veri-tas Posted January 29, 2011 Report Share Posted January 29, 2011 (edited) Decriptati serverul: MTk1LjUzLjE2NC4xNDE= Aflati portul de SSHDecriptati userul : f5d1278e8109edd94e1e4197e04873b9 parola : b6bbc888c3621d411da8b250f2935b91Luati drept de root cu : The Rebel: Linux < 2.6.19 udp_sendmsg() local rootExploitul se afla intr-un director pe server ce are permisiunea 777Ii arhivat ca "l.tgz"Gasiti exploitul nu folositi WinSCPPuneti un mesaj pe http://MTk1LjUzLjE2NC4xNDE=:8080/index.html Edited January 29, 2011 by veri-tas Quote Link to comment Share on other sites More sharing options...
luke999 Posted January 29, 2011 Report Share Posted January 29, 2011 user:testerpass:rootitetc... Quote Link to comment Share on other sites More sharing options...
veri-tas Posted January 29, 2011 Author Report Share Posted January 29, 2011 ia drept de root pe el si schimba indexul Quote Link to comment Share on other sites More sharing options...
veri-tas Posted January 29, 2011 Author Report Share Posted January 29, 2011 (edited) Dati delete la post.Nu mai merge serverul. Edited January 29, 2011 by veri-tas Quote Link to comment Share on other sites More sharing options...
pyth0n3 Posted January 29, 2011 Report Share Posted January 29, 2011 (edited) care o fost desteptul de o flodat serverul ? Dati delete la post.pai uite cine:NO SKILLS BUT PREBUILD TOOLS Cauta fiecare director cu perm 777find -type d -perm 777 Edited January 29, 2011 by pyth0n3 Quote Link to comment Share on other sites More sharing options...
angelrusyan Posted January 29, 2011 Report Share Posted January 29, 2011 link picat Quote Link to comment Share on other sites More sharing options...