Jump to content

flyingpoptartcat

Active Members
  • Posts

    49
  • Joined

  • Last visited

Everything posted by flyingpoptartcat

  1. jason, have you tried cracking the harder version i posted afterwards?
  2. thats not to bad. had to think about >>
  3. 3rd revision: my($a,$b,$c,$r);($a,$b,$c)=f();sub t{$r=caller if eval{ord(71)};};local $d="\xAA\x79\x53\x54\x44\x4f\x55\x54";"\xAA\x79"=~m/\xAA\x79/; t($&);my @z=('0','5','6','4',rand(10),'0','','3','8','4');$d=~s///;for($i=$z[int(4+(.714287*7))];$i<125;$i=$i+5){$c=$a+=$b;$a=$b;$b=$c;__("\x0A");} sub __{$xz=pop;syswrite $d,"$c$xz"};sub f{return("\x30"+("\x31")*(((1-1)+1)/(1*1)-1)-(int(48*0.020833333))), $b=(int(((ord " ")+1)*("0.0434782" ))),$c="\x5C\x78".(4+("\x2D". 1)).(0),,,,,,,,,,,,,}; UPDATED
  4. well the sh*tier code the better. as long as it still works
  5. how's my obfuscation? my($a, $b, $c);($a,$b,$c) = floor();local $d= "\x53\x54\x44\x4f\x55\x54";my @z=('0','5','6','4',rand(10),'0','','3','8','4'); for($i=$z[int(4+(.714287*7))];$i<25;$i++){$c= $a+$b ;$a=$b;$b=$c;syswrite $d,"$c\x0A";} sub floor{return ("\x30"+ ( "\x31")*(((1-1)+1)/(1*1)) -(int(48*0.020833333))), $b=(int((20+1)*("0.0434782" ) )),$c = "\x".(4 +("\x2D". 1)).(0),,,,,,,,,,,,,}; this perl script simply prints the fibonachi sequence. alright perl writers how did i do? post you own obfuscated Fibonachi sequence. interested in what techniques i have not thought of. an tips? purely accedmic.
  6. hello, I'm looking for some good security podcasts (besides hak5 and pauldotcom's stuff) more in the news category. any suggestions?
  7. i was wondering what the best app for irc in windows is? i'v tryd Irssi and Oirc and dislike both of them <_<
  8. I tried various languages and for me perl was easy to learn but you have to try out for you're self. in short my recommendations are: perl, ruby, and python (in that order)
  9. it should be scanning in the binary for certain characteristics but im not looking at the code of the AV or anything im just guessing what usually AVs do
  10. well USUALLY an AV looks at two things: all know past virus's and comparing it to the file it's scanning and it's behavior (like deleteing files etc). most AVs scan files when they are written to and when they are executed
  11. there are 100's of different server daemons and even more versions and forks of those that would be a good idea to keep it in
  12. well I would have to make a subroutine to make requests and check whether the flag is set every time a request is made. so yes it would be hard. and you might want to use regex when checking the url to avoid evasions like ././././././passwords.txt?tgvfjhgvjhg=rgtrf444
  13. http://restpatterns.org/HTTP_Headers/Content-Range
  14. neet idea! If you want a good list of things to block goto Web-Sorrow_v(version number)/DB/small-tests.db and open in text editor. In Web-Sorrow -ninja does NOT make other scans stealthy It Itself is a scan that uses very few requests. BTW I've just updated web-sorrow to v1.3.7
  15. Well thank you. btw custom 404 pages are always fun to see
  16. If you want to use stealth try -ninja Also Web-Sorrow uses Connection caching aka all on one socket. Don't forget to update I posted this thread awhile ago
  17. webmail.hulu.com bing.com/Version.aspx AND www.google.com/hostednews/sitemap_index.xml I don't even know what the second one does
  18. when your stetting the LHOST param is it supposed to be you external IP or you internal IP? like 256.231.9.7 or 192.168.1.101 (I intentionally made the first on impossible)
  19. this guy asks for our help and never comes back??? WTF man
  20. btw you should update your nmap version!
  21. hmmm yes i agree with mr-protocall just try some different things in different combinations, you know explore! i find -sN and -f useful tho
×
×
  • Create New...