Quantcast
Channel: xL3gi0n Hackers | Hacking Tutorials & Much More !
Viewing all 31 articles
Browse latest View live

#Dark-Jumper v5.8 : SQLi, LFi RFi Scanner

$
0
0
Darkjumper is a free tool what will try to find every website that hosts at the same server as your target. Then check for every vulnerability of each website that host at the same server. features of “Darkjumper”: · scan sql injection, rfi, lfi, blind sql injection · autosql injector · proxy support · verbocity · autoftp bruteforcer [...]

#Big List Of Google Dorks Hacking.

$
0
0
Most of these are outdated but they can still work if you happen to find a vulnerable site: 1: google dork :–> inurl:”/cart.php?m=” target looks lile :–> http://xxxxxxx.com/s…cart.php?m=view exploit: chage cart.php?m=view to /admin target whit exploit :–> http://xxxxxx.com/store/admin Usename : ‘or”=” Password : ‘or”=” 2- google dork :–> allinurlroddetail.asp?prod= target looks like :–> www.xxxxx.org/proddetail.asp?prod=XXXX (big [...]

#RFI Dork’s

$
0
0
/_functions.php?prefix= /cpcommerce/_functions.php?prefix= /modules/coppermine/themes/default/theme.php?THEME_DIR= /modules/agendax/addevent.inc.php?agendax_path= /ashnews.php?pathtoashnews= /eblog/blog.inc.php?xoopsConfig[xoops_url]= /pm/lib.inc.php?pm_path= /b2-tools/gm-2-b2.php?b2inc= /modules/mod_mainmenu.php?mosConfig_absolute_path= /includes/include_once.php?include_file= /e107/e107_handlers/secure_img_render.php?p= /shoutbox/expanded.php?conf= /main.php?x= /myPHPCalendar/admin.php?cal_dir= /index.php/main.php?x= /index.php?include= /index.php?x= /index.php?open= /index.php?visualizar= /template.php?pagina= /index.php?pagina= /index.php?inc= /includes/include_onde.php?include_file= /index.php?page= /index.php?pg= /index.php?show= /index.php?cat= /index.php?file= /db.php?path_local= /index.php?site= /htmltonuke.php?filnavn= /livehelp/inc/pipe.php?HCL_path= /hcl/inc/pipe.php?HCL_path= /inc/pipe.php?HCL_path= /support/faq/inc/pipe.php?HCL_path= /help/faq/inc/pipe.php?HCL_path= /helpcenter/inc/pipe.php?HCL_path= /live-support/inc/pipe.php?HCL_path= /gnu3/index.php?doc= /gnu/index.php?doc= /phpgwapi/setup/tables_update.inc.php?appdir= /forum/install.php?phpbb_root_dir= /includes/calendar.php?phpc_root_path= /includes/setup.php?phpc_root_path= /inc/authform.inc.php?path_pre= /include/authform.inc.php?path_pre= index.php?nic= index.php?sec= index.php?content= index.php?link= index.php?filename= index.php?dir= index.php?document= index.php?view= *.php?sel= [...]

#How To Do XSS

$
0
0
Table Of Contents What is XSS? Finding XSS Vulnerabilities The Basics On XSS Deface Methods Cookie Stealing Filtration Bypassing ___________________ What is XSS? ‘XSS’ also known as ‘CSS’ (Cross Site Scripting, Easily confused with ‘Cascading Style Sheets’) is a very common vulnerbility found in Web Applications, ‘XSS’ allows the attacker to INSERT malicous code,There are [...]

Save The Pandas !

$
0
0
Save the pandas ☢☠☣ ⓧⓁ③ⓖⓘⓞⓝ ☢☠☣ ♠♦♣[---------------------------] ♠♦♣ xL3gi0n Defaces 2 site’s that have to deal with cutting down bamboo. By this he saves pandas and there naturally habitat  they sale there bamboo online to other online merchants and etc… SAVE PANDAS http://giaochau.com.vn/ <– Giao Chau Rattan & Bamboo Manufacture And Export Co. Ltd <– Under the same server http://bamboocraftgc.com/ < – Giao [...]

xL3gi0n Changes His Name !

