hummmm muito bom.....
hahahh parecem argentinas!
hahahh parecem argentinas!
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Show posts MenuQuoteNome: Hacked by t3rr0rist - Telefone: 35709744600
Hacked by t3rr0rist
Quote from: diemerson on 05 de March , 2010, 12:57:20 AM
não consegui encontrar a linha onde edito o ip do servidor irc ! ;s
pode ajudar ?att.
Quote from: KEst on 06 de February , 2010, 12:16:50 PMQuote from: Negociador on 06 de February , 2010, 12:12:14 PMQuote from: Mateus on 31 de December , 2009, 12:27:54 AMtU LAH CHUPA PAU SEU VIADO
Alguém tá querendo acabar com o mundo na virada do ano....
Mateus Pimentel says (23:24):
*carai...
*sairam uns 0day hoje com os quais dá pra derrubar metade dos sites da internet ^^
(C) Mateus Pimentel says (23:25):
http://www.exploit-db.com/exploits/10825
http://www.exploit-db.com/exploits/10826
http://www.exploit-db.com/exploits/10829
http://www.exploit-db.com/exploits/10820
KKKKKkkkk, Mateus achei que tu se guardava da opção sexual, mas ai cara, denuncia o Negociador ai pra PF.
Fala que ele te chamou de preto viado kkakakakakkakakaka
by KEst
<?php //launch it from apache
error_reporting(0);
set_time_limit(0);
ini_set("default_socket_timeout",5);
$host = $_POST['host'];
$port = $_POST['port'];
$path = $_POST['path'];
$dirs = $_POST['dirs'];
$cl="<br>";
echo"+-----------------------------------------------------------------+".$cl;
echo"| (Yet another) HTTP RESPONSE SCANNER ".$cl;
echo"| by MrRuffl3Z @ http://warmachines.net ".$cl;
echo"+-----------------------------------------------------------------+".$cl;
echo'<br><form name="form" method="post" action="">
Host: <input type="text" name="host" /> Port: <input name="port"
type="text" value="80" size="6" /> Path: <input name="path" type="text"
value="/" /><br><br>Dirs: (one per line)<br><br> <textarea name="dirs"
cols="45" rows="5">admin/</textarea><br><br><input type="submit"
name="button" id="button" value="Submit" /></form>
';
$dirlist = explode("\n",$dirs); //um dir por linha
if(empty($host))
exit;
//nosso packet comum
$packet.="Host: ".$host."\r\n";
$packet.="Connection: Close\r\n";
$packet.="Accept-Encoding: text/html\r\n\r\n";
echo $cl."Starting response scan at ".$host.$cl;
$ip=gethostbyname($host);
foreach($dirlist as $currdir)
{
$sock = fsockopen($ip, $port);
while(!$sock)
{
echo $cl."Failed to connect to host. Trying again. =(".$cl;
$sock = fsockopen($ip, $port);
}
$spacket ="GET ".$path."/".$currdir." HTTP/1.1\r\n".$packet;
fputs($sock,$spacket);
$html='';
while (!feof($sock))
{
if(stristr($html,"\n")){ break; } //precisamos apenas da primeira linha
$html .= fgets($sock, 64);
}
$output = explode("\n",$html);
if(stristr($html,"400")){
echo $cl."DIR: ".$currdir." ERROR: MALFORMED PACKET";
$html='404';
}elseif(!stristr($html,"404")){ //nao mostra respostas 404
echo $cl."DIR: ".$currdir." RESULT: ".$output[0];
}
fclose($sock);
}
/* eu realmente nao tinha nada melhor pra fazer */
?>
Quoteadmin1.php
admin1.html
admin2.php
admin2.html
yonetim.php
yonetim.html
yonetici.php
yonetici.html
adm/
admin/
siteadmin/
administration/
adminpanel/
surveys/admin/
admin/account.php
admin/account.html
admin/index.php
admin/index.html
admin/login.php
admin/login.html
admin/home.php
admin/controlpanel.html
admin/controlpanel.php
admin.php
admin.html
admin/cp.php
admin/cp.html
cp.php
cp.html
administrator/
administrator/index.html
administrator/index.php
