#if

CatHack Issue 5

eZine's profile picture
Published in 
 · 2 days ago
... nclude <fcntl.h> #include <unistd.h> #include <stdlib.h> #include <string.h> #include <ctype.h> #include <time.h> #ifdef LINUX #define __FAVOR_BSD /* should be __FAVOUR_BSD ;) */ #ifndef _USE_BSD #define _USE_BSD #endif #endif #include <netinet/ip.h> #include <netinet/ip_icmp.h> #include <netinet/udp.h> #ifdef LINUX #define FIX(n) htons(n) #else #define FIX(n) (n) #endif struct smurf_t { struct sockaddr_in sin; /* socket prot structure */ int s; /* socket */ int udp, icmp; /* icmp, udp booleans */ int rnd; /* Random dst port boolean */ int p ...

JJF Hackers Team Journal 6

eZine's profile picture
Published in 
 · 1 week ago
... ffer, 5); SIO_WaitForData(si, 1000); i = SIO_ReadBuffer(si, buffer, 32); memcpy(response, buffer + 1, 12); } void set_timeout(int t) { timeout = t; } #ifdef 0 int main(int argc, char** argv) { Byte challenge[16] = { 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00}; Byte pin[8] = { 0x35, 0x35, 0x35, 0x35, 0xff, 0xff, 0xff, 0xff }; Byte response[12]; init_card("/dev/ttyS1", pin); get_response(challenge, response); } #endif ------------ FIN ------------------------------------------------------------- File : getresponse.h ------------ Codigo Fuente ---------------------------------------------- ...

JJF Hackers Team Journal 5

eZine's profile picture
Published in 
 · 1 week ago
... de gran tamaño. icmp.patch static void icmp_echo(struct icmphdr *icmph, struct sk_buff *skb, struct device *dev, __u32 saddr, __u32 daddr, int len) { #ifndef CONFIG_IP_IGNORE_ECHO_REQUESTS struct icmp_bxm icmp_param; if (len <= 1000) { /* solo contestamos a los ping que lleven menos de 1k de datos */ icmp_param.icmph=*icmph; icmp_param.icmph.type=ICMP_ECHOREPLY; icmp_param.data_ptr=(icmph+1); icmp_param.data_len=len; if (ip_options_echo(&icmp_param.replyopts, NULL, daddr, saddr, skb)==0) icmp_build_xmit(&icmp_param, daddr, saddr, skb->ip_hdr->tos); printk(KERN_INFO "ICMP: pinged by %s, packetsize = %d \n", in_ntoa(saddr) ...

Analog.5 Issue 0

eZine's profile picture
Published in 
 · 1 week ago
... noted with # and user prompts with a $). Now that that is out of the way lets start gathering information. First lets find out our IP on this network #ifconfig This will show us a lot of information, right now what we are interested in is the label for "inet addr:" probably under eth0, or whatever NIC you are currently using to connect to the network. Note this address, it will be quite useful. Most likely it will be in one of the following ranges. 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 192.168.0.0 - 192.168.255.255 For the sake of this example we will assume your IP is 192.168.0.103, with a subnet mask of 255.255.255.0. Lets star ...

Phrack Inc. Volume 16 Issue 71 File 03

eZine's profile picture
Published in 
 · 1 week ago
... me someone wants to download an EXE file. Even if I could dynamically generate new source file each time, I have simplified my approach with a set of #ifdef, making different (randomly picked) parts of the source to be included in the build process. The compiler allowed me to set appropriate #define before I start the compilation, but when it comes to the randomization of code, it can be done with pure preprocessor directives as well [2] if anyone prefers it. Of course, randomized parts cannot change the application behavior and their execution should not matter. After analyzing different functions to be randomly imported I found SNMP and Bcrypt ...

