what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 2 of 2 RSS Feed

Files from k3vin mitnick

Real Namedavid kevin
Email addresskevinmitnick at live.fr
Websitetunisianblackhat.blogspot.com
First Active2009-02-03
Last Active2009-02-03
View User Profile

Personal Background

How did you become a hacker?
K3vin Mitchnik : I was only 12 when I first laid my hands on a keyboard. At the time, there was no internet and, for me, the computer was merely a machine on which I could play 2D video games. When I turned 17, I got interested in the online hacking forums and I joined several of them. I didn’t understand much of their content as the administrators and the hackers of the time did not provide full information or tutorials or even explanations on how to use certain software. That’s when I wrote my first hacker article but the entire forum gave me flack and accused me of being a lamer. So I challenged the administrators and the members of this forum to crack a secured system. I won the challenge and convinced them of my abilities. And so I became a hacker.

What attracted you to hacking?
Initially, it was a hobby. I liked the challenge.

And so you went on to create Tunisian Black Hats?
Yes, I co- founded the group in 2007, along with my friend ‘webterrorist’ and two other pals who were very interested in the issue of digital and online security. At the time, broadband connections were just starting to be available in Tunisia and as a consequence the country was opening up. That’s how we decided to model ourselves on existing groups in Europe, Russia and China.


Groone's Guestbook 2.0 Remote File Inclusion
Posted Feb 3, 2009
Authored by k3vin mitnick

Groone's Guestbook version 2.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | c68c5ee7af85f17e26685180f3bd7c7f1a95c6f7dbe63633c395ca1a679dcd8b
Groone GLinks 2.1 Remote File Inclusion
Posted Feb 3, 2009
Authored by k3vin mitnick

Groone GLinks version 2.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2ae8d59b547f45d8a319290094a0dda4c3cf1b3f16af3311e91ca4f91a5c5bea
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close