begood Posted June 5, 2010 Report Posted June 5, 2010 HcJ | Zone-H.orgnod32-antivirus.ro hacked by HcJCine-i tipu ? Quote
Guest .TinKode. Posted June 5, 2010 Report Posted June 5, 2010 Site-ul oficial al Romaniei e: ESET NOD32 Romania: Protectie Antivirus, Antispyware, Antispam, Firewall. Scanare online gratuitaLE: acum am vazut... ca sunt toate Quote
begood Posted June 5, 2010 Author Report Posted June 5, 2010 probabil are exploit 0-day in linux, toate atacurile lui sunt indreptate in acea directie.dati un nmap pe cateva ex-target-uri sa vedem ce au toate in comun. ce kernel de linux, ce porturi etc.//a atacat doar linux si win2003 Quote
Guest .TinKode. Posted June 5, 2010 Report Posted June 5, 2010 http://blog.governmentsecurity.org/ - LOL Quote
Nytro Posted June 5, 2010 Report Posted June 5, 2010 HcJ & Cyb3r-1sT & S4S-T3rr0r!sTCam ei au facut deface si la blackhat-forums de 2 ori, si la multe altele... Quote
andrei.samp Posted June 5, 2010 Report Posted June 5, 2010 (edited) cine sunt tipi astia ?For Contact :HcJ@windwoslive.com Edited June 5, 2010 by andrei.samp Quote
pyth0n3 Posted June 5, 2010 Report Posted June 5, 2010 superantivirus.ro super-antivirus.ronod32romania.roeset.roesetromania.roToate sunt pe aceeasi adresa ip 86.34.171.211Ca domain au BIND 9.5.1-P3Dupa reguli firewall-ul cred ca e stateless OS = Ubuntu webserver = Apache httpd 2.2.8 ((Ubuntu))Kernel version ar fi una din astea Linux 2.6.17 sau Linux 2.6.18.5 Webserverul este descarcat din repository nu e compilat e o version care e precompilat pt ubuntu de aceea sunt sigur ca au ca OS ubuntu PostgreSQL DB ca database As vrea sa fiu putin mai specific pt sistemul operativ cred ca e ubuntu 8.04 server am inteles asta de la banner-ul pe care il arata ssh Server ssh = OpenSSH 4.7p1| ssh-hostkey: 1024 a6:12:b7:46:78:44:21:3a:5c:05:8f:b4:98:09:c2:56 (DSA)|_2048 30:5d:fa:c2:2f:11:8e:2a:7e:31:1d:f3:dd:4e:6e:57 (RSA) Quote
Flubber Posted June 5, 2010 Report Posted June 5, 2010 in concluzie, mai multe domenii iar hosting-ul acelasi ca server, o gaura in server descoperita sau poate in ssh-u ala si aia a fost, nein? Quote
1337 Posted June 5, 2010 Report Posted June 5, 2010 Sunt h4x0ri care au exploituri 0day prin kerneluri de prin linux/ubuntu clar. Pe mine nu ma arde nimeni am MAC si ma doare in .... Quote
pyth0n3 Posted June 5, 2010 Report Posted June 5, 2010 (edited) Apropo ISC BIND 9 is prone to a remote cache-poisoning vulnerability.BIND 9.4.3-P5BIND 9.5.2-P2BIND 9.6.1-P3BIND 9.5.1-P3si multe altele ISC BIND 9 DNSSEC Query Response Additional Section Remote Cache Poisoning VulnerabilitySunt vulnerabile toate versiunile de ubuntu si multe alte distro Nu am vazut exploit oficial dar cred ca multi stiu deja Edited June 5, 2010 by pyth0n3 Quote
Guest catalinkm Posted June 6, 2010 Report Posted June 6, 2010 Is turci astia 2 , Leorexs , UnderCr3w de pe turkhackteam.UnderCr3w | Zone-H.org Quote
Paul4games Posted June 9, 2010 Report Posted June 9, 2010 Pana la urma au astia exploit privat sau carei faza? Quote
pyth0n3 Posted June 14, 2010 Report Posted June 14, 2010 (edited) ahahaha au dat deface la un subdomeniu zone-hbr.zone-h.org hacked by HcJAici au sfrutat o vulnerabilitate a unui alt site care a fost hostat pe acelasi server cu Zone-H - Unrestricted Information , au reusit sa treaca de chroot si au schimbat pagina principala ,Deci se bazeaza pe vulnerabilitati web ceea ce fac ei Edited June 14, 2010 by pyth0n3 Quote