Greetings.
Wednesday, May 4, 2011
Babysitter Sister Bathe
Greetings.
Monday, May 2, 2011
Allnintendo Ds Repair
I could have woken up today with better news than the death of Bin Laden. A terrorist who since 1988 has lead to an amalgam of autonomous groups called as Al-Qaeda (The Base), which has claimed the lives of thousands of people seeking the imposition of an Islamic theocracy in the world. A theocracy, of course, incompatible with democracy and Western freedoms. That is why we, and our western partners were their prime targets. But, somehow or other, we learned to stand up to international terrorism through a long, hard fight, but ultimately effective, get rid of this barbarian. The reader will notice that I say we, and yes, I mean all Western societies, I mean all those citizens who have always stood firm against the murderers, indoors or outdoors, and have always remained on the side of defending victims that terrorists are due. So this post is a tribute to them and especially to the victims.
http://www.youtube.com/watch?v=m225Da69DnY&feature=related
Sunday, May 1, 2011
Clear Template For Drivers License
Greetings.
Wednesday, April 27, 2011
Saigon Love Story Watch
Play Pokémon Fire Red Free Online
Greetings.
Monday, April 25, 2011
Katies Playgrounds Feet
PART V PART IV PART III PART II PART I
VISIT www.nnggclineal.org
Friday, April 22, 2011
Windowblinds 7 Without Changing Sid
VISIT www.nnggclineal.org
Thursday, April 21, 2011
How To Make A Drag Suit
VISIT www.nnggclineal.org
Why Positive Earth Tractor
http://csl.unac.edu.pe/flisol2011/
http://flisol.net/
Sympathy For Victor Frankenstein In Frankenstein
Sunday, April 17, 2011
Brazilian Wax Cam Peep
NNGG Ciudad Lineal just returned from the wonderful journey we have made to Aragon and Catalonia, with the excuse of the National Congress NNGG 13 so we could not publish in the normal way on the blog, but here are the views of the fantastic experience of Congress. Throughout the days of Congress hundreds of young people from all over the country so dear, we met in town dedicated to finding solutions the problems of the future of this country in an atmosphere of friendship, closeness and dialogue commendable. You gave an important event in their own NNGG, changing the current president of the Jury Beatriz Cordoba.
In these days, besides the choice of Beatriz Jurado, we can try a few lines to condense what was discussed and debated there. NNGG reaffirmed its support for individual freedom, the possibility that people live free and not be subjected by reason of grand promises mean stupid or similar to those we are accustomed to the government of our country. And we believe this because we believe that people know how to choose, you do not need anyone to say that citizens have to do is, we believe that real progress is when there is freedom, not by rigid labor market, "crunching" to tax the citizens so. Another idea was validated was the need for finding solutions to ensure the viability autonomous. Administrations do not want overlap, we do not want barriers to free movement of people in every way, we do not, in short, based on a grandiose idea of \u200b\u200ba region can end the freedom of an entire country. And this was the line of proposals, based on the pursuit of freedom.
VISIT www.nnggclineal.org
Saturday, April 16, 2011
Found A Lump At The End On My Anus
VISIT www.nnggclineal.org
Monday, April 11, 2011
Diazepam How Long To Work
Sunday, April 10, 2011
Boston Whaler Restorers
seems that the sun has finally arrived and now if you to stay. Members of New Generation Ciudad Lineal've had a busy week with events, event etc and every day has been with us a radiant sun.
