what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 2 of 2 RSS Feed

Files from k3vin mitnick

Real Namedavid kevin
Email addresskevinmitnick at live.fr
Websitetunisianblackhat.blogspot.com
First Active2009-02-03
Last Active2009-02-03
View User Profile

Personal Background

How did you become a hacker?
K3vin Mitchnik : I was only 12 when I first laid my hands on a keyboard. At the time, there was no internet and, for me, the computer was merely a machine on which I could play 2D video games. When I turned 17, I got interested in the online hacking forums and I joined several of them. I didn’t understand much of their content as the administrators and the hackers of the time did not provide full information or tutorials or even explanations on how to use certain software. That’s when I wrote my first hacker article but the entire forum gave me flack and accused me of being a lamer. So I challenged the administrators and the members of this forum to crack a secured system. I won the challenge and convinced them of my abilities. And so I became a hacker.

What attracted you to hacking?
Initially, it was a hobby. I liked the challenge.

And so you went on to create Tunisian Black Hats?
Yes, I co- founded the group in 2007, along with my friend ‘webterrorist’ and two other pals who were very interested in the issue of digital and online security. At the time, broadband connections were just starting to be available in Tunisia and as a consequence the country was opening up. That’s how we decided to model ourselves on existing groups in Europe, Russia and China.


Groone's Guestbook 2.0 Remote File Inclusion
Posted Feb 3, 2009
Authored by k3vin mitnick

Groone's Guestbook version 2.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | c68c5ee7af85f17e26685180f3bd7c7f1a95c6f7dbe63633c395ca1a679dcd8b
Groone GLinks 2.1 Remote File Inclusion
Posted Feb 3, 2009
Authored by k3vin mitnick

Groone GLinks version 2.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2ae8d59b547f45d8a319290094a0dda4c3cf1b3f16af3311e91ca4f91a5c5bea
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close