//
archives

php

This tag is associated with 8 posts

Tracking Website Visitors Pt5: Installation Script

/tracker/install.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script Advertisements

Tracking Website Visitors Pt4: Uploading Image to MySql

/tracker/upload_image.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script

Tracking Website Visitors Pt3: Returning Tracking Information

This is just a simple page for reading the hits from the database with your tracking information for the image id involved. /tracker/status.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website … Continue reading

Tracking Website Visitors Pt2: Returning Image From Database

/tracker/return_image.php Tracking Website Visitors Pt1: Masking Image Requests Tracking Website Visitors Pt2: Returning Image From Database Tracking Website Visitors Pt3: Returning Tracking Information Tracking Website Visitors Pt4: Uploading Image to MySql Tracking Website Visitors Pt5: Installation Script

Tracking Website Visitors Pt1: Masking Image Requests

Email marketers commonly use small images embedded in email messages as tracking mechanisms. These email tracking images enable marketers to track approximately how many people viewed a particular email campaign. The same technology has implications in security. Now and then I am asked to consult on Bond skips. Bounty hunters will ask me to help … Continue reading

Bruteforce Luks Encrypted Partition Password

First and foremost, you should know that bruteforcing Luks is no easy task: the PBKDF2 norm, used by Luks, make it hard to brute-force : Luks doesn’t use the passphrase you give him as a source to decrypt data. It use your passphrase as a source for a very complex alogrithm, done a great number … Continue reading

Taking Down Zemra – Introduction

The Zemra DDoS Bot is currently sold in various forums for ~$125USD. It is detected by up to date Symantec definitions as Backdoor.Zemra. Zemra first appeared on underground forums in May 2012. It comes on to the scene behind a laundry list of other tools such as Zeus and SpyEye. The package itself is not very … Continue reading

Solving Captchas PHP script

A lot of time one comes across a captcha protection from automation. This is relatively easy to bypass now due to services being put up in 3rd world countries offering food for captchas (literally) and wages. It is a rather interesting that the void is being filled this way by exploiting this relatively large and … Continue reading