$
0
0
  Owner of xL3gi0n Hackers which his name he had for the group was (xL3gi0n) .. The group is still called xL3gi0n Hackers but the owner of the group changed his name to.. xPsych0path.. His new contact info his different you can see it below this post of word’s… Haha but anyway’s he just changed his name mainly [...]

#How To Set-Up and Use Dark Comment Rat

$
0
0
You have the RAT dark comet but dont know how to use?  THen. 1. Download Dark comet rat from here : http://adf.ly/Cc6Di 2. Open it and you must see something like this 3. Click on Edit server 4. (Mains stetting) Mutex String: Our RAT client will run in process space of another process to remain stealthy. [...]

#Botnet command server hidden in Tor

$
0
0
The G Data SecurityLabs recently identified a malware sample that takes the next step in Command-and-Control (short: C&C) communication evolution, regarding C&C traffic obfuscation. The botnet owners placed their C&C server, which uses the common IRC protocol, as a hidden service inside of the Tor network. The analyzed bot: Despite the novel way of C&C-communication, [...]

#Tinymce PHP file Manager, Remote File upload vulnerably

$
0
0
Title :Tinymce PHP file Manager, Remote File upload vulnrablity server : Linux Type : webapp Exploit Hamr : remote shell upload Dork : inurl:/file_manager.php?type=img Goto google.com and type dork inurl:/file_manager.php?type=img & inurl:/file_manager.php?type=file to Find vulnrable websites, to get more sites you can modify this dork, Exploit Patch : http://www.site.com/directory/tinymce/file_manager.php?type=file so Goto http://www.site.com/directory/tinymce/file_manager.php?type=file  and upload your file there, if php & html uploading [...]

#DiyWeb Admin Bypass and Remote file/shell Upload exploit

$
0
0
Hi Guys, hope you are well. so we are back on our Old topic after a long time ! enjoy new exploit and please share your views and share our Links on Facebook,twitter etc. Thanks ! so Now turn to work. our new exploit is DiyWeb admin bypass, in this vulnerability we can upload our shell, deface pages, and files by bypassing admin login panel. [...]

#”Custom Upload” remote php shell upload vulnerability

$
0
0
  Google Dork : inurl:customupload.html Poc : fileupload.html SQL injection vulnreblity :  Goto Google.com and Type this dork  : inurl:customupload.html now see results you’ll get something like this http://www.site.com/customupload.html?category=5 now simple put ’ sign to check SQL injection vulnreblity if any error like Warning: Mysql then its vulnreable to Sql injection, now get admin password with Manuall sql injection or use any tool like Havij, SQLMap Remote Shell Upload vulnreblity Goto Google.com and [...]

#Error.php XSS (cross Site Scripting) Vulnerabilities

$
0
0
Title : error.php XSS Risk : Cross site scripting, cookie Grabbing Poc : error.php?error= Dork : “inurl:error.php?error=” browser : Mozilla Firefox  Lets Start Goto Google, and say hello To Google ! now type the dork ”inurl:error.php?error=” in search results ignore all the extra results with diffrent url Like : error-php-error.php pick site with url www.site.com/error.php?error= Only Now Type your [...]

#File Viewer – Remote file upload vulnerability

$
0
0
“file viewer” is just another remote file upload vulnerability, it allows you to upload .html .txt and .jpg files, for shell uploading try .php.jpg or php shell uploading with extension changing [ Tamper data or Live Http headers] Dork : ”file viewer for uploader” and ”File viewer for Uploader (c) 2003 by Dirk Paehl”Goto Google or any other search [...]

#Free Download RR CPanel and WHM cracker By Team IndiShell

$
0
0
RR cracker is Advanced Version of Cpanel and WHM cracker. its Devloped by Indian Hacker and Php Devloper 3r0r1046. New Fuctions in RR Cpanel and WHM cracker php.in Genrator Username Extractor Link to Cpanel/whm of server Auto Store Cracked Panels in A file RR Cracker’s Interface is also userfriendly How to Use ?? first of all [...]

