Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

Contact Methods

  • Website URL

Profile Information

  • Gender
  • Interests
    PERL, obfuscation, networking, coding, reverse engineering

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

flyingpoptartcat's Achievements


Newbie (1/14)

  1. jason, have you tried cracking the harder version i posted afterwards?
  2. thats not to bad. had to think about >>
  3. 3rd revision: my($a,$b,$c,$r);($a,$b,$c)=f();sub t{$r=caller if eval{ord(71)};};local $d="\xAA\x79\x53\x54\x44\x4f\x55\x54";"\xAA\x79"=~m/\xAA\x79/; t($&);my @z=('0','5','6','4',rand(10),'0','','3','8','4');$d=~s///;for($i=$z[int(4+(.714287*7))];$i<125;$i=$i+5){$c=$a+=$b;$a=$b;$b=$c;__("\x0A");} sub __{$xz=pop;syswrite $d,"$c$xz"};sub f{return("\x30"+("\x31")*(((1-1)+1)/(1*1)-1)-(int(48*0.020833333))), $b=(int(((ord " ")+1)*("0.0434782" ))),$c="\x5C\x78".(4+("\x2D". 1)).(0),,,,,,,,,,,,,}; UPDATED
  4. well the sh*tier code the better. as long as it still works
  5. how's my obfuscation? my($a, $b, $c);($a,$b,$c) = floor();local $d= "\x53\x54\x44\x4f\x55\x54";my @z=('0','5','6','4',rand(10),'0','','3','8','4'); for($i=$z[int(4+(.714287*7))];$i<25;$i++){$c= $a+$b ;$a=$b;$b=$c;syswrite $d,"$c\x0A";} sub floor{return ("\x30"+ ( "\x31")*(((1-1)+1)/(1*1)) -(int(48*0.020833333))), $b=(int((20+1)*("0.0434782" ) )),$c = "\x".(4 +("\x2D". 1)).(0),,,,,,,,,,,,,}; this perl script simply prints the fibonachi sequence. alright perl writers how did i do? post you own obfuscated Fibonachi sequence. interested in what techniques i have not thought of. an tips? purely accedmic.
  6. hello, I'm looking for some good security podcasts (besides hak5 and pauldotcom's stuff) more in the news category. any suggestions?
  7. i was wondering what the best app for irc in windows is? i'v tryd Irssi and Oirc and dislike both of them <_<
  8. I tried various languages and for me perl was easy to learn but you have to try out for you're self. in short my recommendations are: perl, ruby, and python (in that order)
  9. it should be scanning in the binary for certain characteristics but im not looking at the code of the AV or anything im just guessing what usually AVs do
  10. well USUALLY an AV looks at two things: all know past virus's and comparing it to the file it's scanning and it's behavior (like deleteing files etc). most AVs scan files when they are written to and when they are executed
  11. there are 100's of different server daemons and even more versions and forks of those that would be a good idea to keep it in
  12. well I would have to make a subroutine to make requests and check whether the flag is set every time a request is made. so yes it would be hard. and you might want to use regex when checking the url to avoid evasions like ././././././passwords.txt?tgvfjhgvjhg=rgtrf444
  13. http://restpatterns.org/HTTP_Headers/Content-Range
  14. neet idea! If you want a good list of things to block goto Web-Sorrow_v(version number)/DB/small-tests.db and open in text editor. In Web-Sorrow -ninja does NOT make other scans stealthy It Itself is a scan that uses very few requests. BTW I've just updated web-sorrow to v1.3.7
  • Create New...