Hi, I found a facebook vulnerability from a Turk guy.. the vulnerability is that if you use a domain level other than www.facebook.com (Example x.facebook.com) the information for the password reminder page is handled otherwise and one could TAMPER THE EMAIL AUTH DATA to send the confirmation email to the attackers emails and this link-page doesn't check for previous passwords so one could change the password and log in without any further due.
But the attacker must know the victims email address and the worst of all is that they have updated this function since new year so that the handlers maybe? check the token packets twice, I need some help more people = more changes to crack something, they changed the GET function from what I understand and they changed the confirmation script url to hex code?..
This vulnerability isn't popular at all .. so I'm thinking that they didn't mind to sanitize the code enough to prevend further exploits.
Have home computer that networked got hacked , i did command window and netstat and then it stated the printer printing ,camera with mic he heard me, callin' me names. i was all like :i will just reformat my Pc no Biggy" ,he all "i have you public ip and Iam on VPN and plus ill put a worm on all you pc's". So i just unplug my pc . Help how do I stop him from F'ing with me and hack him back big time I feel violated. Help videos,links,softwate something A.S.A.P
Greetings SoldierX! I have read about the douchebag known as BenOwns who scammed you. He also scammed me on a Blizzard time card. I was able to dig up a great deal of information about him. You guys should have a contest to reward whoever hacks all of his accounts. Here is what I have so far:
Address:
7197 Cimarron CT
UNIT A
Frederick, MD 21703
Mobile Phones:
254-669-2106
910-286-9208
AIM Name:
benownsuthx
Websites:
http://www.blazingfire.com
Emails:
[email protected]
[email protected]
Facebook:
http://www.facebook.com/benowns
http://www.facebook.com/shannonjwooten
I have been performing a series of DoS attacks against government websites and have found out some pretty interesting facts. The DIA (Defense Intelligence Agency), CSS (Central Security Service), and the NSA (National Security Agency)'s websites are now immune to 'pings', (getting a sites basic statistics). But the FBI, and CIA's aren't. This means that the DIA, CSS, and the NSA are all hiding something. Don't believe me? Test for yourself. In Windows open up Command Prompt and type "ping nsa.gov", and "ping cia.gov", see the difference? Or in Linux or OS X do the same in Terminal. Or if you don't really feel like it. Feel free to look over mine..."Matts-Mac:~ g4$ Central Intelligence Agency
-bash: Central: command not found
Matts-Mac:~ g4$ ping cia.gov
PING cia.gov (198.81.129.107): 56 data bytes
64 bytes from 198.81.129.107: icmp_seq=0 ttl=113 time=53.809 ms
64 bytes from 198.81.129.107: icmp_seq=1 ttl=113 time=52.117 ms
Saw this posted on the Hack3r.com Forums and though I'd link through to it as it's quite an interesting learning tool in regards to understanding how the different types of SQL injections can work.
http://projects.jason-rush.com/interactive-visuals/mysql.php
_-LEX-_
Hello guys...
Am new around here and i was wondering if someone could tell me a few good books about hacking...THANKS !!!
################################################################################
University of Maine - Portland
################################################################################
In 2008 endgrain discovered devices connected to the network at the University
of Maine (Portland) were automatically connected directly to the internet.
Every machine is exposed directly to the internet using a semi-static IP address
with the user's full name in its associated DNS record.
Endgrain presented his findings at DEFCON 17 in 2009.
It remains unchanged in 2011.
\0
can anyone pls help me how to hack the server of our institution, the I.T personnel blocks the websites for our past time, like facebook, youtube and others, can someone pls post the step by step process in unblocking the "opendns". thanks a lot in advance