#Op Lolokaust

$
0
0
#Op Lolokaust [#]Main Target & Sponsors Site’s: ==================================== [#]http://www.lolokaust.com[#] [#]http://www.fagart.org[#] [#]http://fooludag.wordpress.com[#] [#]http://www.pixeljoint.com[#] [#]http://goregrish.com[#] [#]http://forum.goregrish.com[#] [#]http://www.electricretard.com[#] [#]http://idlearmy.com[#] ==================================== [#]Lolokaust Facebook Group & Email [#]http://www.facebook.com/groups/72588831304[#] [#]lolokaust@inbox.lv[#] ==================================== [#]Admin’s On The Group & People Behind The Site[#] [#]Sadar Karim ~ Facebook ~ http://www.facebook.com/sadar.karim [#]Pascal Lachdannon ~ Facebook ~ http://www.facebook.com/pascal.lachdannon [#]Antero Hilavetkutin ~ Facebook ~ http://www.facebook.com/antero.hilavetkutin [#]Daniel Woodn ~ Facebook ~ [...]

xL3gi0n Hackers ~ Banned from Facebook ~ No REASON !!

$
0
0

Hello fellow friends, followers,leaders,etc..

Well it has come to my attention that Facebook is trying to stop ‘xL3gi0n Hackers’ , As of today I logged on Facebook and noticed that I was blocked for 30 day’s and then I accept the terms and etc.. But then I got a message from my xC0unt3r saying he got banned to so I looked on my xL3gi0n Hackers page on Facebook. Then I soon noticed all of my members on Facebook was blocked for 30 day’s to so for the next 30 day’s we will try to think of a plan to get back and sorry if we can’t post much… EXPECT US !

Thats what my members saw on Facebook , I know this because I contacted them from Skype

This is what it was showing for mine which I understand but on my other members they where blocked for no reason…

Plus more…..

It was like this for all of my members… I thought I would note to tell you guys… I tried to share this article on my page and my profile it wont even let me do that .. So please help spread this and share so many may know what is going on…


Infecting website with malware

$
0
0

Things Required:

- Shelled Server
- Access to .htaccess file

First Step:

Open your Shell and locate .htaccess file

Second Step:

Copy and save the malware code to .htaccess file.
And you move………….

Click here to see the code:

.::DOWNLOAD::.


Advance Phishing Method

$
0
0

Once you know the basics of Phishing web Page ,come to this post.
Requirements:

  •    Wamp server

  •    Install WinRar

 Ok friends, there’s one drawback in our traditional Phishing web page method. You know what is it? You are right, the url of our phishing web page. It may look like the real one,but it is not.

For eg: we may create the Phishing web page withwww.gmails.com but it’s not at all same as www.gmail.com

Probably, the experienced internet users will notice the URL of web Page. So they won’t fall in our Fishnet.

What we are going to do now?

Why should not we make the phishing web page’s URL looks exactly same as the real Domain Name? You may ask “is it possible?”. My answer is yes, you can. It sounds good? go ahead.

How we are going to implement?

We are going to send an email with an executable to victim.
If the victim double click the executable file, then you are done.
Now whenever the victim enter the real domain name (likewww.facebook.com) ,he will be in our phishing web page.
Don’t worry the domain name is original URL(like http://www.facebook.com)

Got surprised….!!!! You may ask how this is done,go ahead.

How it is done?

Executable file will change the Host file of Victim system.
 

What is host file?

The host file contains Domain Name and IP address associated with them.  Your host file will be in this path:

C:\Windows\System32\drivers\etc\

Whenever we enter the Domain name or URL (for eg:www.webaddress.com), a query will be send to the DNS (Domain Name server).  This DNS connect to the IP address which is associated with the Domain Name.   But before this to be done, thehost file in our system will check for the IP address associated with the Domain Name.  Suppose we make an entry with Domain Nameand IP address of our phishing web page(for  eg:www.webaddress.com wiht our ip 123.23.X.X),then there’s no query will be send to the DNS.
It will automatically connect to the IP address associated with theDomain Name.  This will fruitful for us to mask the PHISHING web page’s URL with Original Domain Name.

