Welcome to HBH! If you have tried to register and didn't get a verification email, please using the following link to resend the verification email.

milw0rm.com


ghost's Avatar
0 0

hey all. ive recently been using milw0rms hash cracker and today, for the first time, i actually examined the main page. now i presume milw0rm lists exploits found by hackers and programmers. i was examining the code of one of these exploits, and it seemed to be written in C. i was wondering if anyone could tell me how to use these exploits. i know next to nothing on what these exploits do, or how to use them, but they seem very powerful when used correctly. as with a lot of my posts, i may come across as a skiddie, but believe me, i only want to learn…

thanks very much for any help!


ghost's Avatar
0 0

2eXtreme wrote: hey all. ive recently been using milw0rms hash cracker and today, for the first time, i actually examined the main page. now i presume milw0rm lists exploits found by hackers and programmers. i was examining the code of one of these exploits, and it seemed to be written in C. i was wondering if anyone could tell me how to use these exploits. i know next to nothing on what these exploits do, or how to use them, but they seem very powerful when used correctly. as with a lot of my posts, i may come across as a skiddie, but believe me, i only want to learn…

thanks very much for any help! You're right, you do come across as a script kiddie. You just stated that you know next to nothing on what the exploits do, and yet you ask how to use them. That right there is the basic definition of a script kiddie. Had you asked how they work, you may get a better response or be seen as more of a hacker, but that doesn't seem to be the case.


ghost's Avatar
0 0

You could post the actual code and talk about that?


ghost's Avatar
0 0

You get a C/C++ compiler for 1 and thats a bit harsh slimtim10


ghost's Avatar
0 0

-Intrus- wrote: You get a C/C++ compiler for 1 and thats a bit harsh slimtim10 I don't think so. Read this specific line: 2eXtreme wrote: i know next to nothing on what these exploits do, or how to use them, but they seem very powerful when used correctly. thanks very much for any help! That has everything wrong with it and just screams "script kiddie."


ghost's Avatar
0 0

lol , screams indeed


ghost's Avatar
0 0

:( I dont hear anything. You guys must have super good hearing.


ghost's Avatar
0 0

Lol.

Maybe try looking through the code to see how it'll work.


ghost's Avatar
0 0

okay thanks guys for the help. slimtim, i appreciate where youre coming from. its just i wanted to learn about the exploits. sorry for the annoyance ;)


ghost's Avatar
0 0

Cut this guy some slack.

It is likely they are in PERL.

Right, lets continue the thread assuming he was asking how it works


ghost's Avatar
0 0

Linux

C Exploits: a. gcc exploit.c -o exploit b. ./exploit

Perl Exploits: a. Perl exploit.pl

Windows for C and Perl exploits (using CYGWIN) the methods might be the same (as above)

MAC - Personally never use it (hopefully, someone might shed some light on the issue)