Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Messages - Tsar

Pages: [1] 2 3 ... 5
General discussion / Re: Megaupload is back , or is it?
« on: January 21, 2012, 05:57:29 pm »
How much time is left until they will take down Rapidshare , Mediafire , fileflyer , Zippy
and much more?

Megaupload wasn't taken down because they "had illegal content on their servers", but rather because:
1. Some of their servers were hosting in the US and other places where DMCA take down notices must be compliant with
2. Upon receiving DMCA take down requests, staff would only delete the link to the content, instead of the actual content hosted on their servers
3. At one point they were paying people to upload illegal content to Mega Upload
4. The owners themselves were knowingly using the site to download illegal content (Which on their knowledge should of been removed by them)
EDIT: Almost forgot 5. At one point they downloaded(stole) and stored about 30% of youtube user's content on their servers.

Assuming sites like rapidshare aren't ran by dumb shady people they will continue to stay online.

SOPA\ACTA\PIPA states that every file which has any legal copyrights and you as a user which is not part of the file(lets say its a movie , you had nothing to do with it)
its a crime.
That isn't even a sentence...

General discussion / Re: Exactly what is hacking?
« on: December 30, 2011, 08:00:50 am »
1. Hacking is simply using something in a way that it was not originally intended for. Today the term is bastardized however and is often used to describe the act of breaking into computer systems.

2. The process is a mixture of both security and computer knowledge. The rest is just using this knowledge to think analytically.

3. Ande summed it up good, but ill recant; it is programming that creates software, it is programming that makes software insecure or secure, by understanding programming, you will understand computer security. It is much like becoming an expert on locks; a locksmith with a strong understanding of how locks work and the different types and systems locks use, is more likely to be able to analyze a lock and open or break into a lock that is insecure than a regular every day person would.

Most movies are far from the real deal indeed.
On a side note: I recently watched "The Girl With The Dragon Tattoo" and hacking is portrayed pretty well, I didn't see anything that was unrealistic and as someone in computer security I think I picked up on a lot of the stuff they were doing in the film that they didn't explain that others would not have.

General discussion / Re: TuneUp Media There a Crack?
« on: December 27, 2011, 12:16:57 am »
Try Data Drow, it's free.

Looks cool, I'm going check this out.

Hacking and Security / Re: Hard cracking program
« on: December 22, 2011, 05:38:20 am »
I will give it a try hoping that i will make something.


I found Safe Engine Protector v2.1.3.0 There arer some info about it. Safengine Protector provides a powerful virtual machine to protect your applications against reverse engineering or unwanted modifications. During the virtualization process, your original code flow will be redirected with logical obfuscation, there will be no more than a NAND operation in the virtual machine to emulate logical operations such as AND, OR, NOT and XOR, while most arithmetical operations will be implemented via ADD so that it is very hard for a reverse engineer to tell how the original code works. Also, there will be no “conditional jump” instructions after virtualization, which makes crackers have no place to manipulate the execution flow.

EDIT 2.0:

First time i see this ****. At least its a good reason that i have a hard time.

Sounds like it will be pretty hard to do, but not impossible. Good research though. I would search more on how to crack Safengine Protector, I wasn't able to find much on it.

Here are some threads of people cracking similar products by the same company

The people on tuts4you might have better answers for us about reversing Safengine Protector.

Hacking and Security / Re: Hard cracking program
« on: December 21, 2011, 11:51:56 pm »
People aren't going to go through the process of decompiling it because they are too lazy and don't care about cracking this. So if you want help you will have to meet us half way.

My suggestion is to decompile the main exe only, cause that is probably where you will have to crack. If you want us to see it I suggest posting the assembly here using a service like PasteBin.

Lastly this is how I would go about cracking it:

In order to crack this program, you are going to need to understand how its verification process is working
1. See if it connects to the internet when ran, if it does it is most likely because its being authenticated with a server somewhere
2. It says on the site it will work the first 24 hrs as a trial, look for a way to make it so this 24hrs never runs out, it may even store the time left on a file somewhere in your system.
3. If it is using a server to authenticate each time, try replacing this authentication/server connection and hardcoding in a way so it automatically lets you in or skips authentication.

