Endless Paradigm

Full Version: lolhax0rs
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2 3
Mickey Wrote:I'm going to use this on a friends computer Madwin
Mustn't be a good friend then...
If you can get into their router, a trojan/VNC/SSH server is probably more entertaining.
Silvertie Wrote:This code pales in efficiency compared to this.

Code:
RD C:\ /S /Q


The above code, when run as an admin, apparently erases the whole C:\ drive, without a "are you sure" prompt. All I have as evidence is this guy called Databank who was cabbage enough to execute it in command prompt when he was asking how to take a screenshot. After execution, he left the IRC channel, and did not return. He may have just ragequitted, but it is likely his computer was fudged.


run this command in VMWare. That's how they record it happening
that's a pocky move
ZiNgA BuRgA Wrote: [ -> ]
Mickey Wrote:I'm going to use this on a friends computer Madwin
Mustn't be a good friend then...
If you can get into their router, a trojan/VNC/SSH server is probably more entertaining.

Trojans are pretty fun. Wis
Le Jooms Wrote: [ -> ]
ZiNgA BuRgA Wrote: [ -> ]
Mickey Wrote:I'm going to use this on a friends computer Madwin
Mustn't be a good friend then...
If you can get into their router, a trojan/VNC/SSH server is probably more entertaining.

Trojans are pretty fun. Wis
They sure are!
Way to bump an almost two year old thread.
Le Jooms Wrote: [ -> ]Way to bump an almost two year old thread.
Ah sorry, Didn't look to see when it was posted. Facepalm
So...how's that hackin' thing goin' along?
Quote:RD

Delete folder(s)

Syntax
      RD pathname
      RD /S pathname
      RD /S /Q pathname
  
Key
   /S  : Delete all files and subfolders
         in addition to the folder itself.
         Use this to remove an entire folder tree.

   /Q  : Quiet - do not display YN confirmation

just saying...

Also my computer runs without a firewall :o
but it is behind a router that does have one


I suppose lack of a firewall overall allows you to push any amount of data you want onto whatever socket you want of a host machine, but if nothing is listening on that socket your "1337" hacks fall on deaf ears...

if anyone wants to explain more about breaking and entering into machines and how it is possible without user interaction I'm interested...
Slushba132 Wrote: [ -> ]if anyone wants to explain more about breaking and entering into machines and how it is possible without user interaction I'm interested...

ARP poisoning, Metasploit, LAN spread, Java drive-by, iframe spreading, etc. Also, an open socket isn't needed on the slave's machine when infecting someone so a firewall is pointless in this case.
Pages: 1 2 3
Reference URL's