Backtrack5 安装简单配置

Backtrack5已经发布了几天了,一直没空去下载。今天下载了并且安装到硬盘中了。发现系统优化了很多。最突出得是内核升级到官方最新文档版本

BackTrack5 下 ATI 显卡安装方法

原文:Ati Driver | Stream sdk 2.2 (Opencl 1.1) | CAL++ | cpyrit_calpp | 翻译:LengF 刚安装完BT5,有线网卡和无线网卡驱动自动安装了。但是显卡驱动还没安装。没装的时候浏览网

Ushahidi 2.0.1(范围参数)的SQL注入漏洞(后验证)

Ushahidi 2.0.1 (range param) SQL Injection Vulnerability (post-auth) Vendor: Ushahidi, Inc. Product web page: http://www.ushahidi.com Affected version: 2.0.1 (Tunis) Summary: The Ushahidi Platform is a platform for information collection, visualization and interactive mapping. Desc: Input passed via the 'range' parameter to dashboard.php is not properly sanitised in application/controllers/admin/dashboard.php before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. ------------------------------------------------------- \application\controllers\admin\dashboard.php Lines:

W - Agora 的论坛 4.2.1 任意文件上传漏洞

<?php /* Title .......................: w-Agora Forum 4.2.1 Remote File Upload Exploit Site ........................: http://www.w-agora.com/en/download.php Version .....................:  4.2.1 Author ......................: Treasure Priyamal Site ........................: http://treasuresec.com E-mail ......................: treasure[at]treasuresec.com Discription =========== w-Agora avatar upload option has content file detect option , but it can be replace with simply editing POST Request from your browser Here is a dump from Temp-Data I editied while im upload the File. Just simply replacing the Content-Type

Joomla 组件 com_jmsfileseller 本地文件包含漏洞

# Exploit Title: Joomla Component com_jmsfileseller Local File Inclusion Vulnerability # Date: 28.05.2011 # Author: Valentin # Category: webapps/0day # Version: 1.0 # Tested on: # CVE : # Code : [:::::::::::::::::::::::::::::::::::::: 0x1 ::::::::::::::::::::::::::::::::::::::] >> General Information Advisory/Exploit Title = Joomla Component com_msfileseller Local File Inclusion Vulnerability Author = Valentin Hoebel Contact = valentin@xenuser.org [:::::::::::::::::::::::::::::::::::::: 0x2 ::::::::::::::::::::::::::::::::::::::] >> Product information Name = JMS FileSeller Vendor = Joommasters team Vendor Website

Duhok 论坛 1.1 SQL 注入漏洞

=================================================================== DuhokForum <= 1.1 (index.php) SQL Injection Vulnerability =================================================================== # Exploit Title: DuhokForum <= 1.1 (index.php) SQL Injection Vulnerability # Date: 28-05-2011 # Author: M.Jock3R # Vendor or Software Link: http://www.duhoktimes.com/df/?file=duhokforum-1.1 # Version: 1.1 # Category:: webapps # Google dork: duhokFrm 1.1 ? Dilovan 2007 - 2008 # Tested on: windows XP Sp2 FR # Demo site: http://forum2009.eb2a.com/index.php?mode=f&f=1' Exploit: http:localhost/duhokfrm/index.php?modd=[Inj3ct Here ;)] =================================================================== Greets To : Adelsbm / attiadona /