#include #include #include #include #pragma comment(lib, "ws2_32")SOCKET ConnectTo(char *ip, int port){WSADATA wsaData;
SOCKET s;struct hostent *he;struct sockaddr_in host;int nTimeout=15;if(WSAStartup(MAKEWORD(1,1),&wsaData)!=0){printf("[-]WSAStartup failed.\n");exit(-1);}if((he=gethostbyname(
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
here we say:
et puis 100 balles et 1 mars ? hu ;>
Manuel Moreno Leiva wrote:
> great exploit.. works fine in my workstation
> i have WinXp Sp2 IE 6.0.2900.2180.xpsp_sp2_gdr.050301-1519
> you have a exploit usable for this?
>
> Best Regards
>
> Manue
great exploit.. works fine in my workstation
i have WinXp Sp2 IE 6.0.2900.2180.xpsp_sp2_gdr.050301-1519
you have a exploit usable for this?
Best Regards
Manuel Moreno
AsesoriaPC
Stgo,Chile
2006/3/16, Michal Zalewski <[EMAIL PROTECTED]>:
> Good morning,
>
> This might not come as a surprise, but
--Security Report--
Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL Injection Vulnerabilities
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 18/03/06 05:27 PM
---
Contacts:{
ICQ: 10072
MSN/Email: [EMAIL PROTECTED]
Web: http://www.nukedx.com
}
---
Vendor: BetaParticle (ht
Dear all,
FYI:
This is the second call for papers for the IMF Conference 2006.
Please mind the submission dead line on 2006-04-17.
Please excuse possible cross-postings.
---
2nd CALL FOR PAPERS
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Yes, it's old school, but ARP hijacking is often useful (especially in
802.11).
KArp is a simple Linux kernel level ARP hijacking utility that is
easily configured
via ProcFS or via the sysctl mechanism. Because it's not a userland
tool, and
becaus