Now Let’s divide into the Implementation:

If you are hosting some other hosting site, probably you won’t get the unique IP address for your Phishing Web Page. You can have the IP Address of the hosting only. So if you try to use that IP address, the victim will not bring to your Phishing web page , they will bring to the hosting address.

So what you can do overcome this problem? You need to set up your own Webserver in home. Using Webserver softwares you can set up your own Hosting service.

How To set up Your own server?

Download the  Web server software’s like WAMP, XAMP.  My suggestion is WAMP.  Because it is my favorite one.  It is easy to use.

Downlad the wamp server

Install the WAMP server.  After installation completed, Go to this folder path:

C:\Wamp\WWW

And paste your phishing web page here.

Start the Wamp Server.

(Start->windows->All Programs->Wamp Server->start wamp server)

you can see the half circle icon(wamp server icon) in system tray(i mean near to the time). Click the icon and select the start all services.

 Now type your ip address in address bar of the web browser and hit enter. If you don’t know your ip address ,visitwww.whatismyip.com

Now you can see your Phishing web page in your Browser.

Modifying the Host file:

Copy the Host file from this path “C:\WINDOWS\system32\drivers\etc” to desktop.  Right click on the host file and open with Notepad.

You can see the localhost entry there.
Below that type as :

your_ip     domain_name

For eg:

123.xx.xx.xx  www.gmail.com
.
Save the File.

Compress the Host File:

Compress hosts file such that when victim opens it, it automatically gets copied to default
location C:\Windows\system32\drivers\etc and victim’s hosts file get replaced by our modified hosts file.

Right click on the Hosts file and select the Add to archive option.  Now follow the steps which is shown in picture:

Now send the zipped file to victim.  If he extract the zip file, then the hosts file will be replaced.
You are done.  Now whenever he try to visit the genuine or original website, the phishing webpage only will be shown.

 

Some Disadvantages of this Hack:

  •    If your IP address is dynamically changed ,then it is hard to implement it

  •   If your victim is advanced user,he may notice the certificates of site which is shown by browser.

Note: Your computer should be turned on always. Because if you turned off the computer,then probably host will not be in online. Again it will be available when you turned on. So your computer turned on when victim visits your site.

If you find the tutorial helpful then you like the blog and share it with your friends…………


How to Search for Security Holes

$
0
0

Security holes manifest themselves in (broadly) four ways:

1) Physical Security Holes.

- Where the potential problem is caused by giving unauthorised persons
physical access to the machine, where this might allow them to perform
things that they shouldn’t be able to do.

A good example of this would be a public workstation room where it would
be trivial for a user to reboot a machine into single-user mode and muck
around with the workstation filestore, if precautions are not taken.

Another example of this is the need to restrict access to confidential
backup tapes, which may (otherwise) be read by any user with access to
the tapes and a tape drive, whether they are meant to have permission or
not.



2) Software Security Holes

- Where the problem is caused by badly written items of “privledged”
software (daemons, cronjobs) which can be compromised into doing things
which they shouldn’t oughta.

The most famous example of this is the “sendmail debug” hole (see
bibliography) which would enable a cracker to bootstrap a “root” shell.
This could be used to delete your filestore, create a new account, copy
your password file, anything.

(Contrary to popular opinion, crack attacks via sendmail were not just
restricted to the infamous “Internet Worm” – any cracker could do this
by using “telnet” to port 25 on the target machine. The story behind a
similar hole (this time in the EMACS “move-mail” software) is described
in [Stoll].)

New holes like this appear all the time, and your best hopes are to:

a: try to structure your system so that as little software as possible
runs with root/daemon/bin privileges, and that which does is known to
be robust.

b: subscribe to a mailing list which can get details of problems
and/or fixes out to you as quickly as possible, and then ACT when you
receive information.

