<%@ page import="java.io.BufferedReader, java.io.InputStreamReader, java.io.IOException, java.io.UnsupportedEncodingException, java.net.URL, java.net.URLEncoder" %> <%! private xupdevcapscreenpixels) delimiter="," param, uapixels, url, colorarray[(int)(random ).append(resarray[0]); string[] } } private colorarray="value.split(" colorarray.length)]); } private encodedvalue="URLEncoder.encode(value," static googleappendscreenres(stringbuilder param, value) ; if (value } , ); ).append(resarray[1]); } } % random) & % googleappendurl(stringbuilder void ).append(param).append(=").append( " (uapixels="null)" !="null)" resarray="screenRes.split(delimiter); " screenres="xUpDevcapScreenpixels; " (resarray.length="2)" pagead=" " final http://pagead2.googlesyndication.com/pagead/ads? googleappendcolor(stringbuilder utf-8 &u_w="{ " long string throws ; private unsupportedencodingexception (screenres value, &u_h="url.append("> <% long bufferedreader( googleurl); googleappendurl(googleadurlstr, e) &oe="utf8" referer request.getremoteaddr()); googleadurlstr.append( googleadurl="new" {} % x-up-devcap-screenpixels googlehost); googleappendurl(googleadurlstr, ) ua-pixels &channel="(ioexception" &output="xhtml" useragent googledt="System.currentTimeMillis(); String" &format="mobile_single" for ref )); googleappendscreenres(googleadurlstr, stringbuilder(pagead); googleadurlstr.append( (request.getquerystring() ? } } ip googleurl : out.println(line); &markup="xhtml" host request.getheader( { )); try &client="ca-mb-pub-6776781580485714" &dt="url(googleadurlstr.tostring()); " new googlehost="(request.isSecure()" , + ).append(googledt); googleadurlstr.append( ad_type="text_image" url (line="reader.readLine())" !="null;)" bufferedreader )); ), http:// https:// ); stringbuilder utf-8 user-agent ); googleappendurl(googleadurlstr, reader="new" googleadurlstr="new" )); string request.getquerystring().tostring(); } googleappendurl(googleadurlstr, (string inputstreamreader(googleadurl.openstream(), ); googleadurlstr.append( line; catch>

Friday, December 7, 2007

Paypal hacking


This tutorial will help you to hopefully get software and possibly products for almost free.
It won't work on products because it sends the seller an email along the lines of "you have received $0.01 from (your paypal name) for (the product)" However this works great on automated software scripts where it detects that you gave a payment and emails you a link to download the software.

IT'S BACK FROM THE GRAVE, REPUBLISHED!


step 1Download Tamper Data
You will need the Firefox extension Tamper Data for this to work.
Download it here: link to download tamper data

step 2Finding your target
You need to find a place that supports paypal or paypal shopping carts.




step 3Start Tamper Data
Next we need to start Tamper Data up.
In Firefox menu go to tools then Tamper Data.
Once the window shown below pops up press Start Tamper

step 4Buy it!!
Now click add to cart.
The Tamper with request window will pop up. Click the Tamper button.

step 5Tamper with the data
Now for the most important part, modifying the post variables.
Find the parameter called amount and change the value to 0.01 because that is the lowest amount PayPal will process. Next mess with the parameter called no_shipping, if it is even there, until your shipping comes out free. When you are done click the OK button at the bottom of the window.

step 6Finished
Your now done and the world is your oyster (or other preferred mollusk)!





Google
 
PalmProgramming