veri-tas Posted January 29, 2011 Report Posted January 29, 2011 (edited) Decriptati serverul: MTk1LjUzLjE2NC4xNDE= Aflati portul de SSHDecriptati userul : f5d1278e8109edd94e1e4197e04873b9 parola : b6bbc888c3621d411da8b250f2935b91Luati drept de root cu : The Rebel: Linux < 2.6.19 udp_sendmsg() local rootExploitul se afla intr-un director pe server ce are permisiunea 777Ii arhivat ca "l.tgz"Gasiti exploitul nu folositi WinSCPPuneti un mesaj pe http://MTk1LjUzLjE2NC4xNDE=:8080/index.html Edited January 29, 2011 by veri-tas Quote
veri-tas Posted January 29, 2011 Author Report Posted January 29, 2011 ia drept de root pe el si schimba indexul Quote
veri-tas Posted January 29, 2011 Author Report Posted January 29, 2011 (edited) Dati delete la post.Nu mai merge serverul. Edited January 29, 2011 by veri-tas Quote
pyth0n3 Posted January 29, 2011 Report Posted January 29, 2011 (edited) care o fost desteptul de o flodat serverul ? Dati delete la post.pai uite cine:NO SKILLS BUT PREBUILD TOOLS Cauta fiecare director cu perm 777find -type d -perm 777 Edited January 29, 2011 by pyth0n3 Quote