Has anyone taken a look over the Source from this "sploit" From what I have read it's a rather sneaky rm -rf! Saw this on Flyninja. It's hilarious if you look back through the open0wn.c "hacks" in the past, the usage and everything appears to be spot on.
URL: http://nopaste.com/p/aDTdT5s1C
--------------------------------
nopaste.com (beta) new paste — shell scripts
pasted by beta at 2009-07-14 14:59:03 UTC
URL: http://nopaste.com/p/aDTdT5s1C
— repaste — plain text
/* 0pen0wn.c by anti-sec group
* ---------------------------
* OpenSSH <= 5.2 REMOTE (r00t) EXPLOIT.
Hey you guys remember all those documentaries about "hackers" and stuff, like there were 2 on tlc, one was TLC Hackers: Outlaws & Angels, and the other one was like TLC Hackers: Computer Outlaws? I was crawlin' the web just messing around trying to find some of these old videos, and i came across a badass torrent, i'll make a link.
http://btjunkie.org/torrent/Documentary-2600-the-last-hope-video/378400a...
Not sure if I put this in the right place but back in March I recently graduated from ITT-Tech with my Associates in Computer Networking. Since then I've been working in a local call center for Enterprise Rent-A-Car. So needless to say I'm a little out of practice. I'd like to start from the ground up if possible that someone could mentor me in the arts of "hacking " and "cracking". Where my interest lies is with a term we should all be familiar with: White Hat. thanks in advance
I looked around the net, and didn't find much info on looking though the RDP files, that said, I didn't bother to read the help either.
This method relies on ARP poisoning to force a man in the middle condition. Cain then decrypts the traffic, however, the passwords are not as easy to view as other passwords with this product.
If anyone else knows of an ap on linux that will decrypt the RDP traffic let me know!!
You can download Cain & Able from http://www.oxid.it/cain.html
Here's the link to Microsoft: http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx
Creds to the author of the script! Chances are you wont find many systems with this not patched these days. While other MS OS's are affected by this vulnerability, this script doesn't apply to them.
The Shell Script: http://milw0rm.org/exploits/7132
You will also need to download and install the following
Impacket : http://oss.coresecurity.com/projects/impacket.html
PyCrypto : http://www.amk.ca/python/code/crypto.html
hi everyone,
i authenticated into a wifi lan
i could log (as "user", so just read...no changes possible) into the web configuration of the wireless router/gateway,
which is a D-Link DI-524 (Firmware Version: V2.04)
i could download the settings backup file (which is called "config.bin")
i'm guessing this file contains also the admin password to the router....do you think it does?
but there's no way i can read the .bin file (seems to be encrypted, maybe the only way is to reverse-engineer the Firmware to understand which way, which algorithm it use to crypt the file....?)
I already Quit gaming for i couldnt read of any what im trying to break with. What im saying is the computer language. Actually im trying to discover what i like and what to do. I have no sports im no good at class then when i tried game breaker or outlaw i like it running program to cheat over game online reading other programs how they do it... and guess what i found some... I intentionally tried to Hack SILKROAD ONLINE... the game was so hard to crack and find way to speed up or boost or bug without being detected just to be one of the top.
http://en.wikipedia.org/wiki/SIM_cloning
"SIM cloning is also sometimes used to unlock phones from foreign providers for use on your home network; by using your Ki and switching between your IMSI and the IMSI that the phone expects the phone can be fooled into thinking that it has the SIM from its native provider (this is commonly done for Japanese phones as well as the iPhone before its software unlock was released).
I am wanting to not really clone but to reprogram my sim and change its IMSI just like the hypersims
There is a pretty interesting blog post located at http://blog.cr0.org/2009/05/write-once-own-everyone.html about a certain java vulnerability. The coolest thing about this exploit to me is that it is 100% java. This means that all of those fancy protection technologies like ASLR, DEP, PaX, etc won't save you if you are vulnerable.
There is also a proof of concept for Mac OS X users located over at http://landonf.bikemonkey.org/code/macosx/CVE-2008-5353.20090519.html
I know this is a little late, but there is a fairly recent Remote Linux Kernel exploit out.
This has been shown to be one of the most, if not the most clean exploit ever written of it's type.
I'm probably not the best person to be describing and talking about it but from the little info I know, it has an SELinux disabling payload that basicly makes SELinux irrelevant. GRsec should in theory protect against it, but we have not fully proven this yet.