is bypass Οεπευβΰχεν κξννεκς νΰ 127.0.0.1:1210 # <-------This is bypass Οεπευβΰχεν κξννεκς νΰ 80.239.178.130:80# <-------This is bypass Οεπευβΰχεν κξννεκς νΰ 127.0.0.1:1213 # <-------This is bypass Οεπευβΰχεν κξννεκς νΰ 127.0.0.1:1215 # <-------This is bypass Ρξηδΰνξ νξβξε ρξεδθνενθε - 1[/glow] ## Ρξεδθνενθε 0 πΰηξπβΰνξ Οεπευβΰχεν κξννεκς νΰ [glow=red,2,300]195.70.35.147:3724[/glow]<------WoW port Ρξηδΰνξ νξβξε ρξεδθνενθε - 0 Ρξεδθνενθε 0 πΰηξπβΰνξ Οεπευβΰχεν κξννεκς νΰ [glow=red,2,300]195.70.35.147:3724[/glow]<------WoW port Ρξηδΰνξ νξβξε ρξεδθνενθε - 0 im sure 100% its ur problem and i think u mustn add gameguards or uknown formats for program [glow=red,2,300]BECOUSE PROGRAM CANT INJECT IN THIS TYPES[/glow]
-
opote ctcp client to client opote stelnis apo to client tou alou giati exis kani rm apo to client sou sto client tou alou einai as poume san remote help afti i edoli afou gia na litourgisi prepi na tin stili o alos se esena oso gia to keyloger sou kado ena upload k stilto na to do
-
back-track 3 k ubuntu
-
so the program cant sniff packets and u need one version with port selection mmm its not to easy to view clear the source of the program maybe u can take 50% of the program source u must have good decompiler and maybe view 90% of the source to work this program on this ports winsock must modyfied and need to add some strings of code
-
patched hah not all servers have patched, maybe 10 or 20 servers i have check all wow sites and the most servers got the same vuln
-
to brute force einai brute force kai apla kanis connect ston server kai to programa se logari me ta onomata p exis dosi i ta gramata k kani diko tou generate meso ton gramaton arithmon etc mexri na kani success login an kseris k to ID safos ine pio efkola an k den nomizo na pezi rolo to chronicle
