Jump to content

em

Active Members
  • Posts

    1909
  • Joined

  • Last visited

  • Days Won

    26

Everything posted by em

  1. em

    [RST] File Pumper

    O descriere ar fi bine venita.
  2. Da-ne output-ul exact. Asta nu ne ajuta prea mult.
  3. freenode @ #linux, #android, #android-dev
  4. Winner. APIx00E00. Congratz. (mai multe raspunsuri corecte, random.org).
  5. Intra pe pornhub si cauta 5 - 6 chestii. Se deschide ca popup.
  6. Dar tu de ce nu il verifici?
  7. Are ?i un java drive-by. Dar pe chrome nu merge (dac? ai ultimul).
  8. @sadik, winner. PM pentru domeniu.
  9. Pe aproape. Fisierele link si dir au cifra "2" dup? drepturi. Oare ce inseamn?? De ce te-ai gândit s? creezi 29 de fi?iere? Presupun c? nu ai avut terminal ca s? testezi
  10. OK. Dar cum aflu eu care e procesul (care e numele lui). Daca as sti ca cineva imi fura rosiile din curte as pune un paznic sa se uite pe camp noaptea. Pe PC cum fac?
  11. În urma rul?rii comenzii ls -l primesc urm?torul output total 36 drw-r--r-T 2 root admins 4096 2009-12-12 10:10 dir1 -rwxr--r-x 2 rst hackers 9845 2010-12-03 04:03 fis1 -rwxr--r-- 1 hy hackers 5000 2011-13-03 04:06 fis2 -rwxr--r-x 2 ccsir hackers 9845 2012-14-03 04:03 link lrwxrwxrwx 1 rst hackers 4 2006-15-09 04:13 linked -> fis1 Cum a?i face s? primi?i acela?i output. Vreau *toate* comenzile. Premiu, domeniu. Fara posturi editate.
  12. Caz real, Din cand in cand iti dispar niste fisiere destul de importante. Cum ati face sa aflati ce proces va sterge lucrurile? Se accepta si raspunsuri teoretice. La raspunsurile mai practice vreau si sistemul de operare la care va referiti (windows, linux, mac). Premiu: Domeniu
  13. @Dubfx, merge de 2 ori w @silvian0, nu, nu apare nimic cand dai ls si esti deconectat @Renegade, nu @shaggi drwxr-xr-x 15 root root 4096 Sep 15 18:12 ./ drwxrwxrwx 26 root root 4096 Mar 25 2013 ../ drwxr-x--- 3 user user 4096 Mar 27 2013 user/ @spide112 ha: command not found
  14. ?tirea e recent? dar datele din arhiva zip par vechi de câteva luni, huh?
  15. em

    Fun stuff

    A venit unu de la enel si a v?zut c? nu am sigiliu pe contor .. si mi-a zis "Accesul fara drept la un sistem informatic (contorul electric) e infractiune" Brb .. iau root pe soneria de la u??.
  16. @silvian0 chmod +x * - nu afiseaza nimic @Eric nu se aplica la telnet/problemei @sadik, orice linux. kernel chior, na @quantum se listeaza fisierele de acolo, fara probleme @Dubfx nu
  17. Conection closed by foreign host. Te-ai deconectat.
  18. @silvian0. nu @sadik /home/user (mai ai o intrebare .. dar ii poti pune pe altii sa puna pentru tine) @Gecko A primit un prieten ca intrebare de interviu la Google. Nu e gandit de mine.
  19. Problema: Te conectezi la serverul X prin telnet .. dai comanda ls si esti deconectat instant. Taskul vostru este sa aflati de ce. Puteti sa imi puneti maxim 2 intrebari de persoana. (De exemplu "Ce se intampla daca incerc X"). Premiu: Domeniu .com/.net/.info A? fi putut face acest challenge practic dar îmi era fric? c? îmi futea?i serverul (fie el ?i virtual).
  20. Da dar, La fel de usor s-ar fi putut face si cu pachete ICMP (ping). In fapt, daca ai VPS/dedicat nu poti fi niciodata 100% sigur ca doar tu ai acces la server.
  21. Have you ever had a machine get compromised? What did you do? Did you run rootkit checkers and reboot? Did you restore from backups or wipe and reinstall the machines, to remove any potential backdoors? In some cases, that may not be enough. In this blog post, we're going to describe how we can gain full control of someone's machine by giving them a piece of hardware which they install into their computer. The backdoor won't leave any trace on the disk, so it won't be eliminated even if the operating system is reinstalled. It's important to note that our ability to do this does not depend on exploiting any bugs in the operating system or other software; our hardware-based backdoor would work even if all the software on the system worked perfectly as designed. I'll let you figure out the social engineering side of getting the hardware installed (birthday "present"?), and instead focus on some of the technical details involved. Our goal is to produce a PCI card which, when present in a machine running Linux, modifies the kernel so that we can control the machine remotely over the Internet. We're going to make the simplifying assumption that we have a virtual machine which is a replica of the actual target machine. In particular, we know the architecture and exact kernel version of the target machine. Our proof-of-concept code will be written to only work on this specific kernel version, but it's mainly just a matter of engineering effort to support a wide range of kernels. Modifying the kernel with a kernel module The easiest way to modify the behavior of our kernel is by loading a kernel module. Let's start by writing a module that will allow us to remotely control a machine. IP packets have a field called the protocol number, which is how systems distinguish between TCP and UDP and other protocols. We're going to pick an unused protocol number, say, 163, and have our module listen for packets with that protocol number. When we receive one, we'll execute its data payload in a shell running as root. This will give us complete remote control of the machine. The Linux kernel has a global table inet_protos consisting of a struct net_protocol * for each protocol number. The important field for our purposes is handler, a pointer to a function which takes a single argument of type struct sk_buff *. Whenever the Linux kernel receives an IP packet, it looks up the entry in inet_protos corresponding to the protocol number of the packet, and if the entry is not NULL, it passes the packet to the handler function. The struct sk_buff type is quite complicated, but the only field we care about is the data field, which is a pointer to the beginning of the payload of the packet (everything after the IP header). We want to pass the payload as commands to a shell running with root privileges. We can create a user-mode process running as root using the call_usermodehelper function, so our handler looks like this: int exec_packet(struct sk_buff *skb) { char *argv[4] = {"/bin/sh", "-c", skb->data, NULL}; char *envp[1] = {NULL}; call_usermodehelper("/bin/sh", argv, envp, UMH_NO_WAIT); kfree_skb(skb); return 0; } We also have to define a struct net_protocol which points to our packet handler, and register it when our module is loaded: const struct net_protocol proto163_protocol = { .handler = exec_packet, .no_policy = 1, .netns_ok = 1 }; int init_module(void) { return (inet_add_protocol(&proto163_protocol, 163) < 0); } Let's build and load the module: Now we can use sendip (available in the sendip Ubuntu package) to construct and send a packet with protocol number 163 from a second machine (named control) to the target machine: Great! It worked. Note that we have to send a null-terminated string in the payload, because that's what call_usermodehelper expects to find in argv and we didn't add a terminator in exec_packet. Sursa: Oracle blog
  22. Mi-am facut o imagine de linux mica (<10MB) pe care am ars-o pe tableta. Pe ea pot instala apache si restul .. Ma gandeam ca ar fi cineva interesat.
×
×
  • Create New...