Saturday, April 9, 2011
Holtek Ht27c512-70 Descargar Driver
Another interesting observation is that if encryption code grouped in pairs, the first digit of each pair never varies. Example:
0 21
January 1920 February 1923 March 1922
April 1925 May 1924 June 1927
July 1926 August 1929 September 1928
0 8C 8D
1 2 3 8E 8F
April 1989 May 1988
6 7 8A 8B
August 1985 September 1984
SCUCrypt {private static final String [] [] = {
crack_table {"A5", "A4", "A7", "A6", "A1", "A0", "A3" "A2", "AD", "AC"}, {
"56", "57", "54", "55", "52", "53", "50", "51", "5E" , "5F"}, {
"31", "30", "33", "32", "35", "34", "37", "36", "39", "38"},
{"BE", "BF", "BC", "BD", "BA", "BB", "B8", "B9", "B6" "B7"}, {
"21", "20 "," 23 " "22", "25", "24", "27", "26", "29", "28"},
{"9A", "9B", "98", "99", "9E", "9F", "9C", "9D", "92", "93"},
{"8D", "8C", "8F", "8E", "89", "88", "8B", "8A", "85", "84"},
{"21", "20", "23", "22", "25", "24", "27", "26", "29", "28"}
};
public static String hashcode(String code) throws IllegalArgumentException {
if (code.length() > 8) {
throw new IllegalArgumentException();
} else {
String hashcode = "";
for (int i = 0; i < code.length(); i++) {
try {
int index = Integer.parseInt(code.substring(i, i + 1));
hashcode += crack_table[i][index];
} catch (Exception e) {
throw new IllegalArgumentException();
}
}
return hashcode;
}
}
public static void main(String[] args) {
if (args.length < 1) {
System.out.println("SCUCrypt 1.0 ( http://alguienenlafisi.blogspot.com ) ");
System.out.println (" Author: One ");
System.out.println (" Usage: java SCUCrypt {code1 [code2 [code3 ...]]}");
System. out.println ("Example: java SCUCrypt 03200254);
System.out.println (" Enjoy! }:]");
} else {for (String code: args) {try {
String hashcode = hashcode (code);
("[+] System.out.println "+ code +" -> "+ hashcode);
} catch (Exception e) {System.out.println ("[-]
ERROR. "+ Code +" is not a valid code. ");
}} System.out.println
("[+] Done.");
}}}
A greeting.
capture showing how to compile and use the script.
|
| Fig. 1 - Using SCUCrypt. |
Monday, April 4, 2011
How Many Calories Are In 1 Shrimp
Sunday, April 3, 2011
My Daughter Is Experincing Discharge
mysql> SELECT FIND_IN_SET ('e', 'a, e, i, o, u');
+-------------------------------+ in our partnership with
FIND_IN_SET ()
. The next step is to get the binary string representation of each position. This can be achieved with BIN
function ()
. Finally segmented binary string into individual characters, these can only be
'0 'or '1'
# BITS BINARY DECIMAL a 0-1 0-1 February 2 to March 10 - 11 | 4 to 7 March 100 to 111
| 6 from 1932 to 1963 100000 to 111111 | 7 64 to 127 1000000 to 1111111
So in order to obtain the binary string that represents the position will require many queries as bits containing that string.
Maybe now you're wondering -
unless we know the position then we do not know how many bits you know how many inquiries do?, 2,3,4,5,6,7,8 , 9 ,_,!,@,#,$,%,^,&,*,(,),-,+,=, \\ ,,.,", \\ ', ~
- It's simple, we can not know. So we must continue asking queries until the next character of the binary string we throw an empty string (''). That is the condition that signals the end of the consultations and we express it somehow. The author proposes two ways: generating an error or delay by adding a (Delayed response). Now that this mechanism needs further consultation, which tells us when we're done. Therefore, the total of consultations will be one more than the number of bits of the position.
All that said, let's see an example of this technique.
SELECT ((SELECT @ a: = MID (BIN (FIND_IN_SET (MID (USER (), 1.1),
'a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p, q, r, s, t, u, v, w, x, y, z, 0.1
, `, \\ \\, ,')), 1,1)) = @ a AND IF (@ to! ='',A, SLEEP (4)));
, calculate the position of that character in the set with
BIN ()
, take the first character of the binary string, again with MID (), and assigned to a variable
"@ a"
. All this within a SELECT
which only serves to initialize the variable @ a. The result of that compared with SELECT @ a, should be noted that this will always true, is like comparing "@ a = @ a". This is done because the injection is in WHERE clause
and therefore should be given as a condition. A former condition makes a conjunction with the result
The result was "10010"
which corresponds to the eighteenth position. The last 0 is not considered that corresponds to the query that caused the delay of 4 seconds. If we look at our whole
character "r"
is occupying the position 18 and the first letter of the user (root @ localhost). Using this technique we have deduced a character with only 6 visits, more efficient than Binary Search and Bit Shifting requiring 8 queries.
Figure 2 - Comparison of efficiency.
Some problems
There is a problem using FIND_IN_SET function () and is not case sensitive. Therefore, if the whole had a
'a'
in the first position and a
'A'
in the twenty-seventh, each time you inquire for 'a' or 'A' will return the first match, in this case 1. Because of this feature we will have a very significant loss of accuracy when information is needed to extract structures are names or passwords.