> c: When installing/upgrading a given system, try to install/enable only
> those software packages for which you have an immediate or foreseeable
> need. Many packages include daemons or utilities which can reveal
> information to outsiders. For instance, AT&T System V Unix’ accounting
> package includes acctcom(1), which will (by default) allow any user to
> review the daily accounting data for any other user. Many TCP/IP packa-
> ges automatically install/run programs such as rwhod, fingerd, and
> <occasionally> tftpd, all of which can present security problems.
>
> Careful system administration is the solution. Most of these programs
> are initialized/started at boot time; you may wish to modify your boot
> scripts (usually in the /etc, /etc/rc, /etc/rcX.d directories) to pre-
> vent their execution. You may wish to remove some utilities completely.
> For some utilities, a simple chmod(1) can prevent access from unauthorized
> users.
>
> In summary, DON’T TRUST INSTALLATION SCRIPTS/PROGRAMS! Such facilities
> tend to install/run everything in the package without asking you. Most
> installation documentation includes lists of “the programs included in
> this package”; be sure to review it.

3) Incompatible Usage Security Holes

- Where, through lack of experience, or no fault of his/her own, the
System Manager assembles a combination of hardware and software which
when used as a system is seriously flawed from a security point of view.
It is the incompatibility of trying to do two unconnected but useful
things which creates the security hole.

Problems like this are a pain to find once a system is set up and
running, so it is better to build your system with them in mind. It’s
never too late to have a rethink, though.

Some examples are detailed below; let’s not go into them here, it would
only spoil the surprise.

4) Choosing a suitable security philosophy and maintaining it.

>The fourth kind of security problem is one of perception and
>understanding. Perfect software, protected hardware, and compatible
>components don’t work unless you have selected an appropriate security
>policy and turned on the parts of your system that enforce it. Having
>the best password mechanism in the world is worthless if your users
>think that their login name backwards is a good password! Security is
>relative to a policy (or set of policies) and the operation of a system
>in conformance with that policy.



[Guide to finding new holes]

NOTE: I think this should be divided into general categories:
1) General principles
2) Looking for holes in src (most items here)
3) Looking in binary distributions
4) Looking in site specific configurations

The following general classifications suggest themselves:
1) SUID/SGID
2) Return codes/error conditions
3) unexpected input
4) race conditions
5) authentication
6) implicit trust
7) parameters
8) permissions
9) interrupts
10) I/O
11) symbolic links
12) Daemons, particularly those taking user input.
13) Kernel race conditions
14) what else? – please add categories

(Suggested splitting of above into main and sub-catagories)
I: Suid binaries and scripts
unexpected user interactions
flawed liberary calls
implicit assumptions of external conditions (sym links, loc. paths)
race conditions
II: daemons running with priviliged uid’s
race conditions
poor file protectons
implicit file protections
trust
authentication
III: Kernel problems
Kernel race conditions
device driver code

The following four step method was created by System Development
Corporation, who report a 65% success rate on the flaw hypotheses
generated. Doing a comprehensive search for operating system flaws
requires four steps:

Step 1) Knowledge of system control structure.
===============================================
To find security holes, and identifying design weaknesses it is
necessary to understand the system control structure, and layers.
One should be able to list the:
A) security objects: items to be protected. ie: a users file.
B) control objects: items that protect security objects. ie: a i-node
C) mutual objects : objects in both classes. ie: the password file
With such a list, it is possible to graphically represent a control
hierarchy and identify potential points of attack. Making flow charts
to give a visual breakdown of relationships definitely helps.
Reading the various users, operators, and administrators manuals should
provide this information.
(following para’s should probably be moved to a “legal” section)
Reading and greping source code should also prove valuable. For those
without a source licence, I would suggest we use LINUX, NET2, and BSD386
distributions in order to stay legal. At some future time we may be able
to form a working contract between someone or a company with legal access
to other distributions and members actively participating in this project.
It appears that extracts of proprietary code may be used for academic
study, so long as they are not reused in a commercial product – more
checking is necessary though.

Step 2) Generate an inventory of suspected flaws. (i.e. flaw hypotheses)
========================================================================
In particular we want:
Code history:
What UNIX src does a particular flavor derive from? This is important
for cross references (very often only one vendor patches certain code,
which may get reused, in it’s unpatched reincarnation by others)
A solid cross reference:
Who checked which bug in what OS and what version prevents us from
duplicating work.