Hacking and Security / Re: Hard cracking program
« on: December 21, 2011, 11:26:23 pm »
program is called pgrind. all i need is a registration key. I know that is checked when i start it and there are not any string references. Also i try to find  GetserialdriveA API call to change the values but i cant find it. You can freely sk me for any details you need. Its first time i write about these things and my vocabulary is not very well.

Does the key get registered or checked by some kind of server externally ever?

Also post the assembly code perhaps? People can only direct you based on how much information you give, so far you have given very little

Hacking and Security / Re: What keeps you up to date?
« on: December 21, 2011, 08:16:38 pm »

Usually some good posts in there

C - C++ / Re: [C Tutorial] Recursion
« on: December 20, 2011, 12:20:53 am »
Yours is a tail recursion.

It is, but it doesn't really show the principle of it. It is a bad example to demonstrate both linear and tail recursion, because it doesn't return.

Java / Re: Phone number phaker
« on: December 17, 2011, 08:52:04 pm »
Looks like you are basically just generating a number?

Anonymity and Privacy / Re: metaspolit anonymous
« on: December 12, 2011, 12:03:55 am »
This should really be in the "Anonymity" section, not general discussion.

First. There is no way to be 100% anonymous.

The golden rule is simply to be harder to find than those who are looking for you are willing to endure.

Therefore, if you hack someones runescape account, chances are no one gives a shit. If you hack into a government, you better be pretty damn hidden.

The best way is by chaining a different types of proxies, services, and removing any other personal identifying information.

The most often used types of proxies are HTTP, SOCK4, SOCK5. You can look up the differences yourself. It is best to use private proxies ,especially ones where you know your actions aren't being logged.

There are also VPN's which you can connect through. You can look that up as well.

Another method is by using a public network. Drive into a nice neighborhood with your laptop and find a unsecured wireless network, connect from there.

Lastly some people say TOR is a good program, others disagree, at any rate if you are doing something simple it will probably do the job, you can google that as well.

Some final protips: Disable Javascript, Flash, etc and anything else that might leave fingerprints on a broken into system.

The best way to stay anonymous is to combine a lot of these methods. I would connect to a VPN and through a proxy from there personally. Also like it said it depends on what you are doing, always think about the possible consequences before doing something.

Basically I think as long as your entire is computer is using these methods to connect somewhere, it will work for metasploit as well.

Anonymity and Privacy / Re: Trick OS webscanners
« on: December 11, 2011, 01:27:44 am »
As I_Learning_I says its completely situational, so chances are you won't even need to take it this far, but I will add if you want to spoof as a different OS and not worry about packet fragmentation (I'm not sure how big of a problem that actually is...) you could always use a VM running the OS of your choice and browse from inside. But that would be a more extreme route if you we're truly concerned about web OS scanners (but as I_Learning_I said, there are more important things to worry about..)

Found it on the Webs / Re: FreeArc
« on: December 10, 2011, 12:35:01 am »
Good find, I wonder how it compares with 7zip on speed though.

Also you might be able to change the GTK theme for the program, I know pidgin uses GTK+ and you can change the interface pretty easily

Scripting Languages / Re: Text via Gmail
« on: December 06, 2011, 02:34:13 am »
Cool code, it works (Tested myself but only with 1 email)

General discussion / Re: Any evilzone bodybuilders?
« on: December 05, 2011, 09:19:37 pm »
My goal is to gain ~4-5 pounds of muscle in 6-8 weeks (if possible).

Gains in strength for the first 8 weeks are generally attributed to neural factors, after that strength gains are generally attributed to increases in muscle mass. What this means is it is really fucking hard to gain 4 pounds of muscle in 6-8 weeks if you are detrained.
I suggest following these guidelines.

.NET Framework / Re: Random ScreenSaver
« on: December 05, 2011, 01:45:41 am »

Pages: [1] 2 3 ... 5

Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.