remkow
-
Posts
205 -
Joined
-
Last visited
Posts posted by remkow
-
-
lol i forgot about it :oops:
i'm very busy with school and such, but when i have the time i will edit it
-
wow, 141 views and 0 replies... leech FTW!!
-
This would be very useful, because then you cane easily use AV detected files, since the AV won't delete them... I have no idea how to do it, but I am very interested
-
You also have to enable `view system files and folders` in order to view the files. You can then just edit the go.cmd and see there is nothing scary going on. I think I will add a progress thingie along with it, like you said, which shows what task it is performing, and which are done.. stay tuned :D
-
I guess it's just hard to come up with new ideas, especially when you don't have a lot of experience with it yet. Also, when people have new ideas or features, it doesn't mean that they also want to share it, because it's either too powerful, or some other reason. (TZ: you got my payload and you know it's don't really want to give it out to public either. )
-
Also, if you don't change backgrounds that much you can just photoshop the two you want together.
lol that's what I said...
-
I only have one monitor, so I have no idea how that could be done. However, what do you think of just pasting two backgrounds next to each other in paint, and save them as one picture?
-
Have you disabled firewalls??
-
for ff, just use firepassword, or copy the key3.db and signons.txt from your profile folder, and crack them at home. Not sure about the other browsers, because I don't use them.
-
lol, I forgot I made this topic :P
I do have to say that the installation doesn't occur correctly without the services.exe, not sure what the reason is though
-
afaik it's a gui program, so it would be very hard (i never say impossible ;) ) to implement this in the switchblade, and have it save all passwords automatically and hidden.
-
It can also be used as a XSS for cookie stealing...
The exploit is publically available btw, this is the code used for exploiting the vuln:
http://host/filename.pdf#{some text}=javascript:{code}
(got this from milw0rm)
-
The best ones are the ones made by yourself, because the AV vendors won't have any idea on how it works. Maybe try getting a private one somewhere, or use multiple packers on the same file.
-
So you just want a regular, but undetected keylogger?
-
You can also give the file another name, like explorer2.exe, and then change that in the registry (not sure where it was anymore), so you wont have to disable the windows file protection.
Also, maybe you can add some more info on how to edit the explorer.exe file, for those who never did it before.
For the rest, it's really nice, I'm gonna include something like this in my payload :D
-
Add me on msn and I'll try to help ya out:
rwwrulez (AT) gmail (DOT) com
-
You also have to enable the viewing of system files, not only hidden files.
-
The name of the technology used is steganography, and there are loads of tools available which do this.. Google is your friend
-
even though it's not a real virus or anything
yea, that's what I said.. It just deletes some files
-
That doesn't mean it's impossible, even though it's not a real virus or anything
-
LM hashes become two separate 7 char hashes. The tables available crack any LM hash which has 1-7 chars, so it will crack any LM hash there is.
-
-
Well, trust me, I'm not that kinda guy :P
Maybe add me on MSN and have a nice convo, so u can get to know me better..
-
I'd like to help too, if I can.. really interested
My whitehat U3 payload
in USB Hacks
Posted
Do you mean the vbe on the autorun partition??
Maybe you have disabled the Windows Script Host, so it won't run vbs/vbe files?