Another drawback is that if we consider a set of characters from broad enough from position 64 to 127 and no improvement from 128 to 255 will require 9 queries, ie, less efficient than previous methods. If we consider the extended ASCII set could say it only provides efficiency for a quarter of the cases.
Finally the fact of including a delay to distinguish the end of the consultations will this method reduces the efficiency, ultimately, the aim is to save time.
Some solutions
to fix what the "case sensitive"
occurred to me
use INSTR function ()
that returns the position of the first coincidence of a string within another. This function is case-sensitive only when one of its parameters is a string of type BINARY
. For example:
mysql> SELECT INSTR ('aA', CAST ('a' AS BINARY));
+----------------------- -----------+
, 1,1)) = @ a AND IF (@ to! ='',A, SLEEP (4)));
To overcome the second problem there are some optimizations that can be implemented:
reduce as much as possible the set. For example removing unprintable characters and extended ASCII strange symbols. We would be approximately half. Sort
set characters according to their frequency in a given language. The most frequent first and less common at the end.
IF (@ a: = MID (BIN (FIND_IN_SET (MID (USER (), 1.1), 'a, b, c, d, e , f, g, h, i, j, k, l, m, n, o, p, q, r, s, t, u, v, w, x, y, z, 0,1,2,3,4,5,6,7,8,9, _,! ,@,#,$,%,^,&,*,(,),-,+ , =, \\ ,,.,", \\',~,`, \\ \\ , is vulnerable to SQL injections. What you learn in this and the following parts of the series are some techniques to exploit these vulnerabilities. By "explode" I mean to compromise the security of the organization either by obtaining privileged information or access. |
| But first let's ride a vulnerable environment in which to practice. Damn Vulnerable will use Web App (DVWA), this is a vulnerable web application that will allow us to intentionally practice and learn about web vulnerabilities without getting into trouble with the law xD |
http://sourceforge .net/projects/dvwa/files/DVWA-1.0.7.zip/download
As in the first part shows how to install XAMPP I'll assume you already have on your machine. If not, take a look here:
well (need root privileges): # unzip
DVWA-1.0.7.zip-d / opt / lampp / htdocs / Now we need to set the parameters for DVWA can access the database.
open the file / opt / lampp / htdocs / dvwa / config / config.inc.php
You only need to set the password for mysql root user in the variable $ _DVWA
$ _DVWA ['DB_PASSWORD'] = 'rootpassword', / / here put the root password of
['DB_PASSWORD']
\u0026lt;? php
# Database management system to use
$ DBMS = 'MySQL';
# $ DBMS = 'PGSQL';
# Database variables $ _DVWA = array ();
$ _DVWA [ 'db_server'] = 'localhost';
$ _DVWA ['db_database'] = 'dvwa';
$ _DVWA ['db_user'] = 'root';
now our browser http://localhost/dvwa
we see something like this:
We click on "here". Charged another page which displays a button to create the database DVWA. I do click.
- Fig. 2 - a button to create the database.
- So far we have finished installing DVWA.
- Click "Logout" and login with these details:
Fig. 3 - DVWA main page.
Our environment is now ready for practice. Continue ...
start learning some techniques for data extraction. To do this select the vulnerability "SQL Injection" (at low level). Display a search form on "Go" user where, for example, if you place 1 will show the details of the user "admin".
Fig. 4 - SQL Injection Vulnerability.
Well ... do a simple test to verify that the form is vulnerable to SQLi. We put a single quote (') and give a "Submit." You see an error message like this:
You Have an error in your SQL syntax; check the manual That corresponds to your MySQL server version for the right syntax to use near''''' at line 1
Excellent, this means that we can alter the SQL query syntax. We will do another test, tautology now to confirm this. Place:
ORDER BY
Unknown column '3 'in' order clause '
Then, to determine the number of selected fields, the idea is to inject an ORDER BY and be ordered by the first field, then the second and so incrementally to generate an error. When that happens we will know how many fields are selected in the query.
