This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

JS (Javascript) For Hackers

 

What can you do if you can’t use eval()?

In Javascript you can store references to native functions in variables so for example you can do the following:-

Geko based browsers also allow you to call the eval function like this:-

So you can do stuff like, use your imagination:-

How do I get round using certain characters/words?

Javascript supports various encoding which allows you to represent different characters. So the following unicode example creates the eval and alert combination:-

So \141 translates to ‘a’ etc, when you have a string in javascript by using “” or ” you can use unicode characters, when javascript encounters the ‘\’ it will convert the character depending on it’s character code.

Hex decimal encoding can also be used like the following:-

You can also use eval to convert the character for you, for example the following produces the letter ‘a’:-

How do you call anonymous functions?

Javascript allows you to call functions when you use ‘()’ as you already know, but you can also use it to call anonymous functions like the following:-

The code above creates a new anonymous function and passes the string ‘alert(1)’ which is embedded into the newly created function, it then calls executes the function. You can also combine the techniques mentioned, like using different characters encodings to pass the string information , you also don’t need to specify ‘new’ e.g.

What can you use as variable names?

Javascript isn’t very strict and is pretty lax when it comes to variables names for example the ‘_’ character is allowed as a variable name or even a ‘$’ can be used as a variable name, even different character sets are allowed for variable names.

How can you create a string?

Strings are defined using String(), ” and “” etc. What you might not have known though is that regular expressions can also be used to create a string, like the following examples:-

I really need this character but it’s not allowed, how do I get it?

Think around the problem, rather than try to access the character directly get the information from another source. Like for example say you wanted the colon character and you tried urlencodings and various character encodings, you can use the URL property to gain this information. Example:-

I like the document.URL technique, what else is possible using similar techniques?

Surprisingly often you don’t even need to call the document object to access some functions, so URL is available within the context of the HTML element:-

Are there any other ways of executing javascript in CSS?

Firefox has a few features which allow unusual Javascript execution, among them is the -moz-binding css extension which allows you to link XML documents using CSS. Here is an example:-

How can I use XML within Javascript?

Firefox now supports XML in javascript code, you can just include the tags like this:-

XHR-formHarvester.js

Sadbhav Engineering Hacked

 Sadbhav Engineering Limited, established in 1988 by Mr. Vishnubhai Patel, is counted among the leading Infrastructure companies of India. Over the years, Sadbhav has succeeded in powerfully anchoring itself in the Indian Infrastructure sector and today enjoys a solid reputation in the Infrastructure development industry. Sadbhav has been involved in carrying out landmark infrastructure projects in India and each new endeavor of the company has the ultimate goal of enhancing the quality of life for people across the country and creating new opportunities without compromising on Work Quality and Punctuality. Sadbhav's business currently focuses on Infrastructure projects which include Construction of Roads & Highways, Bridges, Irrigation supporting infrastructure and Mining. Today Sadbhav has successfully constructed more than 4200 Lane Kms. of Roads and Highways (both National and State Highways) while 3500 Lane Kms. are under various stages of construction. Sadbhav has done work for/withhighly reputable clients like NHAI, Sardar Sarovar Narmada Nigam, Coal India, GIPCL, GHCL, L&T, HCC, Punj Lloyd etc. Sadbhav had incorporated Sadbhav Infrastructure Project Limited (SIPL), as a subsidiary, back in 2007 as an asset holding company for Road & Other Infrastructure BOT Projects.

Leak date:
27/11/2021 14:45:30

Leak size (Gb):
0.21

Flagship Companies Group, LLC Hacked

 Flagship Companies Group, LLC (“Flagship”), is a diverse real estate and investment company with interests in residential and commercial real estate, self-storage, studio salons, and green energy. Company www.flagshipcompaniesgroup.com does not care about the safety of its employees. Having refused to audit the network security, we are forced to publish this information here.100 years of the company’s work have not affected their cybersecurity in any way. By how much critical data has been successfully compromised, financial data, accounting data, personal data of employees, etc. Data: https://mega.nz/folder/FI4nFK5Y#qNjwBRya_1uWgj-qnAO0hQWe provide a full network dump on request.

Publish Date:
18/11/2021 00:00:00

Stonington schools Hacked

 District is comprised of four schools that serve approximately 2020 students from across the Stonington community including the borough of Stonington, the villages of Pawcatuck, Lord’s Point, and Wequetequock, and the eastern halves of Mystic and Old Mystic. The two newly renovated and expanded elementary schools, Deans Mill School and West Vine Street School, serve students in grades preK-5. http://www.stoningtonschools.org was attacked by hackers. As a result of the security incident, personal data of students, employees and financial documents of the school got into the network. Management refused a security audit.The negligence of the management caused the information leak.  

Publish Date:
18/11/2021 00:00:00

AISD Hacked

 Allen ISD is a nationally recognized public school district providing outstanding educational opportunities for elementary and secondary students. The award-winning district serves the majority of the city of Allen, Texas, as well as sections of Parker and McKinney. The suburban community is located 23 miles north of Dallas. http://www.allenisd.org was attacked by our team. We really wanted to solve this problem in a good way, but Allen’s management decided to do it differently. They refused to pay money and conduct a security audit. As a result, a number of leaks of their private information of schoolchildren, teachers, parents and others

Publish Date:
18/11/2021 00:00:00

Starline Hacked

 Starline Supply (starlinesupply.com) is the supplier of choice for school districts, office buildings, state and federal accounts, health care, and cleaning professionals. They are provide quality products and personalized service at a competitive price. The company did not want to accept our conditions in order to conduct a security audit and save its data. As a result, there was a data leak concerning the personal data of employees and business conduct. Competitors are already excited about it. Starline is already feeling the pressure from them. Data: https://mega.nz/folder/YchBiATA#FpjVBhrrrbcOurQTqta0SAWe provide a full network dump on request.

Publish Date:
19/11/2021 00:00:00

Roc Technologies Hacked

 Roc Technologies (roctechnologies.com) are an IT solution and services provider delivering business transformation through unique process-led approach. They are solutions are built upon project management, process optimisation, platform solutions and managed services. The network of a leading company in the IT services market has been compromised. As a result, data was leaked. The 54bb47h team wanted to provide their services for decrypting data and conducting a network security audit. But the management refused the conditions provided by us and did not care about its cybersecurity. Data: https://mega.nz/folder/gZpT2aZA#aOJOzbIhGQQnUCxHFPFP8gWe provide a full network dump on request.

Publish Date:
19/11/2021 00:00:00