administrator/login.html
administrator/login.php
administrator/account.html
administrator/account.php
administrator.php
administrator.html
login.php
login.html
modelsearch/login.php
moderator.php
moderator.html
moderator/login.php
moderator/login.html
moderator/admin.php
moderator/admin.html
moderator/
account.php
account.html
controlpanel/
controlpanel.php
controlpanel.html
admincontrol.php
admincontrol.html
adminpanel.php
adminpanel.html
admin1.asp
admin2.asp
yonetim.asp
yonetici.asp
admin/account.asp
admin/index.asp
admin/login.asp
admin/home.asp
admin/controlpanel.asp
admin.asp
admin/cp.asp
cp.asp
administrator/index.asp
administrator/login.asp
administrator/account.asp
administrator.asp
login.asp
modelsearch/login.asp
moderator.asp
moderator/login.asp
moderator/admin.asp
account.asp
controlpanel.asp
admincontrol.asp
adminpanel.asp
fileadmin/
fileadmin.php
fileadmin.asp
fileadmin.html
administration/
administration.php
administration.html
sysadmin.php
sysadmin.html
phpmyadmin/
myadmin/
sysadmin.asp
sysadmin/
ur-admin.asp
ur-admin.php
ur-admin.html
ur-admin/
Server.php
Server.html
Server.asp
Server/
wp-admin/
administr8.php
administr8.html
administr8/
administr8.asp
webadmin/
webadmin.php
webadmin.asp
webadmin.html
administratie/
admins/
admins.php
admins.asp
admins.html
administrivia/
Database_Administration/
WebAdmin/
useradmin/
sysadmins/
admin1/
system-administration/
administrators/
pgadmin/
directadmin/
staradmin/
ServerAdministrator/
SysAdmin/
administer/
LiveUser_Admin/
sys-admin/
typo3/
panel/
cpanel/
cPanel/
cpanel_file/
platz_login/
rcLogin/
blogindex/
formslogin/
autologin/
support_login/
meta_login/
manuallogin/
simpleLogin/
loginflat/
utility_login/
showlogin/
memlogin/
members/
login-redirect/
sub-login/
wp-login/
login1/
dir-login/
login_db/
xlogin/
smblogin/
customer_login/
UserLogin/
login-us/
acct_login/
admin_area/
bigadmin/
project-admins/
phppgadmin/
pureadmin/
sql-admin/
radmind/
openvpnadmin/
wizmysqladmin/
vadmind/
ezsqliteadmin/
hpwebjetadmin/
newsadmin/
adminpro/
Lotus_Domino_Admin/
bbadmin/
vmailadmin/
Indy_admin/
ccp14admin/
irc-macadmin/
banneradmin/
sshadmin/
phpldapadmin/
macadmin/
administratoraccounts/
admin4_account/
admin4_colon/
radmind-1/
Super-Admin/
AdminTools/
cmsadmin/
SysAdmin2/
globes_admin/
cadmins/
phpSQLiteAdmin/
navSiteAdmin/
server_admin_small/
logo_sysadmin/
server/
database_administration/
power_user/
system_administration/
ss_vms_admin_sm/
Quoteuid=0(root) gid=0(root) groups=33(www-data)
show_help(){
echo ""
echo " 2009 (C) jCd0s.sh - 0day Joomla Core <= 1.5.x com_component DOS"
echo ""
echo " --usage show the exploit Usage"
echo " --prereq show the exploit Prerequisites"
echo " --credits show the exploit Credits"
echo " --help show the Help"
echo ""
echo "Emanuele Gentili <emgent@backtrack.it>"
}
show_credits(){
echo ""
echo " Emanuele 'emgent' Gentili"
echo " http://www.backtrack.it/~emgent/"
echo " emgent @ backtrack.it"
echo ""
}
show_prereq(){
echo ""
echo " 2009 (C) jCd0s.sh - 0day Joomla Core <= 1.5.x com_component DOS"
echo ""
echo " Prerequeisites:"
echo " Bash (yeah because is cool.)"
echo " Curl"
echo ""
echo " Emanuele Gentili <emgent@backtrack.it>"
}
show_usage(){
echo ""
echo " 2009 (C) jCd0s.sh - 0day Joomla Core <= 1.5.x com_component DOS"
echo ""
echo " usage $0 --host http://localhost/joomla/ --requests 1000"
echo ""
echo " Emanuele Gentili <emgent@backtrack.it>"
}