A good start would be listing all the suid binaries on the various OS
flavors/versions. Then try to work out why each program is suid. i.e.:
rcp is suid root because it must use a privilaged port to do user
name authentication.
Often code that was never designed to be suid, is made suid, durring
porting to solve file access problems.
We need to develope a data base that will be able to look at pairs and
triplets of data, specificly: program name, suid, sgid, object accessed
(why prog is suid/sgid), OS flavor/version, and flav/vers geniology.
Any sugestions on how to implement such a DB?

Step 3) Confirm hypotheses. (test and exploit flaws)
====================================================

Step 4) Make generalizations of the underlying system weaknesses, for
which the flaw represents a specific instance.
=====================================================================

Tool Box:
=========
AGREP: I suggest everyone obtain, and install agrep from:
ftp cs.arizona.edu /agrep/agrep.tar.Z
Agrep supports “windowing” so it can look for routines, and subroutines.
It also supports logical operators and is thus ideally suited to automating
the search for many of the following flaws. i.e. <psudocode>
agrep WINDOW {suid() NOT taintperl()} /usr/local/*.pl
or agrep WINDOW {[suid() OR sgid()] AND [system() OR popen() OR execlp()
OR execvp()]} /usr/local/src/*.c

PERMUTATION PROGRAM: Another tool worth producing is a program to generate
all possible permutations of command line flags/arguments in order to uncover
undocumented features, and try to produce errors.

TCOV:

CRASH: Posted to USENET (what FTP archive?) (descrip?)

PAPERS: There are several papers that discuss methods of finding flaws, and
present test suites.
1) An Emphirical Study of the reliability of UNIX Utilities, by Barton P.
Miller, Lars Fredriksen, and Bryan So, Comm ACM, v33 n12, pp32-44,
Dec ’90. Describes a test suite for testing random input strings.
Results indicated that 25% of the programs hung, crashed, or misbehaved.
In one case the OS crashed. An understanding of buffer and register
layout on the environment in question, and the expected input is likely
to produce the desired results.
2) The Mothra tools set, in Proceedings of the 22nd Hawaii International
Conference on Systems and Software, pages 275-284, Kona, HI, January ’89
3) Extending Mutation Testing to Find Environmental Bugs, by Eugene H.
Spafford, Software Practice and Experience, 20(2):181-189, Feb ’90
4) A paper by IBM was mentioned that was submitted to USENIX a few years
ago. (Anyone have a citation?).

Specific Flaws to Check For:
============================
1) Look for routines that don’t do boundary checking, or verify input.
ie: the gets() family of routines, where it is possible to overwrite
buffer boundaries. ( sprintf()?, gets(), etc. )
also: strcpy() which is why most src has:
#define SCYPYN((a)(b)) strcpy(a, b, sizeof(a))

2) SUID/SGID routines written in one of the shells, instead of C or
PERL.

3) SUID/SGID routines written in PERL that don’t use the “taintperl”
program.)

4) SUID/SGID routines that use the system(), popen(), execlp(), or
execvp() calls to run something else.

5) Any program that uses relative path names inside the program.

6) The use of relative path names to specify dynamically linked libraries.
(look in Makefile).

7) Routines that don’t check error return codes from system calls. (ie:
fork(2), suid(2), etc), setuid() rather, as in the famous rcp bug

8) Holes can often be found in code that:
A) is ported to a new environment.
B) receives unexpected input.
C) interacts with other local software.
D) accesses system files like passwd, L.sys, etc.
E) reads input from a publicly writable file/directory.
F) diagnostic programs which are typically not user-proofed.

9) Test code for unexpected input. Coverage, data flow, and mutation
testing tools are available.

10) Look in man pages, and users guides for warnings against doing X, and
try variations of X. Ditto for “bugs” section.

11) Look for seldom used, or unusual functions or commands – read backwards.
In particular looking for undocumented flags/arguments may prove useful.
Check flags that were in prior releases, or in other OS versions. Check
for options that other programs might use. For instance telnet uses -h
option to login …
right, as most login.c’s I’ve seen have:
if((getuid()) && hflag){
syslog()
exit()
}

12) Look for race conditions.

13) Failure of software to authenticate that it is really communicating
with the desired software or hardware module it wants to be accessing.