Phrack Inc. Volume 16 Issue 70 File 11

eZine's profile picture
Published in 
 · 1 week ago
... #0 r335510 host: --- bhyverun.c.orig +++ bhyverun.c @@ -1019,8 +1019,7 @@ assert(error == 0); } - if (lpc_bootrom()) - fwctl_init(); + fwctl_init(); #ifndef WITHOUT_CAPSICUM bhyve_caph_cache_catpages(); Rest of this section will detail about the memory layout and techniques to convert the out-of-bound write to a full process r/w. ----[ 7.1 - Analysis of memory layout in the bss segment Unlike the heap, the memory adjacent to 'fget_str' has a deterministic layout since it is allocated in the .bss segment. Moreover, FreeBSD does not have ASLR or PIE, which helps in the exploitation of the bug. Following memory layout was observed in the test ...

2x16: Extract

eZine's profile picture
Published in 
 · 1 month ago
... _SIZE strlen(END_TAG) #define SPLIT_TAG "-[ 2x" #define SPLIT_SIZE strlen(SPLIT_TAG) struct f_name { unsigned char name[256]; struct f_name *next; }; #ifdef __alpha typedef unsigned int uint32; #else typedef unsigned long uint32; #endif struct MD5Context { uint32 buf[4]; uint32 bits[2]; unsigned char in[64]; }; void MD5Init(struct MD5Context *context); void MD5Update(struct MD5Context *context, unsigned char const *buf, unsigned len); void MD5Final(unsigned char digest[16], struct MD5Context *context); void MD5Transform(uint32 buf[4], uint32 const in[16]); typedef struct MD5Context MD5_CTX; #ifndef HIGHFIRST #define byteReverse(buf, len) #else v ...

SEXTANT nummer 7

eZine's profile picture
Published in 
 · 7 months ago
... var tokiga. Också denna gång en LoC-spalt, dock inte lika stor som förra numret. Rolf Strömgren <rolf-str@privat.utfors.se> skickade följande: #ifdef=läsaren_är_ej_Ahrvid_Engholm Sextant är en inåtriktad, hemlig och /så vidare... Klippetiklipp./ Rätt kul, om än kanske aningen styggt. :-) Det mesta har nog sagts redan i den här debatten. Det har varit både intressant och lärorikt. Jag ska nöja mig med den lilla reflektionen att man nog kan säga om båda lägren i diskussionen att 'visst, det kan vara så, men det behöver inte alltid vara så'. Kanske en jämförelse mellan The Magazine of Fantasy & Science Fiction och Isaac A ...

SEXTANT nummer 6

eZine's profile picture
Published in 
 · 7 months ago
... ftersom Rickard har startat en liten skrivgrupp på Internet där inte Ahrvid får vara med. Eva Norman bidrar med en presentation av romans-fandom. *** #ifdef=läsaren_är_ej_Ahrvid_Engholm Sextant är en inåtriktad, hemlig och sluten APA som styrs enväldigt av diktatorn Karl-Johan Norén, som egentligen är en svampliknande organism från Alfa Centauri, hitsänd för att infiltrera och överta sverifandom, fandom och sedan jorden. Metoderna härstammar bland annat från organisationen Gurka, som av vissa numera anses vara ytterst fånig och barnslig, men som givet sina förutsättningar var ytterst framgångsrik. Metoden som Sextant använder i infiltrationen oc ...

Hackers 4 Hackers #0D

eZine's profile picture
Published in 
 · 8 months ago
... oorbeeld module gaan bekijken. Deze heb ik gehaald uit het artikel van plaguez. #define MODULE #define __KERNEL__ #include <linux/config.h> #ifdef MODULE #include <linux/module.h> #include <linux/version.h> #else #define MOD_INC_USE_COUNT #define MOD_DEC_USE_COUNT #endif #include <linux/types.h> #include <linux/fs.h> #include <linux/mm.h> #include <linux/errno.h> #include <asm/segment.h> #include <sys/syscall.h> #include <unistd.h> #include <linux/unistd.h> int errno; /* Hier wordt een pointer gedefineerd die naar de oude setreuid */ ...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT