'How'에 해당되는 글 20건

  1. 2009.10.08 How much does a penetration test cost? by CEOinIRVINE
  2. 2009.04.16 How To Bypass Linux Magazine Membership Check by CEOinIRVINE
  3. 2009.01.30 maxmind.com : anti proxy , block proxy users by CEOinIRVINE
  4. 2009.01.29 How to block Proxy Servers by CEOinIRVINE
  5. 2009.01.24 How to Compile Wall Hack by CEOinIRVINE
  6. 2009.01.09 How To Market To The Modern Mom by CEOinIRVINE
  7. 2008.12.18 How To Avoid Holiday Party Sexual Harassment by CEOinIRVINE
  8. 2008.12.17 How We All Will End The Recession by CEOinIRVINE
  9. 2008.12.15 A Standoff Over How to Rescue the Housing Market by CEOinIRVINE
  10. 2008.12.10 How To Survive A Workaholic Spouse by CEOinIRVINE

How much does a penetration test cost?

The cost of a pen test depends on the skill of the testers you engage and the size of the application.

Having said that, we have seen wide variation in pricing – from $5,000 to $50,000. And the higher prices don’t always mean higher quality.

At Plynt, we constantly strive to reduce our costs and pass on part of those benefits to you. Drop us a mail or contact me to get a quote for a security test.

'Hacking' 카테고리의 다른 글

Hacking  (0) 2009.10.28
What tools do you use to test applications?  (0) 2009.10.08
AVA Hacks  (1) 2009.10.02
Regarding Online Game Security  (0) 2009.10.02
Flaw In Sears Website Left Database Open To Attack  (0) 2009.09.04
Posted by CEOinIRVINE
l

How To Bypass Linux Magazine Membership Check

Linux Magazine is one of my many email subscription where I read about Linux-related information.

At this time being, each of the Linux Magazine articles is available to public at zero cost, except that if you want hardcopy delivered to doorstep!


Although reading online is FOC, it requires one to register and login as member in order to read articles in full, posting comments, edit email subscription, download white-paper, etc.



If you just want to read the articles, not keen to register as member, forgot the login credential, etc, there are at least two ways to bypass the Linux Magazine membership restriction.

These tricks have been used to bypass Experts Exchange membership restriction as well, so as other premium content that requires membership login.

As long as these premium content allows Google crawlers to index their pages in full, you can pretend as a Googlebot to browse the membership-only content in full as well, i.e. counting on Googlebot membership privilege!

Using Google Cache

Ask Google to search for the URL and click to browse Google Cache version of the article. For example,

This original URL will display excerpt that require reader to register and login for full content.

This Google Cache version of the orginal URL allows reader to read the full article as what the Google Crawler can “see”, i.e. click the “Cached” (highlight in blue color) link.

Read the Google Cache version of Linux Magazine article without register and login as member.

Tweaking a web browser User Agent String

Purposely and manually change the default User Agent String of your favorite web browser, as this screenshot in Firefox 2.0.0.7.



replace anything in “general.useragent.extra.firefox” to become

Googlebot/2.1 (+http://www.googlebot.com/bot.html)

in order to spoof the Firefox User Agent String as Googlebot!

Posted by CEOinIRVINE
l
Proxy Detection Web Service: Usage from Perl, ASP and PHP

Examples below show how to use the MaxMind Proxy Detection web service API from server-side scripts in Perl, ASP and PHP. These can be adapted for other web services.

Any programming language that supports HTTP client calls should be able to use MaxMind web services.

Perl Example

#!/usr/bin/perl

use strict;
use LWP::UserAgent;
use HTTP::Request qw(GET POST);
use HTTP::Headers;

# replace this value with license key
my $license_key = "LICENSE_KEY_HERE";

my $ua = LWP::UserAgent->new(timeout => 2);
my $h = HTTP::Headers->new;
$h->content_type('application/x-www-form-urlencoded');
my $request = HTTP::Request->new('POST','https://minfraud3.maxmind.com/app/ipauth_http',
$h,"l=$license_key&ipaddr=80.24.24.24");
my $res = $ua->request($request);
my $content = $res->content;
print "content = $content\n"
Active Server Pages (ASP) Example
Dim objHttp, strQuery
strQuery = "https://minfraud3.maxmind.com/app/ipauth_http?l=" & license_key & _
"&ipaddr=" & ipaddress
set objHttp = Server.CreateObject("Msxml2.ServerXMLHTTP")
objHttp.open "GET", strQuery, false
objHttp.send
Response.Write objHttp.ResponseText
Set objHttp = Nothing
Requirements:

  1. ASP 3.0+
  2. Microsoft® XML 3.0 Component
Microsoft XML 3.0 Component can be downloaded for free from here. PHP Example
#!/usr/bin/php -q
<?php
$license_key = 'LICENSE_KEY_HERE';
$ipaddress = 'IP_ADDRESS_HERE';
$query = "https://minfraud3.maxmind.com/app/ipauth_http?l=" . $license_key
. "&ipaddr=" . $ipaddress;
$score = file_get_contents($query);
echo $score;
?>

'Hacking' 카테고리의 다른 글

Security Checklists  (0) 2009.02.06
How to Make Sigs and finding packet id's to get Addresses  (0) 2009.02.04
How to block Proxy Servers  (0) 2009.01.29
Reverse Engineering Books  (1) 2009.01.28
Debugger  (0) 2009.01.28
Posted by CEOinIRVINE
l

How to block Proxy Servers

Hacking 2009. 1. 29. 12:14

How to Block Proxy Servers via htaccess

Published Sunday, April 20, 2008 @ 4:38 pm • 18 Responses

Not too long ago, a reader going by the name of bjarbj78 asked about how to block proxy servers from accessing her website. Apparently, bjarbj78 had taken the time to compile a proxy blacklist of over 9,000 domains, only to discover afterwards that the formulated htaccess blacklisting strategy didn’t work as expected:

deny from proxydomain.com proxydomain2.com

Blacklisting proxy servers by blocking individual domains seems like a futile exercise. Although there are a good number of reliable, consistent proxy domains that could be blocked directly, the vast majority of such sites are constantly changing. It would take a team of professionals working around the clock just to keep up with them all.

As explained in my reply to bjarbj78’s comment, requiring Apache to process over 9,000 htaccess entries for every request could prove disastrous:

The question is, even if you could use htaccess to block over 9,000 domains, would you really want to? If you consider the potential performance hit and excessive load on server resources associated with the perpetual processing of such a monstrous list, it may inspire you to seek a healthier, perhaps more effective alternative..

A better way to block proxy servers

Rather than attempt to block proxy servers by who they are (i.e., via their specified domain identity), it is far more expedient and effective to block proxy servers by what they do. By simply blacklisting the various HTTP protocols employed by proxy servers, it is possible to block virtually all proxy connections. Here is the code that I use for stopping 99% of the proxies that attempt to access certain sites:

# block proxy servers from site access
# http://perishablepress.com/press/2008/04/20/how-to-block-proxy-servers-via-htaccess/

RewriteEngine on
RewriteCond %{HTTP:VIA}                 !^$ [OR]
RewriteCond %{HTTP:FORWARDED}           !^$ [OR]
RewriteCond %{HTTP:USERAGENT_VIA}       !^$ [OR]
RewriteCond %{HTTP:X_FORWARDED_FOR}     !^$ [OR]
RewriteCond %{HTTP:PROXY_CONNECTION}    !^$ [OR]
RewriteCond %{HTTP:XPROXY_CONNECTION}   !^$ [OR]
RewriteCond %{HTTP:HTTP_PC_REMOTE_ADDR} !^$ [OR]
RewriteCond %{HTTP:HTTP_CLIENT_IP}      !^$
RewriteRule ^(.*)$ - [F]

To use this code, copy & paste into your site’s root htaccess file. Upload to your server, and test it’s effectiveness via the proxy service(s) of your choice. It may not be perfect, but compared to blacklisting a million proxy domains, it’s lightweight, concise, and very effective ;)


Dialogue

18 Responses Jump to comment form

1Gabry

April 21, 2008 at 8:37 am

Hello was reading your page about the htaccess file to block proxy servers from surfing my site, very interesting, but my host said that since I use FrontPage editor it might block me from editing my site, is there a way to avoid this? Thank you in advance

2H5N1

April 21, 2008 at 10:20 am

Is this already effective? :)
I tried to read this arcticle via web-proxy without problem! :D
I thought this limitation was already implemented here for web-proxy…

3Perishable

April 21, 2008 at 10:48 am

Hi H5N1 :)

No, I do not block proxy servers from Perishable Press. There are a number of readers who (for whatever reason) visit this site via proxy. It is important to me to facilitate site access for this select group of individuals, even at the expense of malicious spam and other attacks. Maybe someday I will change this policy, but for now, it is my hope that the code provided in this article will prove useful to other site owners and webmasters.

4Willard

April 21, 2008 at 10:55 am

I was hoping you’d eventually create an article by itself on this subject! Good advice I must say. =)

I do have one question though.. there seems to be a small difference between what you posted the other day, and what you posted here.. specifically:

RewriteCond %{HTTP:XROXY_CONNECTION} !^$ [OR]

vs.

RewriteCond %{HTTP:XPROXY_CONNECTION} !^$ [OR]

Notice the additional P? I’m just wondering if that was added on purpose.

Thanks for the input if you have any!

5Perishable

April 21, 2008 at 4:57 pm

@Gabry: I am unfamiliar with FrontPage protocols, however you could always try uploading the code and checking for access. Then, if FrontPage is blocked, try removing one line at a time until access is achieved. If successful, this method of removing a line (or two) will reduce the overall effectiveness of the htaccess blocking rules to some degree, but should still provide a significant amount of protection. Also, a cursory search of the required FrontPage protocol indicates that the required header may in fact be X_FORWARDED_FOR or even X-FORWARDED-FOR, which isn’t on the list. So, try the code as-is first and if you are blocked, then try removing the X_FORWARDED_FOR first. Finally, if that fails, try removing different lines one at a time and checking the results. Sorry I couldn’t provide more specific advice, but hopefully these clues will help get you going in the right direction.

6Perishable

April 21, 2008 at 5:15 pm

@Willard: The reason for the change is based on research that suggests that XPROXY is the correct protocol for this purpose. However, after reading your comment and looking into it further, it seems that XROXY is also a commonly employed protocol/header for proxy servers. So, to be honest, I am considering adding the XROXY condition to the htaccess code just to be safe. Further, I am also considering adding three more common proxy protocols to the list as well, which, when added to the XROXY case, would give the following four additions:

RewriteCond %{HTTP:XROXY_CONNECTION} !^$ [OR]
RewriteCond %{HTTP:X-FORWARDED-FOR} !^$ [OR]
RewriteCond %{HTTP:FORWARDED-FOR} !^$ [OR]
RewriteCond %{HTTP:X-FORWARDED} !^$ [OR]

I am thinking that these additional directives will help improve the overall effectiveness of this proxy-blocking technique. I am not going to edit the article just yet, however, as I am hoping that someone with some deeper knowledge of the subject will chime in with some definite information on the topic. I apologize for any confusion in the matter. Thanks for sharing your concerns with us! :)

7prislea

April 23, 2008 at 4:04 am

how I can exclude some ip’s/proxy’s from the filter?

tks.

8Perishable

April 23, 2008 at 8:58 am

Hi prislea, have you tried including an additional rewrite condition targeting the specific domain, for example:

RewriteCond %{HTTP_REFERER} !.*allowedproxydomain.com.*

I haven’t tried this yet, but it may help you to get going in the right direction :)

9sam

April 24, 2008 at 12:33 am

are these conditions suppose to block sites like hidemyass.com or similar sites?
because I tried and its not blocking it.

10David

April 24, 2008 at 8:45 am

I’m looking at this page on blocking proxy servers, using a proxy server.

I tried the code, it doesn’t seem to work for proxylord.com.

11Jeff Starr

April 24, 2008 at 9:56 am

@David: see comment #3 for an explanation as to why you are able to surf this site while using a proxy. Also, this code blocks proxies by targeting associated HTTP protocols. The block list is not comprehensive, so proxies using unlisted methods will not be blocked.

12David

April 24, 2008 at 10:38 am

Yes, I see #3.
Is there a way to block the anonymous proxy server with the .htaccess codes?

Maybe it’s a go Daddy thing.

13Perishable

April 27, 2008 at 9:07 am

Hi David, it should be easy to block the anonymous proxy server via htaccess. Add the following code to your root htaccess file:

# deny domain access
RewriteEngine on
RewriteBase /
RewriteCond %{HTTP_USER_AGENT} anonymous [NC]
RewriteRule ^.* - [F,L]

..of course, this method blocks by targeting the user agent, which may or may not be the same as the domain name. Another way to block a specific proxy is to target the domain itself, as identified via referrer:

RewriteCond %{HTTP_REFERER} ^http://.*anonymous.*$ [NC]

This line should replace the RewriteCond line in the previous code. Remember to test thoroughly!

14Eric

May 2, 2008 at 3:59 pm

Will this also block Paypal IPN? Untested on my end.. waiting for a payment to come through rather than converting all my ipn stuff to sandbox.

15Perishable

May 4, 2008 at 7:23 am

Thanks for the feedback, Eric — keep us updated on the results..

16air force ones

May 22, 2008 at 2:43 am

Hey Perishable。 I have a good idea about how to block proxy server. Cause the operation system of most proxy server are Linux but the operation system of most visitor are windows. So If we can block Linux, maybe can block most proxy server.

17Perishable

May 25, 2008 at 6:31 am

Are you kidding? A good number of my visitors are Linux users. I definitely do not want to block them. I appreciate the idea, but think it would be an unwise move. The last thing I want to do is cater specifically to Windows users..

Subscribe to comments on this post


[ Comments are closed for this post. ]

If you have additional information, contact me.

'Hacking' 카테고리의 다른 글

How to Make Sigs and finding packet id's to get Addresses  (0) 2009.02.04
maxmind.com : anti proxy , block proxy users  (0) 2009.01.30
Reverse Engineering Books  (1) 2009.01.28
Debugger  (0) 2009.01.28
Wark/WPE  (0) 2009.01.27
Posted by CEOinIRVINE
l

How to Compile Wall Hack

Hacking 2009. 1. 24. 10:47
***Updated***

There is a lot of people who was always asking on how to compile
fatboy wallhack source well now....im here to teach you
How to Compile Wallhack
Follow The Instructions:-
1. Download and Install Visual C++ here is a link Downloads.
2. Download Direct SDK Download details: DirectX SDK - (Summer 2004).
3. Open Visual C++ 2008 Express Edition and Click Create Projects.

4. In Project types Click on Win32 then on the Right side click Win32 Project then Name Your Project and Click Ok.


5. Click Application Settings , Click on dll option and Click Finish.


6. Copy the source and Paste it on your Blank page of your project name (.cpp)

name.cpp
Code:
/*creds to me,Roverturbo,Azorbix,Frit0 ,unreal*/


#include <windows.h>
#include <detours.h>
#include <d3d8.h>
#include <d3dx8.h>
#include "log.h"
#include <fstream>
#include <iostream>
#pragma comment(lib, "d3dx8.lib")
#pragma comment(lib, "d3d8.lib")
using namespace std;
static
DWORD dwBeginScene = 0x6D9D9250;
static
DWORD dwEndScene = 0x6d9d93a0;
static
DWORD dwDrawIndexedPrimitive = 0x6d9d73a0;
static
DWORD dwSetStreamSource = 0x6d9d6760;
static
DWORD dwSetViewport = 0x6d9d5b90 ;


int m_Stride;
int texnum;
int nNumVertices;
int nPrimitiveCount;

LPDIRECT3DTEXTURE8 Red,Yellow,Green,Blue,Purple,Pink,Orange;
bool Color = true;
bool Logger = false;
ofstream ofile;
char dlldir[320];
float ScreenCenterX = 0.0f;
float ScreenCenterY = 0.0f;
bool xhair = false;
bool WallHack = false;
bool WallHack2 = false;
HANDLE hand1 =NULL;
HANDLE hand2 =NULL;

DWORD bytes;

//Logger
int texarray[1000];
int arraycounter;
int delarray[500];
int dcount;
unsigned int arrc;
int i=0;


D3DCOLOR redt = D3DCOLOR_XRGB( 255, 0, 0 );


char *GetDirectoryFile(char *filename)
{
static
char path[320];
strcpy(path, dlldir);
strcat(path, filename);
return
path;
}

void __cdecl add_log (const char *fmt, ...)
{
if(
ofile != NULL)
{
if(!
fmt) { return; }

va_list va_alist;
char logbuf[256] = {0};

va_start (va_alist, fmt);
_vsnprintf (logbuf+strlen(logbuf), sizeof(logbuf) - strlen(logbuf), fmt, va_alist);
va_end (va_alist);

ofile << logbuf << endl;
}
}

HRESULT GenerateTexture(IDirect3DDevice8 *pD3Ddev, IDirect3DTexture8 **ppD3Dtex, DWORD colour32)
{
if(
FAILED(pD3Ddev->CreateTexture(8, 8, 1, 0, D3DFMT_A4R4G4B4, D3DPOOL_MANAGED, ppD3Dtex)) )
return
E_FAIL;

WORD colour16 = ((WORD)((colour32>>28)&0xF)<<12)
|(
WORD)(((colour32>>20)&0xF)<<8)
|(
WORD)(((colour32>>12)&0xF)<<4)
|(
WORD)(((colour32>>4)&0xF)<<0);

D3DLOCKED_RECT d3dlr;
(*
ppD3Dtex)->LockRect(0, &d3dlr, 0, 0);
WORD *pDst16 = (WORD*)d3dlr.pBits;

for(
int xy=0; xy < 8*8; xy++)
*
pDst16++ = colour16;

(*
ppD3Dtex)->UnlockRect(0);

return
S_OK;
}


//=================================EndScene_Start=================================================================================//
typedef HRESULT ( WINAPI* oEndScene ) ( LPDIRECT3DDEVICE8 pDevice );
oEndScene pEndScene;

HRESULT WINAPI myEndScene(LPDIRECT3DDEVICE8 pDevice)
{
if(
Color)
{
GenerateTexture(pDevice, &Red, D3DCOLOR_ARGB (255 , 255 , 0 , 0 ));
GenerateTexture(pDevice, &Yellow, D3DCOLOR_ARGB (255 , 255 , 255 , 0 ));
GenerateTexture(pDevice, &Green, D3DCOLOR_ARGB (255 , 0 , 255 , 0 ));
GenerateTexture(pDevice, &Blue, D3DCOLOR_ARGB (255 , 0 , 0 , 255 ));
GenerateTexture(pDevice, &Purple, D3DCOLOR_ARGB (255 , 102 , 0 , 153 ));
GenerateTexture(pDevice, &Pink, D3DCOLOR_ARGB (255 , 255 , 20 , 147 ));
GenerateTexture(pDevice, &Orange, D3DCOLOR_ARGB (255 , 255 , 165 , 0 ));
Color=false;
}

if(
xhair)
{
D3DRECT rec2 = {ScreenCenterX-20, ScreenCenterY, ScreenCenterX+ 20, ScreenCenterY+2};
D3DRECT rec3 = {ScreenCenterX, ScreenCenterY-20, ScreenCenterX+ 2,ScreenCenterY+20};
pDevice->Clear(1, &rec2, D3DCLEAR_TARGET,redt, 0, 0);
pDevice->Clear(1, &rec3, D3DCLEAR_TARGET,redt, 0, 0);
}

//=============================================UnHooK_Start===================================================//

if((GetAsyncKeyState(VK_F5)&1))
{
int end =NULL;
int dip =NULL;
int svp =NULL;
int sss =NULL;


BYTE Unhook[5] = {0x8B,0xFF,0x55,0x8B,0xEC};//Original Function Bytes.
hand1 = GetCurrentProcess();
DWORD dwmodualBase=(DWORD)GetModuleHandle("d3d8.dll");
end = 0x6d9d93a0;
dip = 0x6d9d73a0;
svp = 0x6d9d5b90;
sss = 0x6d9d6760;

WriteProcessMemory(hand1, (void*) end, Unhook, 5, &bytes);
WriteProcessMemory(hand1, (void*) dip, Unhook, 5, &bytes);
WriteProcessMemory(hand1, (void*) svp ,Unhook, 5, &bytes);
WriteProcessMemory(hand1, (void*) sss,Unhook, 5, &bytes);
}
//=========================================UnHook_End=========================================================//

if((GetAsyncKeyState(VK_F1)&1)){xhair=!xhair;}
if((
GetAsyncKeyState(VK_F2)&1)){WallHack=!WallHack;}

return
pEndScene(pDevice);
}
//====================================EndScene_End============================================================================//




//=================================Dip_Start============================================================================================//
typedef HRESULT ( WINAPI* oDrawIndexedPrimitive ) ( LPDIRECT3DDEVICE8 pDevice, D3DPRIMITIVETYPE pType, UINT nMinIndex, UINT nNumVertices, UINT nStartIndex, UINT nPrimitiveCount );
oDrawIndexedPrimitive pDrawIndexedPrimitive;

HRESULT WINAPI myDrawIndexedPrimitive(LPDIRECT3DDEVICE8 pDevice, D3DPRIMITIVETYPE pType, UINT nMinIndex, UINT nNumVertices, UINT nStartIndex, UINT nPrimitiveCount)
{




if(
WallHack)
{
texnum = (nNumVertices*100000)+nPrimitiveCount;
if(
m_Stride==40 &&

(
texnum==7500121 )||(texnum==8500105 )||(texnum==12400168)||(texnum==37000650)||
(
texnum==18000274)||(texnum==8800105 )||(texnum==36900650)||(texnum==19600314)||
(
texnum==21800306)||(texnum==7500121 )||(texnum==8500105 )||(texnum==12400168)||
(
texnum==21800306)||(texnum==36900650)||(texnum==7500121 )||(texnum==37000650)||
(
texnum==18000274)||(texnum==7500121 )||(texnum==8500105 )||(texnum==38000658)||
(
texnum==22100268)||(texnum==62400752)||(texnum==27900456)||(texnum==45700654)||
(
texnum==4800040 )||(texnum==83600752)||(texnum==33400477)||(texnum==38100666)||
(
texnum==2800036 )||(texnum==62400752)||(texnum==29700492)||(texnum==84900778)||
(
texnum==27500442)||(texnum==52100658)||(texnum==62400752)||(texnum==33600552)||
(
texnum==44100646)||(texnum==18000274)||(texnum==37200508)||(texnum==45700654)||
(
texnum==37200508)||(texnum==52100658)||(texnum==52100658) &&



(
nNumVertices == 100 && nPrimitiveCount == 121) || //Foot
(nNumVertices == 105 && nPrimitiveCount == 168) || //Right Arm
(nNumVertices == 132 && nPrimitiveCount == 180) || //Hand
(nNumVertices == 159 && nPrimitiveCount == 200) || //Left Arm
(nNumVertices == 338 && nPrimitiveCount == 534) || //Underbody thanks japennese guy =)
//(nNumVertices == 448 && nPrimitiveCount == 776) || //Head
(nNumVertices == 804 && nPrimitiveCount == 1016) || //Body //SRG Option item
(nNumVertices == 109 && nPrimitiveCount == 110) || //Bulletproof Vest
(nNumVertices == 336 && nPrimitiveCount == 532)) //Battle Pants

{
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_FALSE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_NEVER);
pDevice->SetTexture(0,Orange);
//pDevice->SetRenderState(D3DRS_FILLMODE, D3DFILL_WIREFRAME );

pDrawIndexedPrimitive(pDevice, pType, nMinIndex, nNumVertices, nStartIndex, nPrimitiveCount);

//pDevice->SetRenderState(D3DRS_FILLMODE, D3DFILL_SOLID );
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_TRUE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_LESSEQUAL);
pDevice->SetTexture(0,Pink);
}

if(
m_Stride==40 && texnum== 21300174)
{
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_FALSE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_NEVER);
pDevice->SetTexture(0,Green);//GreenNade
pDrawIndexedPrimitive(pDevice, pType, nMinIndex, nNumVertices, nStartIndex, nPrimitiveCount);
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_TRUE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_LESSEQUAL);
pDevice->SetTexture(0,Purple);
}


if(
nNumVertices == 158 && nPrimitiveCount == 131)
{
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_FALSE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_NEVER);
pDevice->SetTexture(0,Red);//GreenNade
pDrawIndexedPrimitive(pDevice, pType, nMinIndex, nNumVertices, nStartIndex, nPrimitiveCount);
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_TRUE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_LESSEQUAL);
pDevice->SetTexture(0,Yellow);
}

if (
nNumVertices == 171 && nPrimitiveCount == 143)
{

pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_FALSE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_NEVER);
pDevice->SetTexture(0,Red);//GreenNade
pDrawIndexedPrimitive(pDevice, pType, nMinIndex, nNumVertices, nStartIndex, nPrimitiveCount);
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_TRUE);
pDevice->SetRenderState(D3DRS_ZFUNC,D3DCMP_LESSEQUAL);
pDevice->SetTexture(0,Yellow);
}



if(
m_Stride==40 &&//face,mask etc...
(texnum==36700612) ||
(
texnum==9600172 ) ||
(
texnum==14200236) ||
(
texnum==37800552) ||
(
texnum==28100486) ||
(
texnum==35500568) ||
(
texnum==2200024 ) ||
(
texnum==16200243) ||
(
texnum==31900466) ||
(
texnum==19300342) ||
(
texnum==36200604) ||
(
texnum==21300290) ||
(
texnum==35700558) ||
(
texnum==22100396) ||
(
texnum==36100604) ||
(
texnum==27100464) ||
(
texnum==11400180) ||
(
texnum==34900580) ||
(
texnum==13200212) ||
(
texnum==34700538) ||
(
texnum==19500352)&&
(
nNumVertices == 448 && nPrimitiveCount == 776))

{
pDevice->SetTexture(0,Blue);
}


{
pDevice->SetRenderState(D3DRS_FOGENABLE,false);
}

/*Logger
if(m_Stride==40){


while(GetAsyncKeyState(VK_NUMPAD1)&1) arrc--; //Used as manual index for adding textures to delarray
while(GetAsyncKeyState(VK_NUMPAD3)&1) arrc++;
bool alrdy=false;
bool inarr=false;

if(texarray[arrc]==texnum)
if(delarray[i]==texarray[arrc])
alrdy=true;
for(int i=0;i<dcount;i++) //sees if said texture is in delarray
if(delarray[i]==texnum)
inarr=true;
if(texarray[arrc]==texnum || inarr){ //If true, color model differently
LPDIRECT3DTEXTURE8 texCol;
DWORD dwOldZEnable = D3DZB_TRUE;
pDevice->SetTexture(0, NULL);
pDevice->GetRenderState(D3DRS_ZENABLE, &dwOldZEnable);
pDevice->SetRenderState(D3DRS_ZENABLE, D3DZB_FALSE);
if(alrdy) //Different colors for selected models that are already being logged (For removal from array)
texCol=Blue;
else
texCol=Red;
pDevice->SetTexture(0, texCol);
pDrawIndexedPrimitive(pDevice, pType, nMinIndex, nNumVertices, nStartIndex, nPrimitiveCount);
pDevice->SetRenderState(D3DRS_ZENABLE, dwOldZEnable);

}
}
if(GetAsyncKeyState(VK_F5)&1) add_log("Logged tesx: %i", texarray[arrc]); //F5 will print currently selected texnum to logfile
if(GetAsyncKeyState(VK_F6)&1) { //For adding/removing textures to array
bool inarr=true;
for(int k=0;k<dcount;k++){
if(delarray[k]==texarray[arrc])
{
inarr=false;//Found selected texture to already exist
delarray[k]=0;//Delete texture
break;//Cancel loop
}
}
if(inarr==true)
{
delarray[dcount]=texarray[arrc];//Add texture
dcount++;
}
}
if(GetAsyncKeyState(VK_F7)&1){
int total=1;
add_log("omfg values?!? {");
for(int x=0;x<dcount;x++)//Loops through all recorded variables and prints them in a nice array based format
if(delarray[x]){
add_log("%i,",delarray[x]); //add_log2==add_log but without endl
total++;
}
add_log("}; %i variables in array",total);
}
bool found = false; //THIS PART CREDITS TO KRYPTEC
for(int y=0; y<arraycounter; y++) //THIS IS HIS LOGGING FUNCTION
{
if(texnum==texarray[y])found=true; //I JUST CREATED AN INTERFACE FOR IT
}
if(!found && arraycounter < 1000)
{
texarray[arraycounter]=texnum;
arraycounter++;
}*/


}
return
pDrawIndexedPrimitive(pDevice, pType, nMinIndex, nNumVertices, nStartIndex, nPrimitiveCount);
}
//=====================================Dip_End===========================================================================//


//=====================================Sss_Start==========================================================================//
typedef HRESULT ( WINAPI* oSetStreamSource ) ( LPDIRECT3DDEVICE8 pDevice, UINT nStreamNumber, LPDIRECT3DVERTEXBUFFER8 pStreamData, UINT nStride );
oSetStreamSource pSetStreamSource;

HRESULT WINAPI mySetStreamSource(LPDIRECT3DDEVICE8 pDevice, UINT nStreamNumber, LPDIRECT3DVERTEXBUFFER8 pStreamData, UINT nStride)
{
if(
nStreamNumber==0)
m_Stride = nStride;

return
pSetStreamSource(pDevice, nStreamNumber, pStreamData, nStride);
}
//====================================Sss_End============================================================================//

//====================================Svp_Start==========================================================================//
typedef HRESULT (WINAPI* oSetViewport)(LPDIRECT3DDEVICE8 pDevice,CONST D3DVIEWPORT8* pViewport);
oSetViewport pSetViewport;

HRESULT WINAPI mySetViewport(LPDIRECT3DDEVICE8 pDevice,CONST D3DVIEWPORT8* pViewport)
{
ScreenCenterX = ( float )pViewport->Width / 2;
ScreenCenterY = ( float )pViewport->Height / 2;

return
pSetViewport(pDevice,pViewport);
}
//===================================Svp_End=============================================================================//

typedef HRESULT ( WINAPI* oBeginScene ) ( LPDIRECT3DDEVICE8 pDevice );
oBeginScene pBeginScene;

HRESULT WINAPI myBeginScene(LPDIRECT3DDEVICE8 pDevice)
{
if((
GetAsyncKeyState(VK_F6)&1))
{
pEndScene = (oEndScene)DetourFunction((PBYTE)dwEndScene, (PBYTE)myEndScene);
pDrawIndexedPrimitive = (oDrawIndexedPrimitive)DetourFunction((PBYTE)dwDrawIndexedPrimitive, (PBYTE)myDrawIndexedPrimitive);
pSetStreamSource = (oSetStreamSource)DetourFunction((PBYTE)dwSetStreamSource, (PBYTE)mySetStreamSource);
pSetViewport=(oSetViewport)DetourFunction((PBYTE)dwSetViewport,(PBYTE)mySetViewport);
}

return
pBeginScene(pDevice);
}


BOOL WINAPI DllMain ( HMODULE hModule, DWORD dwReason, LPVOID lpReserved )
{
DisableThreadLibraryCalls(hModule);

if (
dwReason == DLL_PROCESS_ATTACH )
{

//=========Log==========================//
GetModuleFileName(hModule, dlldir, 512);
for(
int i = strlen(dlldir); i > 0; i--) { if(dlldir[i] == '\\') { dlldir[i+1] = 0; break; } }
ofile.open(GetDirectoryFile("log.txt"), ios::app);
//=========Log=========================//

pBeginScene = (oBeginScene)DetourFunction((PBYTE)dwBeginScene, (PBYTE)myBeginScene);
pEndScene = (oEndScene)DetourFunction((PBYTE)dwEndScene, (PBYTE)myEndScene);
pDrawIndexedPrimitive = (oDrawIndexedPrimitive)DetourFunction((PBYTE)dwDrawIndexedPrimitive, (PBYTE)myDrawIndexedPrimitive);
pSetStreamSource = (oSetStreamSource)DetourFunction((PBYTE)dwSetStreamSource, (PBYTE)mySetStreamSource);
pSetViewport=(oSetViewport)DetourFunction((PBYTE)dwSetViewport,(PBYTE)mySetViewport);

}
return
TRUE;
}
7.Delete dllmain.cpp You don't Need it.

8. Include stdafx.h should be on top of Other Includes.


9. Click on Projects on top, Click Add New Item.

10.Click on Header file (.h), Name it log and Click Add.

11. Copy and Paste the source on the Header file you Created.
log.h (a header file)
Code:
#define WIN32_LEAN_AND_MEAN

#ifndef _MAIN_H
#define _MAIN_H

char *GetDirectoryFile(char *filename);
void __cdecl add_log (const char * fmt, ...);
#endif


12.go to tools>>option-projects and solution-VC++directories and add direct sdk Summer 2004 includes and library .
13. Click on Project And then Click Properties.


14.Click on Configuration Properties , On the Right side on Character set, Change "Use Unicode Character set" to "Use Multi-Byte Character set" and Click Ok.

15. Download the files i attached in this thread and place the detours.h in your Include folder C:\Program Files\Microsoft Visual Studio 9.0\VC\include and Detours.lib in your Library folder C:\Program Files\Microsoft Visual Studio 9.0\VC\lib.

16. Click Build and Build your Project.


17. You will find your DLL file in C:\Documents and Settings\TheIFear\My Documents\Visual Studio 2008\Projects\(name of your dll)\Debug, and you will find your dll.


Credits:-
Fatboy88 for the source.
Legify for helping me.
The1Fear (me) for making This Tutorial.

If you want to Know How to Make Wallhack Undetected go to Wallhacking (making hacks undetected) Credits to Stickleback

FAQ
Q1: When I copy And paste name.cpp It gives me a whole Straight Line What should I do?
A1: Go and copy it From Fatboy Thread Wallhack: Source Code (Developer's Only)


Q2:I have an error "C1083: Cannot open include file: 'detours.h': No such file or directory" What should i do?
A2: Download the file I attached and place Detours.h in your Include folder C:\Program Files\Microsoft Visual Studio 9.0\VC\include
Detours.lib in your Lib folder C:\Program Files\Microsoft Visual Studio 9.0\VC\lib

Q3:I have another error same as detours.h but now it's asking d3dx8.h what should i do?
A3: Redo Step 12 an add Include of Direct SDK Summer 2004.

Q4:I Have an error "LINK: fatal error LNK1104: unable to open the file 'd3d8.lib' " What should i do?
A4: Redo step 12 and add Library of Direct SDK Summer 2004.

Q5: Does this Wallhack works?
A5:Yes it Does and its detected.

Q6: I get so many errors when i compile it about d3d8.h or other headers what should I do?
A6: Go F.U.C.K yourselves (j.k), you didn't copy all of the source perfectly or something might be missing, so you should either check the source if it copied well or check for the header that keeps appearing in the compiler and re download it and everything should work well.

Q7: Does this work for Windows Vista or 7 (new)?
A7: No it doesn't, you should change the vtable so it can work.

Q8: Will you make a Tutorial for how to make it undetected?
A8: No, And **** off and stop ****ing pm about it you ****ing retards.(j.k) but seriously Stop!!.



Here's a Video Tutorial



Here is a little joke,
:: Knock, knock.

> Who's there?

:: Go.

> Go who?

:: Go **** yourselves.


DON'T SAY THANKS PRESS THANKS

'Hacking' 카테고리의 다른 글

OllyMoreMenu-v1.3c  (0) 2009.01.26
DeFixed_Edition_v2  (0) 2009.01.24
Asprotect UNPACK  (0) 2009.01.24
API & DLL  (1) 2009.01.24
W32DASM Disassembler  (0) 2009.01.24
Posted by CEOinIRVINE
l

U.S. moms control the purse strings at home--to the tune of $2.1 trillion per year, roughly equivalent to the gross domestic product of Italy, the seventh largest economy in the world.

But for all their efforts, marketers could do a better job reaching this audience. According to a recent survey of 3,500 American moms by BSM Media, a Fort Lauderdale, Fla.,-based marketing firm that targets the mother demographic, 65% feel that they are "underserved" by advertisers--either because the mom-focused ads don't resonate or because the ads aren't aimed at moms at all. 

Strike the right nerve, though, and there's a pile of money to be made, even in a rough economy.

In Pictures: Eight Ways To Market To The Modern Mom

In Pictures: 12 Innovative Marketing Techniques

Successfully targeting the mom segment means communicating with them in their lingo, according to Nancy Lowman LaBadie, an executive vice president at Marina Maher Communications, a public relations agency that has handled many of Procter & Gamble's female-focused products, like Secret deodorant, Dawn dish soap and Clairol hair color. "I think companies who learn [that language], understand it and connect with it will reap the rewards," she says.

How to connect? Start by knowing where moms mingle--and, increasingly, that means online. According to the recent BSM Media survey, 71% of moms use the Internet to get product information.



'Business' 카테고리의 다른 글

Top Cash-Back Car Deals  (0) 2009.01.11
Is The Rising Popularity Of The iPod Touch Cutting Into iPhone Sales?  (0) 2009.01.11
Wal-Mart Registers Disappointment  (0) 2009.01.09
Sony's 3-D Dreams  (0) 2009.01.09
Obama On Stimulus: Details To Come  (0) 2009.01.09
Posted by CEOinIRVINE
l
pic
In Pictures: What You Need To Know About Sexual Harassment

Robert Bovarnick

pic
More from this author:
The Law Under Obama
How To Hire A Lawyer
What You Need To Know About Chapter 11
How Will Wall Street's Meltdown Affect Small Biz?
Bankruptcy Basics

I've never much cared for holiday parties, but I will admit it's fun watching normally staid employees make total fools of themselves after too much eggnog at the company shindig.

The problem is that when those antics cross the line, they can spell trouble for owners like me.

Article Controls

imageemail

imageprint

imagereprint

imagenewsletter

imagecomments

imageshare

Yahoo! Buzz

I'm not talking about standing on tables or donning lamp-shade head gear. I'm talking about sexual harassment--everything from mild transgressions and annoyances to serious abuses. Unfortunately, too many employees see a holiday party as a "no-fault zone" for improper behavior, which can lead to all kinds of complications.

Not that harassment is solely the province of holiday parties. Some polls show that 25% of women admit to being harassed in the workplace, with more than half of those reporting emotional harassment or inappropriate touching. Alcohol-infused holiday parties just boost the odds.

'Business' 카테고리의 다른 글

Stormy BlackBerry Sales?  (0) 2008.12.19
Why Apple Won't Wow At Macworld  (0) 2008.12.18
Turning Old Tires Into Cash  (0) 2008.12.18
Slovakia: Fastest-Growing E.U. Economy Slowing Down  (0) 2008.12.18
SEC chairman says agency failed to probe Madoff  (0) 2008.12.18
Posted by CEOinIRVINE
l

Many observers are pessimistic about the economy because they believe a vicious downward cycle has taken hold, where less spending leads to fewer jobs, which reduces purchasing power, leading to even more job losses. Many just can't see how this vicious cycle will stop.

We are frequently asked, what is the "catalyst" for a recovery? What force (external or internal) will break the downward cycle of job losses? How does it ever end?

Taking this thought process to its conclusion clearly shows that something is missing. If job losses beget less spending and more job losses, then recessions would never end. On the other hand, if job gains beget more spending and more job gains, then expansions would never end.

A cursory look at history shows that this can't be true. Since 1854, the U.S. economy has gone through 32 business cycles (recessions and recoveries). In other words, the direction of economic activity eventually changed. Many times in these past cycles, the economy started to recover well before employment turned up. Take the last time consumption fell during a recession, in the early 1990s. In the four quarters after the end of the official recession, "real" (inflation-adjusted) consumption increased 2.9% even as payrolls continued to decline.

There are a number of reasons why this is true. The first reason is that the combined decisions we make as independent members of a free society tend to generate economic growth. When people lose their jobs, it does not mean they lose their ability to be productive. It may take time for them to find a new position that matches their skill set, but as long as they have worthwhile abilities, they will eventually get another chance to produce.

In the meantime, companies can use layoffs to increase efficiency, laying the groundwork for future increases in profits and wages for their remaining workers. What that means is that a 1% loss in jobs results in a smaller than 1% loss of production. And using assets more productively frees up resources to do "new" things. We have lost millions of farming jobs over the decades and centuries, but the nation as a whole is more prosperous as a result, not less.

In addition, if a recession is partly caused by over-investment in a particular sector, two forces drive down jobs in that sector, but one is temporary. For example, home building exceeded demand, and those extra jobs were unnecessary. Reducing inventories of homes will cause employment to fall even further. But once excess inventories are worked off, the industry will add jobs, even if it does not ramp up to the previous peak in production.

'Business' 카테고리의 다른 글

Honda Rides Into Red Territory  (1) 2008.12.18
Ford's Focus  (0) 2008.12.17
Street Rallies Ahead Of Fed  (0) 2008.12.17
Court allows lawsuits over 'light' cigarettes  (0) 2008.12.16
US commission investigates possible violations  (0) 2008.12.16
Posted by CEOinIRVINE
l
http://images.businessweek.com/story/08/370/1211_mz_policy.jpg

Matthew Hollister

What's the best way to stabilize plunging home prices? Treasury Secretary Hank Paulson and his staff are considering plans to push mortgage rates down to 4.5% in hopes of bringing buyers back into the moribund market. But many Democrats—in Congress and on President-elect Barack Obama's team—seem more set on pressing lenders to renegotiate troubled mortgages. That tack, championed by Federal Deposit Insurance Corp. head Sheila Bair, is aimed at trimming foreclosures and ending fire sales.

The differing approaches have led to a standoff. The government transition also makes it less likely that much will happen before Obama takes over in late January. That's worrisome: Without reducing foreclosures and ending the slide in home prices, it will be nearly impossible to stabilize banks and lessen the depth of the recession. And sharply rising unemployment has added new urgency: Last spring, Rod Dubitsky, Credit Suisse's (CS) head of research for asset-backed securities, projected 6.5 million foreclosures. With unemployment set to top 8% in 2009, he says up to 10 million families may lose their homes.

Still, policymakers remain split on the best approach. Bair repeatedly has been ahead of Paulson in calling for a stronger policy response, but when she first suggested pushing lenders harder to modify iffy mortgages last spring, it was dismissed. Since then she has instituted many of her ideas at IndyMac, the failed thrift the FDIC took over in July.

Bair's plan offers a guarantee to lenders that modify a mortgage so payments are trimmed to 31% of a homeowner's gross income. If they cut interest rates or stretch out the life of a loan, Washington would cover part of the lender's losses should a homeowner redefault. Bair says the plan would save 1.5 million homeowners at a cost of $24.4 billion. But skeptics say conflicting investor interests make it legally tough to modify securitized loans. And new statistics suggest that more than half of loans modified early this year are already at least 30 days past due—though Bair notes many early modifications did little to lower homeowners' monthly costs.

Paulson argues that Bair's plan is inappropriate for the Treasury's $700 billion rescue, because it would be an expenditure rather than an investment that would earn a return. The proposal also would reward banks for failed modifications instead of successful ones, since lenders would get subsidies only on loans that redefault.

Obama has said little about his plans, but many in Washington believe Bair's proposals will underpin his foreclosure strategy. And many in both parties (Republicans are especially annoyed) see her efforts to publicize the plan as a bid for a bigger job with Obama.

TREASURY'S OPTIONS

Will the incoming Treasury team clash with Bair, too? According to a recent Bloomberg story, Timothy F. Geithner, the head of the New York Fed and Obama's nominated Treasury Secretary, is also unhappy with Bair and wants her out before her term ends in 2011. An FDIC spokesman dismisses the idea of an ulterior motive as ridiculous, noting that Bair has championed foreclosure mitigation for years. The New York Fed and the Obama transition team declined to comment.

Treasury says it's studying several options, including the plan to subsidize low rates. Proponents say that by bringing new buyers to the market, the move could help end the pricing slide. "That will be far more important than any amount of loan modifications," says Ken Griffin, CEO of hedge fund giant Citadel Investment Group. Problem is, low rates would do little for those now facing foreclosure or trapped in homes worth less than their mortgages. And with just six weeks left, the Bush Administration is unlikely to launch a new program unless Obama's team signals that it backs the idea, says Howard Glaser, a mortgage industry consultant.

On Dec. 4, Fed Chairman Ben Bernanke proposed a variation on Bair's plan that also draws on the Treasury idea. Instead of guaranteeing losses, he said, Uncle Sam could subsidize reduced interest rates on modified loans. While more complex than the FDIC plan, it would "increase the incentive of [mortgage] servicers to be aggressive in reducing monthly payments," he said. With Geithner and Bernanke having worked closely throughout the crisis, the idea could gain traction as Obama's plans become clearer.



Posted by CEOinIRVINE
l

When your partner's real partner is work, here's what to do.

Sarah Morris Smith used to spend 70 hours a week selling Mary Kay cosmetics while her husband, John, a part-time sales associate at Walgreens, stayed home with their infant daughter. "He always did the housework and cooking," says Smith. "I'm sure he resented doing all those chores."

Smith admits that her workaholism ripped her marriage apart. She and John still live together, though they are legally separated. No longer with Mary Kay, Smith works well into the evenings as a recruiter for nSight, a business consultancy in Burlington, Mass.

"I think we might have had a chance if we had shared hobbies or scheduled time together, but I come home and monopolize the computer," says Smith. "Even down-time is work time. I'm giving him primary custody of our daughter because I know my work habits are not fair to her."

In Pictures: Nine Ways To Survive A Workaholic Spouse

In Pictures: Seven Work-Stress Relievers

Sarah and John's situation is all too common. Addiction to work is a marriage killer: Unions involving workaholics are twice as likely to end in divorce, according to a study by researchers at the University of North Carolina at Charlotte. And for couples that choose to gut it out, the psychological toll can be devastating.

Posted by CEOinIRVINE
l