Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
For any nonsense or banter that doesn't fit anywhere else. LoL! omg! ROFL! 

Current Page: 1 of 1
Results 1 - 12 of 12
7 years ago
ionic
Hmmm RSnake, did you remove me from the winners list?!?
Forum: OMG Ponies
7 years ago
ionic
Yeah so I am within the winner list ;)
Forum: OMG Ponies
7 years ago
ionic
Uhhh... I believe there is a huge bug in your challenge and I used it to win ;)
Forum: OMG Ponies
7 years ago
ionic
Ronald you still don't get it that the javascript URL is executed within your domain, do you? You are behaving like a little child that desperately tries to rescue its neck with nonsense pseudo arguments and spam attacks like spamming planet-websecurity. Yes it IS only a hyperlink, but a hyperlink on YOUR site that is able to execute Javascript on behalf of YOUR domain (because YOU failed to
Forum: Full Disclosure
7 years ago
ionic
@pdp Stop writing such bullshit I did nothing illegal/unethical. I entered an URL in your attack tool, an attack tool that is by definition unethical and nowadays illegal in countries like germany. However there are examples where german judges told the siteowners that it is their problem if eg. a bunch of customer data incl. credit card numbers is reachable by an URL. And it is very amusing
Forum: Full Disclosure
7 years ago
ionic
@kuza55 For me it is really funny. Just sit back and watch what happens when you point out these bugs. They all claim what you found is not dangerous. For various reasons... Maybe because there are no cookie to steal, ... Of course this is completely different when they find similar errors in other persons sites. And then they try to come back at you by pointing out errors in 3rd party so
Forum: Full Disclosure
7 years ago
ionic
Like I already pointed out to Ronald in his blog until he blocked my IP. This is btw a really nice way to censor different opinions. At the moment his website even claims that I am a "security scanner". LOL. You can blame me all day long for using a PHP software that had a security hole in it. Actually you can really blame me, because the hole was known and I oversaw it when I back
Forum: Full Disclosure
7 years ago
ionic
For sure Kuza and co will soon come out and tell us how bad it is to laugh at other people's mistakes. Here we go: XSS vulnerability in GNUCITIZEN.org http://blog.php-security.org/archives/90-More-CSRF-Redirectors.html And yes WE laugh about it, because running around and telling everyone how doomed he is by XSS and then have XSS vulnerabilities in your own "tools" is hilarious.
Forum: Full Disclosure
7 years ago
ionic
I have to agree with what ntp said: "Old hackers don't understand the new hackers" These words are sooo true. However he might have meant something different. The reason why WE (yes me, too) don't understand you is not because we don't understand your content. The opposite, most of us don't understand why you celebrate people for documenting things that are actually old. We also
Forum: News and Links
7 years ago
ionic
This is only one of many fuckups of the sooo great Shiflett. There is a huge difference between a person that does a mistake once in a while. Everyone does that. But Shiflett does one mistake after another. However the best one is still that he uploaded VULNERABLE example code with his talk to cvs.php.net which was then installed on talks.php.net and resulted in google finding these URLs and
Forum: Full Disclosure
8 years ago
ionic
htmlspecialchars("...MAGICSTRING...\xfx\xfd\xfd........", ENT_QUOTES, "utf-8");
Forum: News and Links
8 years ago
ionic
Quite boring XSS that only works if you click on the email button and then on the submit button... http://labs.idefense.com/';alert(/xss/);//
Forum: Full Disclosure
Current Page: 1 of 1