Tags
- 10g 1 use
- 3g 1 use
- amd64 1 use
- android 1 use
- apache 2 uses
- autohotkey 1 use
- bash 1 use
- beeline 5 uses
- benq 1 use
- bgp 6 uses
- bhyve 1 use
- bind 5 uses
- booteasy 1 use
- bouncycastle 1 use
- buildworld 1 use
- bus_dma 1 use
- bzip2 1 use
- c 1 use
- carp 1 use
- ccp 2 uses
- cisco 10 uses
- clamav 1 use
- compression 1 use
- copyright 1 use
- cpuset 2 uses
- crypto 1 use
- dhcp 3 uses
- dispute 1 use
- dlink 1 use
- dns 11 uses
- donation 6 uses
- dummynet 3 uses
- encryption 2 uses
- ethernet 2 uses
- explosm 5 uses
- fido 1 use
- firefox 6 uses
- flash 2 uses
- freebsd 114 uses
- freenas 1 use
- freeradius 1 use
- fsck 2 uses
- ftpd 2 uses
- gcc 2 uses
- geode 1 use
- geom_uzip 2 uses
- george carlin 2 uses
- gimp 1 use
- google 3 uses
- gre 1 use
- helloworld 1 use
- hetzner 1 use
- http 1 use
- icmp 1 use
- intel 1 use
- ipfw 4 uses
- ipmi 1 use
- ipsec 2 uses
- ipsoft billing 1 use
- iptv 1 use
- ipv6 3 uses
- irq 1 use
- itextpdf 1 use
- jail 1 use
- java 1 use
- job 4 uses
- kavkazcenter 3 uses
- kol-belov 5 uses
- kse 1 use
- l2tp 2 uses
- lagg 2 uses
- libreoffice 1 use
- linuxolator 1 use
- livecd 1 use
- livejournal 6 uses
- lpd 3 uses
- lpr 3 uses
- mac 1 use
- mail 1 use
- math 2 uses
- mdtab 1 use
- memtest 1 use
- mirror 1 use
- mobile phones 2 uses
- mpd 12 uses
- multicast 1 use
- nanobsd 1 use
- nat 2 uses
- netisr 1 use
- networking 109 uses
- nfs 1 use
- nise 1 use
- nokia 2 uses
- notes 1 use
- ntpd 1 use
- openssl 2 uses
- oracle 1 use
- paypal 6 uses
- pci 1 use
- pdf 1 use
- pearlswine 6 uses
- perl 4 uses
- pkg 1 use
- pod 1 use
- politicians 1 use
- ports 2 uses
- pptp 1 use
- pptpgre 1 use
- pseudostreaming 1 use
- quagga 1 use
- radius 2 uses
- raid 1 use
- rar 1 use
- reorder 1 use
- ripe 1 use
- ru-center 1 use
- ru-zone 5 uses
- rutracker 2 uses
- rwr 1 use
- samba 1 use
- screen 1 use
- security 4 uses
- sendfile 1 use
- sendmail 4 uses
- setfib 1 use
- slrn 1 use
- sms 1 use
- smtp 1 use
- soul 38 uses
- ssh 1 use
- ssl 1 use
- strongswan 2 uses
- stunnel 1 use
- sun 1 use
- svn 1 use
- tar 1 use
- tcp 2 uses
- telesyn 4 uses
- threads 1 use
- tls 1 use
- udp 2 uses
- ufs 4 uses
- unicode 2 uses
- ups 1 use
- usb 2 uses
- utf-8 2 uses
- vimage 1 use
- virtualbox 2 uses
- vnet 1 use
- vpn 1 use
- windows 6 uses
- wireless 1 use
- xdm 1 use
- xfce 1 use
- xkcd 5 uses
- xorg 1 use
- xp 1 use
- xpdf 1 use
- xterm 1 use
- xz 1 use
- youtube 40 uses
- zfs 2 uses
- zip 1 use
- zog 1 use
- zte 1 use
- административное 6 uses
- аниме 1 use
- антиоксиданты 1 use
- антропоцентризм 2 uses
- ахиллес 15 uses
- бахайские сады 1 use
- безопасность 3 uses
- биохимия 1 use
- боль 3 uses
- бор 6 uses
- боты 3 uses
- веселые картинки 59 uses
- вивальди 1 use
- видео 31 uses
- википедия 2 uses
- владимир семенович 3 uses
- власть 26 uses
- война 10 uses
- гальцев 1 use
- гост 1 use
- день радио 2 uses
- деньги 21 uses
- дети 3 uses
- др 2 uses
- желязны 1 use
- жесть 20 uses
- жизнь 111 uses
- завгородняя 3 uses
- закладка 7 uses
- заметки на манжетах 1 use
- землетрясение 2 uses
- земля 4 uses
- игорь губерман 4 uses
- иосиф бродский 1 use
- карикатура 8 uses
- кич 6 uses
- клятвы 2 uses
- копроэкономика 3 uses
- корсун 3 uses
- кремация 1 use
- крестьянское 1 use
- крипота 1 use
- крокодил 1 use
- ксенофобия 2 uses
- культисты 1 use
- куросава 1 use
- лавкрафт 1 use
- ле гуин 2 uses
- левашов 1 use
- литература 26 uses
- лондон 1 use
- маразм 38 uses
- матвиенко 1 use
- миронов 1 use
- миядзаки 1 use
- монитор 1 use
- музыка 20 uses
- наркомания 1 use
- наука 7 uses
- нейространсмиттеры 1 use
- некрасов 1 use
- некромантия 10 uses
- новый год 1 use
- образование 10 uses
- отдых 1 use
