User Controls

  1. 1
  2. 2
  3. 3
  4. ...
  5. 1402
  6. 1403
  7. 1404
  8. 1405
  9. 1406
  10. 1407
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429

Posts by Sophie

  1. Sophie Pedophile Tech Support
    ..
  2. Sophie Pedophile Tech Support
    You'll never walk as tall until that moment when fate and circumstance collide, when all it takes is a step that you never saw and burdens fall away.
  3. Sophie Pedophile Tech Support
    I got 4 when i did sploo's test earlier, i guess my autismal powers aren't that great after all.

    I'll still pwn you at physics, astronomy, chemistry, pharmacology and neckbeard psychology though.
  4. Sophie Pedophile Tech Support
    Noice.
  5. Sophie Pedophile Tech Support
    Pretty cool program. Nothing wrong with strengthening your web security.

    Not sure if it's open source but there are several institutions developing the program.
  6. Sophie Pedophile Tech Support
    HTS-noob, is that you?
  7. Sophie Pedophile Tech Support
    Stop being so melodramatic.
  8. Sophie Pedophile Tech Support
    It's a framework for XML-based SOAP Web Services penetration testing. It scans for vulnerabilities and has the option to run exploits automatically if so desired it comes for Linux, Mac and windows. Currently it supports these attacks:
    • SOAPAction Spoofing
    • WS-Addressing Spoofing
    • Various XML Denial of Service variants
    • XML Signature Wrapping
    Personally i haven't used it yet but it looks interesting, it comes with a neat interface as well.



    Anyone use a tool like this and found it useful? Here's a download link if you're interested in the framework.

    http://sourceforge.net/projects/ws-attacker/
  9. Sophie Pedophile Tech Support
    Depends which end you're on

    Words more true have never been written.
  10. Sophie Pedophile Tech Support
    Malware is fun.
  11. Sophie Pedophile Tech Support
    Everyone who goes on ahead and does not abide in the teaching of Christ, does not have God. Whoever abides in the teaching has both the Father and the Son. If anyone comes to you and does not bring this teaching, do not receive him into your house or give him any greeting, for whoever greets him takes part in his wicked works.

    John 1:9-11

    Begone heathen and take your wicked works with you!
  12. Sophie Pedophile Tech Support
    If you find my PI, I'll let you fuck me in the ass. IP address doesn't count.

    Well if that's the prize your PI must be impossible to find. I should probably get to setting up a fake facebook so i can phish for your login details and find you like that lol.

    If you turn out to be Zek i´m gonna´ be pissed. Lulz.
  13. Sophie Pedophile Tech Support
    Damn, you would get a lot of people like that..I'm sure you have…lol..Especially the torrent idea..But does the "exe" show up as malware when scanned? You know how people are when downloading from torrent sites. Shit, I gotta read the comments first..make sure torrent is legit. Then my internet security gotta be turned on before any downloading

    Lol i have avast and avast flags all things always from here to kingdom come and avast says: Meh, this is safe go ahead and execute it. The beauty is, even if they turn their PC off my program is persistent so when they turn it on again i get a notification that my client is available again if i ask my controller to check.
  14. Sophie Pedophile Tech Support
    The epitome of a useless interjection. You have verified the long known fact that vb4 is in all ways better. Just because every forum you go to runs a certain software does not mean all forums run a certain software.

    If he's saying we should downgrade and is using that as an argument the proper term for that logical fallacy is appeal to common practice.
  15. Sophie Pedophile Tech Support
    I'm a noob at javascript but could't you write some code that would download and execute a file and inject that into a PDF?
  16. Sophie Pedophile Tech Support
    Now we know why Psycho wanted to get PDFs enabled on RDFRN so bad.

    That was Oplus.
  17. Sophie Pedophile Tech Support
    you can't bind an exe to pdf and expect it to run unless it's leveraging an existing exploit in the reader application

    you can inject javascript because the pdf format is a faggot farm though

    Yes you're totally right, i was thinking metasploit meterpreter embedded in PDF but of course that's not an exe at all. Sorry.
  18. Sophie Pedophile Tech Support
    Setting up a Gmail is about the only thing I understood….No but seriously, I understand what this program does, but how is it installed into the target computer?

    Bind the exe to a legitimate installer for a popular program and distribute through torrents. Or bind the exe to a PDF file and do a social engineering attack where you spoof an email from a company like microsoft(You're targetting windows anyway) saying they have changed their terms of service and if you would be so kind as to read the new terms in the PDF provided.

    Scrap that i was thinking different kind of exploit.
  19. Sophie Pedophile Tech Support
    Also i think you may be misunderstadning and do correct me if i'm wrong but i am guessing you think adding python27.exe to the variable path of your system makes you vulnerable to malicious python scripts. Well the thing is my malicious python script is all neatly compiled into an exe with all it's dependencies so i actually don't need to have python installed on a target system. It will function perfectly fine on it's own.
  20. Sophie Pedophile Tech Support
    Lanny is NOT going to happy to hear that.

    Well Spectral if you know another way to be able to use python from the command prompt please tell me.
  1. 1
  2. 2
  3. 3
  4. ...
  5. 1402
  6. 1403
  7. 1404
  8. 1405
  9. 1406
  10. 1407
  11. ...
  12. 1426
  13. 1427
  14. 1428
  15. 1429
Jump to Top