|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 62
Members: 0
Total: 62
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
PPPLZZZ HELP! HOW I GET THIS?!??? |
|
Posted: Mon Mar 16, 2009 2:24 pm |
|
|
BenMix2 |
Advanced user |
|
|
Joined: Jan 08, 2009 |
Posts: 65 |
|
|
|
|
|
|
|
How i Get Admin Hash By this Exploit:
http://www.milw0rm.com/exploits/1720
????
i have this screen:
Code: |
[~] SERVER : www.**.com
[~] PATH : /
[~] LOGIN : **
[~] PASSWORD : **
[~] TARGET : 0 - IPB 2.0.*
[~] Login ... [ DONE ]
[+] SID: d2c515493ef5ab89d36fad2626b5ed90
[~] Try get md5_check ... [ DONE ]
[+] MD5_CHECK : e15701d0d94a9360b5c37e9a21759dd2
[~] Create new message ... [ DONE ]
[~] Search message ... [ DONE ]
[+] SEARCHID: 382b843900f6104187496c1c647f6d6f
|
Where The MD5 OF THE ADMIN?!!? |
|
|
|
|
Posted: Mon Mar 16, 2009 3:52 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
This is Remote Command Execution exploit.
From exploit source code:
Code: |
while ()
{
print "Command for execute or 'exit' for exit # ";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);
exit() if ($cmd eq 'exit');
last;
}
&run($cmd);
}
|
Did you saw that message when exploit was running? |
|
|
|
|
Posted: Mon Mar 16, 2009 4:13 pm |
|
|
BenMix2 |
Advanced user |
|
|
Joined: Jan 08, 2009 |
Posts: 65 |
|
|
|
|
|
|
|
waraxe wrote: | This is Remote Command Execution exploit.
From exploit source code:
Code: |
while ()
{
print "Command for execute or 'exit' for exit # ";
while(<STDIN>)
{
$cmd=$_;
chomp($cmd);
exit() if ($cmd eq 'exit');
last;
}
&run($cmd);
}
|
Did you saw that message when exploit was running? |
Yes, I saw, what to write for Get the pass hash from the admin?! |
|
|
|
|
Posted: Mon Mar 16, 2009 5:38 pm |
|
|
BenMix2 |
Advanced user |
|
|
Joined: Jan 08, 2009 |
Posts: 65 |
|
|
|
|
|
|
|
plz help!!
What i need to do for GET THE ADMIN HASH ?|!?@!?@!?@? |
|
|
|
|
Posted: Mon Mar 16, 2009 7:37 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
BenMix2 wrote: | plz help!!
What i need to do for GET THE ADMIN HASH ?|!?@!?@!?@? |
Usually the attack goes this way:
-->webapp admin hash-->webapp admin plaintext pass-->
-->log in to admin interface-->find a way to the php code execution-->
-->find a way to operating system level-->local root exploit-->pwnd
Now ... think 1 minute ... you are advanced allready further than admin pass hash
And if you want that hash, then just write some php code for getting the job done - because this exploit gives you ability to execute arbitrary php code on remote server (assuming, that it's really working in your case) |
|
|
|
|
www.waraxe.us Forum Index -> Invision Power Board
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|