- отпускное 14 uses
- охота на ведьм 3 uses
- погода 3 uses
- потребности 1 use
- поэзия 27 uses
- пратчетт 10 uses
- промывка мозгов 11 uses
- психо 2 uses
- псой короленко 2 uses
- рабство 6 uses
- рок 5 uses
- русский 1 use
- рюноскэ 1 use
- сайентология 2 uses
- санта 1 use
- свобода выбора 26 uses
- свят-свят 39 uses
- ск 4 uses
- смерть 8 uses
- солженицын 5 uses
- спиваков 2 uses
- стругацкие 1 use
- суинберн 1 use
- тесты 8 uses
- толстая 1 use
- трушевский 1 use
- тюнинг 5 uses
- фидопосты 15 uses
- фото 15 uses
- хейли 1 use
- хостинг 2 uses
- цензура 15 uses
- что смотреть 5 uses
- что читать 28 uses
- шендерович 6 uses
- эцп 1 use
- юмор 43 uses
- юрий никулин 1 use
Style Credit
- Style: Adjustable Gradient for Bannering by
branchandroot
no subject
Date: 2014-04-11 09:04 (UTC)no subject
Date: 2014-04-11 09:41 (UTC)no subject
Date: 2014-04-11 09:42 (UTC)no subject
Date: 2014-04-11 10:35 (UTC)#!/usr/bin/perl -w # $Id: cisco-decrypt.pl,v 1.1.1.1 2002/09/02 16:37:35 marck Exp $ # # Credits for orginal code and description hobbit@avian.org, # SPHiXe, .mudge et al. and for John Bashinski <jbash@cisco.com> # for Cisco IOS password encryption facts. # # Use for any malice or illegal purposes strictly prohibited! # @xlat = ( 0x64, 0x73, 0x66, 0x64, 0x3b, 0x6b, 0x66, 0x6f, 0x41, 0x2c, 0x2e, 0x69, 0x79, 0x65, 0x77, 0x72, 0x6b, 0x6c, 0x64, 0x4a, 0x4b, 0x44, 0x48, 0x53 , 0x55, 0x42 ); while (<>) { if (/(password|md5)\s+7\s+([\da-f]+)/io) { if (!(length($2) & 1)) { $ep = $2; $dp = ""; ($s, $e) = ($2 =~ /^(..)(.+)/o); for ($i = 0; $i < length($e); $i+=2) { $dp .= sprintf "%c",hex(substr($e,$i,2))^$xlat[$s++]; } s/7\s+$ep/$dp/; } } print; }no subject
Date: 2014-04-11 13:23 (UTC)no subject
Date: 2014-04-11 13:00 (UTC)' Decrypt the string ' Function Decrypt(strSource As String, intMethod As Integer) As String Dim strInputString As String, lLen As Long On Error GoTo TheDecErrorHandler ' Check input strInputString = Trim(strSource) lLen = Len(strInputString) ' The string shall be at least four characters long and must have even number of characters If lLen < 4 Or lLen Mod 2 <> 0 Then Decrypt = "" Exit Function End If ' Only 0 (left -> right and 1 (right <- left) are allowed If intMethod <> 0 Then intMethod = 1 ' Hash Table Dim strHexHash() As String, lLastHashNum As Long strHexHash = Split("0x64,0x73,0x66,0x64,0x3b,0x6b,0x66,0x6f,0x41,0x2c,0x2e,0x69,0x79,0x65,0x77,0x72,0x6b,0x6c,0x64,0x4a,0x4b,0x44,0x48,0x53,0x55,0x42,0x73,0x67,0x76,0x63,0x61,0x36,0x39,0x38,0x33,0x34,0x6e,0x63,0x78,0x76,0x39,0x38,0x37,0x33,0x32,0x35,0x34,0x6b,0x3b,0x66,0x67,0x38,0x37", ",") lLastHashNum = UBound(strHexHash) ' Index - must be Numeric and Dec Dim strIndex As String, lIdx As Long strIndex = Mid(strInputString, 1, 2) If Not IsNumeric(strIndex) Then Decrypt = "" Exit Function End If lIdx = CLng(strIndex) ' Index must fit the array If lIdx < 0 Or lIdx > lLastHashNum Then Decrypt = "" Exit Function End If ' Decrypt Dim strOutputString As String, l As Long, strSourceChar As String, intChar As Integer, intHash As Integer, intXORChar As Integer, strDestChar As String For l = 3 To lLen Step 2 ' Source char strSourceChar = Mid(strInputString, l, 2) ' Dec character intChar = CInt("&H" & strSourceChar) ' Hash from the array intHash = CInt(Replace(strHexHash(lIdx), "0x", "&H")) ' XOR intXORChar = intChar Xor intHash ' Dest character strDestChar = Chr(intXORChar) strOutputString = strOutputString & strDestChar ' Move around the hash table If intMethod = 0 Then lIdx = lIdx + 1 If lIdx > lLastHashNum Then lIdx = 0 Else lIdx = lIdx - 1 If lIdx < 0 Then lIdx = lLastHashNum End If Next l Decrypt = strOutputString Exit Function TheDecErrorHandler: Decrypt = "" End Function