Post Reply 
lolhax0rs
Author Message
ZiNgA BuRgA
Smart Alternative

Posts: 17,023.4213
Threads: 1,174
Joined: 19th Jan 2007
Reputation: -1.71391
E-Pigs: 446.0333
Offline
Post: #21
RE: lolhax0rs
Mickey Wrote:I'm going to use this on a friends computer Madwin
Mustn't be a good friend then...
If you can get into their router, a trojan/VNC/SSH server is probably more entertaining.
25/02/2010 08:04 PM
Visit this user's website Find all posts by this user Quote this message in a reply
ProperBritish
Daddy Proper
Team DreamArts

Posts: 5,666.3250
Threads: 192
Joined: 19th Nov 2008
Reputation: -2.36574
E-Pigs: 147.7035
Offline
Post: #22
RE: lolhax0rs
Silvertie Wrote:This code pales in efficiency compared to this.

Code:
RD C:\ /S /Q


The above code, when run as an admin, apparently erases the whole C:\ drive, without a "are you sure" prompt. All I have as evidence is this guy called Databank who was cabbage enough to execute it in command prompt when he was asking how to take a screenshot. After execution, he left the IRC channel, and did not return. He may have just ragequitted, but it is likely his computer was fudged.


run this command in VMWare. That's how they record it happening

[Image: rsz_contrast.png]

Spoiler for More sigs:
[Image: 6xu74t8]
[Image: sig.php]

[Image: 656embk]
[Image: sig.png]
26/02/2010 02:16 AM
Find all posts by this user Quote this message in a reply
doug
Able One

Posts: 84.3419
Threads: 1
Joined: 6th Jan 2010
Reputation: 3.41035
E-Pigs: 2.8342
Offline
Post: #23
RE: lolhax0rs
that's a pocky move
04/08/2010 03:48 AM
Find all posts by this user Quote this message in a reply
Joom
WOOP
Worlds End

Posts: 4,206.7320
Threads: 417
Joined: 20th Mar 2009
Reputation: 5.41709
E-Pigs: 134.1772
Offline
Post: #24
RE: lolhax0rs
(25/02/2010 08:04 PM)ZiNgA BuRgA Wrote:  
Mickey Wrote:I'm going to use this on a friends computer Madwin
Mustn't be a good friend then...
If you can get into their router, a trojan/VNC/SSH server is probably more entertaining.

Trojans are pretty fun. Wis
04/08/2010 04:46 AM
Find all posts by this user Quote this message in a reply
Aesic
Neophitic Presence

Posts: 5.2259
Threads: 0
Joined: 26th Jul 2012
Reputation: 0
E-Pigs: 0.6398
Offline
Post: #25
RE: lolhax0rs
(04/08/2010 04:46 AM)Joom Wrote:  
(25/02/2010 08:04 PM)ZiNgA BuRgA Wrote:  
Mickey Wrote:I'm going to use this on a friends computer Madwin
Mustn't be a good friend then...
If you can get into their router, a trojan/VNC/SSH server is probably more entertaining.

Trojans are pretty fun. Wis
They sure are!
26/07/2012 02:40 PM
Find all posts by this user Quote this message in a reply
Joom
WOOP
Worlds End

Posts: 4,206.7320
Threads: 417
Joined: 20th Mar 2009
Reputation: 5.41709
E-Pigs: 134.1772
Offline
Post: #26
RE: lolhax0rs
Way to bump an almost two year old thread.

[Image: ROVBdMh.png]
3DS Friend Code: 5000-6045-4964
26/07/2012 04:04 PM
Find all posts by this user Quote this message in a reply
Aesic
Neophitic Presence

Posts: 5.2259
Threads: 0
Joined: 26th Jul 2012
Reputation: 0
E-Pigs: 0.6398
Offline
Post: #27
RE: lolhax0rs
(26/07/2012 04:04 PM)Joom Wrote:  Way to bump an almost two year old thread.
Ah sorry, Didn't look to see when it was posted. Facepalm
26/07/2012 04:11 PM
Find all posts by this user Quote this message in a reply
whjms
EpiCanadian

Posts: 435.1825
Threads: 126
Joined: 23rd Dec 2008
Reputation: 3.37413
E-Pigs: 24.8045
Offline
Post: #28
RE: lolhax0rs
So...how's that hackin' thing goin' along?
26/07/2012 05:11 PM
Find all posts by this user Quote this message in a reply
Slushba132
BustyLoli-Chan

Posts: 3,125.3993
Threads: 508
Joined: 20th Feb 2008
Reputation: -8.27558
E-Pigs: 73.1299
Offline
Post: #29
RE: lolhax0rs
Quote:RD

Delete folder(s)

Syntax
      RD pathname
      RD /S pathname
      RD /S /Q pathname
  
Key
   /S  : Delete all files and subfolders
         in addition to the folder itself.
         Use this to remove an entire folder tree.

   /Q  : Quiet - do not display YN confirmation

just saying...

Also my computer runs without a firewall :o
but it is behind a router that does have one


I suppose lack of a firewall overall allows you to push any amount of data you want onto whatever socket you want of a host machine, but if nothing is listening on that socket your "1337" hacks fall on deaf ears...

if anyone wants to explain more about breaking and entering into machines and how it is possible without user interaction I'm interested...

27/07/2012 02:32 PM
Visit this user's website Find all posts by this user Quote this message in a reply
Joom
WOOP
Worlds End

Posts: 4,206.7320
Threads: 417
Joined: 20th Mar 2009
Reputation: 5.41709
E-Pigs: 134.1772
Offline
Post: #30
RE: lolhax0rs
(27/07/2012 02:32 PM)Slushba132 Wrote:  if anyone wants to explain more about breaking and entering into machines and how it is possible without user interaction I'm interested...

ARP poisoning, Metasploit, LAN spread, Java drive-by, iframe spreading, etc. Also, an open socket isn't needed on the slave's machine when infecting someone so a firewall is pointless in this case.

[Image: ROVBdMh.png]
3DS Friend Code: 5000-6045-4964
(This post was last modified: 27/07/2012 04:07 PM by Joom.)
27/07/2012 04:04 PM
Find all posts by this user Quote this message in a reply
Post Reply 


Forum Jump:


User(s) browsing this thread:

 Quick Theme: