导航

心动吧黑客BLOG

自发研究:须要多维思想而且要想不可能为可能的人才能做到

[置顶] [原创]心动吧数据库防下载小工具

 这一个文章和我以前发布的一个文章正好成了一个对比(文章连接),如果上一次是茅。那么此次这个就是盾了.为什么这样说?请看一下上一篇的文章。因为上一次是直接修改数据库的防下载表而不会造成数据沉淀在数据库里面。那么换一个思想来讲。假设在数据库当中并没有这一个防下载表。但是却有防下载功能。

例图:

[置顶] 心动吧警告:除20080508外并未发布其他版本

 先要在此感谢evil的提醒,昨天(2009-3-11)时上网后。发现网上有很多新版本的SHELL发布。而且还声称是终结版(我自己都没把自己终结。倒被你终结了).而且采用了加密手段。。现在我将下载回来程序。。打开并分析一下。现在把报告给大家。请慎重使用。。。。

[置顶] [原创]2009-1-18发布新版◆心动吧asp在线◆

心动吧asp在线-不加密加强版-是市面上目前功能最强的.速度最好的一款asp后门

 此内部版修正了:关于无端口的sql连接出错.通用三种SQL连接方式

效果很好,转个微软IE本地文件探测漏洞

心动吧明生KISS注:刚刚在wooyun.org网站看到了一条这样的信息,感觉十分有用.所以先保存下来先.因为最近在做市场调查.感觉这样的方法可以很容易检测到一些默认的软件是否被启动了..以后找个时间测试一下

 

简要描述:

微软ie在处理对本地文件请求时存在一些问题,可以用来探测本地文件是否存在,忽忽

详细说明:

非res协议哦!

Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4)

#!/usr/bin/perl

# IIS 5.0 FTP Server / Remote SYSTEM exploit

# Win2k SP4 targets

# bug found & exploited by Kingcope, kcope2<at>googlemail.com

# Affects IIS6 with stack cookie protection

# Modded by muts, additional egghunter added for secondary larger payload

# Might take a minute or two for the

....

可以记录windows登陆密码的东东

========原理:

windows的身份验证一般最终都是在lsass进程,默认模块是msv1_0.dll,而关键在其导出函数LsaApLogonUserEx2,

本程序通过注入代码到lsass进程hook LsaApLogonUserEx2,截取密码。只要有身份验证的过程,

LsaApLogonUserEx2就会触发,如ipc$,runsa,3389远程桌面登陆等。



程序对不同系统做了处理,在

....

fly_flash — Jump/XSS/CSRF in Flash

Site: http://www.80sec.com

Date: 2009-8-26

From: http://www.80sec.com/release/fly_flash.txt

80SEC — know it then hack it !

 

[ description ]

Multiple Exploiting IE8/IE7 XSS Vulnerability

Author: www.80vul.com [Email:5up3rh3i#gmail.com]

Release Date: 2009/06/22

References: http://www.80vul.com/ie8/Multiple%20Exploiting%20IE8IE7%20XSS%20Vulnerability.txt

Overview:

Tags[not include

...

Ibp缓冲区溢出漏洞

例如我扫到的IP:127.0.0.1

运行:cmd

运行iis5hack(流光里就有)

      c:\>iis5hack 127.0.

..

Microsoft WPAD Technology Weaknesses

WPAD (Web Proxy Auto Discovery) is a method used by web clients to automatically

locate a browser configuration file used to connect through proxy.



Successful attack on WPAD guarantees attackers full access

on user data sent to Internet

...

IIS 6.0 绕过权限演示

IIS 6.0 webdav Exploit version:phpshell : http://securiteweb.org/?p=117

J’avais écrit u exploit de la version PHPSHELL CODE de iis6.0 webdav vul.

Pour la détail

Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Exploit (patch)

 

Checks for a vulnerability in IIS6 that allows arbitrary users to access secured WebDAV folders by searching for a password-protected folder and attempting to access it. As of May 2009, this vulnerability is unpatched.



A list of well known folders (almost 900) is used by default. Each one is checked, and if returns an authentication request (401), another attempt is tried with the malicious

...

Microsoft IIS 6.0 WebDAV Remote Authentication Bypass Vulnerability

微软IIS 6.0的WebDAV的远程身份验证绕道漏洞

archive: http://milw0rm.com/sploits/2009-IIS-Advisory.pdf



   *** FOR IMMEDIATE RELEASE *** *** FOR IMMEDIATE RELEASE ***



Microsoft IIS 6.0 WebDAV Remote Authentication Bypass



Discovered by Kingcope - May 12th, 2009

分页:[«]1[2][3][»]

日历

<< 2013-5 >>

Sun

Mon

Tue

Wed

Thu

Fri

Sat

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

站内搜索

Copyright ⊙ 2004-2009 心动吧 UrL:ABCXD.CoM All RiGhts Reserved