14) Lack or error detection to reset protection mechanisms following an
error.

15) Poor implementation resulting in, for example, condition codes being
improperly tested.

16) Implicit trust: Routine B assumes routine A’s parameters are correct
because routine A is a system process.

17) System stores it’s data or references user parameters in the users
address space.

18) Inter process communication: return conditions (passwd OK, illegal
parameter, segment error, etc) can provide a significant wedge, esp.
when combined with (17).

19) User parameters may not be adequately checked.

20) Addresses that overlap or refer to system areas.

21) Condition code checks may be omitted.

22) Failure to anticipate unusual or extraordinary parameters.

23) Look for system levels where the modules involved were written by
different programmers, or groups of programmers – holes are likely
to be found.

24) Registers that point to the location of a parameters value instead
of passing the value itself.

25) Any program running with system privileges. (too many progs are given
uid 0, to facilitate access to certain tables, etc.)

26) Group or world readable temporary files, buffers, etc.

27) Lack of threshold values, and lack of logging/notification once these
have been triggered.

28) Changing parameters of critical system areas prior to their execution
by a concurrent process. (race conditions)

29) Inadequate boundary checking at compile time, for example, a user
may be able to execute machine code disguised as data in a data area.
(if text and data areas are shared)

30) Improperly handling user generated asynchronous interrupts. Users
interrupting a process, performing an operation, and either returning
to continue the process or begin another will frequently leave the
system in an unprotected state. Partially written files are left open,
improper writing of protection infraction messages, improper setting
of protection bits, etc often occur.

31) Code that uses fopen(3) without setting the umask. ( eg: at(1), etc. )
In general, code that does not reset the real and effective uid before
forking.

32) Trace is your friend (or truss in SVR4) for helping figure out what
system calls a program is using.

33) Scan /usr/local fs’s closely. Many admins will install software from
the net. Often you’ll find tcpdump, top, nfswatch, … suid’d root for
their ease of use.

34) Check suid programs to see if they are the ones originally put on the
system. Admins will sometimes put in a passwd replacement which is less
secure than the distributed version.

35) Look for programs that were there to install software or loadable
kernel modules.

36) Dynamically linked programs in general. Remember LD_PRELOAD, I think
that was the variable.

37) I/O channel programming is a prime target. Look for logical errors,
inconsistencies, and omissions.

38) See if it’s possible for a I/O channel program to modify itself, loop
back, and then execute the newly modified code. (instruction pre-load
may screw this up)

39) If I/O channels act as independent processors they may have unlimited
access to memory, thus system code may be modified in memory prior to
execution.

40) Look for bugs requiring flaws in multiple pieces of software, i.e. say
program a can be used to change config file /etc/a now program b assumes
the information in a to be correct and this leads to unexpected results
(just look at how many programs trust /etc/utmp)

41) Any program, especially those suid/sgid, that allow shell escapes.


How to Symlink

$
0
0
File to do Symlink : 
Example website that I have put shell :

http://kdeft.com

1) Open shell that you have put it ..
# Upload dk.php :

[Image: Capture.JPG]

2) After you upload, open file that you have upload and it must be like this :

[Image: Capture1.JPG]

3) Create 1 file in dk.php > Put whatever name you want > I put underdeath in this tutorial :

[Image: Capture2.JPG]

4) Open folder that you have create > Upload file : .htaccess and alsoft.pl

5) Change permission number at alsoft.pl
# Click to alsoft.pl > Change to 0755 :

[Image: Capture3.JPG]
[Image: Capture.JPG]

6) Open the website with the file you just create like this :

[Image: 409692_255106894592715_1674802031_n.jpg]

7) Click at alsoft.pl
8) Open your shell back
# The firts shell in this tutorial > Click eval > And click go until it be like this :

[Image: Capture.JPG]

9) Copy all
10) Paste at alsoft.pl > Click Get Config :

[Image: Capture5.JPG]

11) Then, upload domains.php and database.php at shell *Scroll Up*
# After upload, make sure it be like this :

[Image: Capture7.JPG]

12) Done ! :

[Image: Capture8.JPG]

 


Viewing all 31 articles
Browse latest View live