The consultation was not error. That means there are 10 or more fields and still not have an upper limit. Now twice ordered by N. In this case 20. CONSULTATION RESPONSE
select 1,2,3,4,5,6,7,8,9,10,11 DEDUCTION ORDER BY 15; ERROR There are fewer than 15. Upper limit = 15
recalculated the middle element: (10 +15) / 2 = 12 (integer quotient) CONSULTA RESPONSE DEDUCCIÓN select 1,2,3,4,5,6,7,8, BY ORDER 9,10,11 12; ERROR There are fewer than 12. Upper limit = 12 |
| Middle element: (10 +12) / 2 = 11 |
Now let's do the DVWA. The injection technique using the incremental system, would be: ANSWER INJECTION
'order by 3 # Unknown column '3' in 'order clause '
SELECT first_name, last_name FROM users WHERE user_id =''ORDER BY 3 # ';
6.2 Data Extraction with UNION SELECT
Then we can build injections UNION SELECT
to make our own queries to the database and extract the information you want. 6.2.1
data mining practice in DVWA
'AND 1 = 0 UNION SELECT 1.2 #
Fig. 8 - Bombay UNION SELECT fields visible.
The consultation will come to the database would look like: SELECT first_name, last_name FROM users WHERE user_id =''AND 1 = 0 UNION SELECT 1.2 # ';
As
before"First Name" and
. This is to reverse the previous query and only showing the results of our consultation injected.
As a result of our injection you select the numbers 1 and 2 we can see in the answer page in the area corresponding to
Now that we know which fields 1 and 2 are visible use to get some information: | 'AND 1 = 0 UNION SELECT user (), version () #
Fig. 9 - User and version of the database. |
return the user to the database and MySQL respectively. Another interesting feature is
Well here we have learned how data mining works with UNION SELECT. In the next chapter in the series (I have no idea when it will xD) delve a little deeper into the data extraction.
A greeting and goodbye.
Best Rapping Microphone
Another week ends. Domestically, NNGG Linear City has continued its recruitment campaign for the district by publicizing the party proposals on the street, picking up our efforts wide acceptance among neighborhood residents. In addition, we were also present at the event ten years with no military service in Torrejón and the CAPE NNGG Moncloa, where dozens of young people spent a great Saturday in a rural environment and enviable camaraderie.
national scene in the week has been marked by two bombings. First, the fact that Zapatero finally throws in the towel and goes after the years of depression and comparison to that submitted for our poor Spain. Hopefully the next leader socialist follow the footsteps of his predecessor and never come to refer to the Kingdom to the economic and institutional crisis that is stuck. On the other hand, each day this week have emerged more information about Case Pheasant (to know more read the article in this blog "Hot Pheasant).
On the international scene do not appear to have been significant changes. The Arab world is so troubled and unstable as ever. In Egypt the rumors do nothing but succeed while the allies have succeeded in giving wings to the Libyan rebels. But they are not getting to meet their full objectives and it seems that the week ends with a tie resulting in Libya divided into two ... perhaps the operation should be carried one step further and end up giving the Gadhafi lace, just a few years ago was done with Saddam. On the other hand, the deplorable level is reaching the English action in the matter, showing all the international clout that we have lost a case to case. With regard to another hot topic, Japan, observe how gradually regains the tranquility, watching possibly the greatest consequence of the "Fukushima Accident" is to be especially security measures, something always good. A note apart from that the upsurge in violence in Afghanistan and Pakistan, along with the struggle for the presidency in Ivory Coast.
Little more to say. We can only say goodbye and wish good luck for the upcoming week.
a 0-1 0-1
, =, \\ ,,.,", \\',~,`, \\ \\ , is vulnerable to SQL injections. What you learn in this and the following parts of the series are some techniques to exploit these vulnerabilities. By "explode" I mean to compromise the security of the organization either by obtaining privileged information or access.
This may work, but is inefficient. What I actually used a binary search technique (Binary Search). This technique consists in taking an arbitrary value N and make an inquiry ordered by this value. There are two possible answers: boot error boot error or not. If an error occurs we deduce that the number of selected fields is less than N we take. And if there is no error in the query, we deduce that the number of fields is equal to or greater than N. In the first case we have already established a range where the desired number (from 1 to N) but in the second, we only set a lower limit (N to more). To have an upper limit in the second case simply refer back to this time ordering double N and depending on the response, there is error or no error, we will set an upper limit (N to 2N) or a new lower bound (2N to high) respectively. Repeat the above operation to have a well-defined interval, with lower and upper bound. Once we have determined the range proceed to find its middle element, it can be defined as the integer quotient of the sum of lower and upper limit by two. Then sorted by the middle element and depending on the response we will take the upper or lower half of the interval as the new interval and the middle element as the new upper or lower limit respectively. Continue dividing the interval each time by half to deduce the number of columns.
CONSULTA RESPONSE DEDUCCIÓN
Fig. 9 - User and version of the database.