=== deng_c is now known as deng | ||
Antrax2000 | :D | 11:26 |
---|---|---|
* Craw^ mano kay Antrax2000 | 14:35 | |
=== scryptz0 is now known as shipcode | ||
=== shipcode is now known as projectxeno | ||
projectxeno | my new blog article >> http://blog.rootcon.org/2011/09/demystifying-backdoor-shell.html | 15:38 |
compromised | dugo ilong | 15:57 |
compromised | heh | 15:57 |
compromised | astig, ikaw nag code nung backoodr shell? | 15:57 |
compromised | backdoor* | 15:58 |
compromised | may ganun pala | 15:58 |
compromised | IRC bots | 15:58 |
projectxeno | actually avalon | 15:59 |
projectxeno | nope d ako | 15:59 |
projectxeno | pero may personal released ako | 15:59 |
projectxeno | na php | 15:59 |
projectxeno | hehe | 16:00 |
projectxeno | yung sa screenshot r57 shell yan | 16:00 |
projectxeno | tapos site na na napawn which I backdoored | 16:00 |
projectxeno | i mean private shell ako | 16:00 |
projectxeno | hehe | 16:01 |
projectxeno | modify ko lang | 16:01 |
projectxeno | this for example is an r57 shell > http://ns10.freeheberg.com/~axelkama/images/configu.php | 16:02 |
projectxeno | hmmm | 16:02 |
projectxeno | may c99 din na kind of shell | 16:02 |
=== projectxeno is now known as shipcode | ||
shipcode | may personal ako shell pero prvate po. nxt time cguro debug ko php functions nun | 16:04 |
compromised | cool | 16:04 |
compromised | para ba yang sa terminal | 16:04 |
compromised | pwde mag execute ng commands | 16:05 |
shipcode | yep | 16:05 |
shipcode | like ls -la | 16:05 |
shipcode | perl ircbot.pl | 16:05 |
shipcode | uname -a | 16:05 |
shipcode | sbin/ifconfig | 16:05 |
shipcode | cat /etc/issue | 16:05 |
shipcode | kaya lang yang bingay ko sau wla yang run command ^^ | 16:06 |
shipcode | sa google | 16:07 |
shipcode | dami mga shells na masesearch | 16:07 |
compromised | ahh | 16:07 |
shipcode | mga sites na may shells | 16:07 |
shipcode | hehe | 16:07 |
compromised | oo | 16:07 |
compromised | nde pwde | 16:07 |
shipcode | basta dork mo lang | 16:07 |
compromised | bakit | 16:07 |
shipcode | nka safe mode yan ^^ | 16:07 |
compromised | anu yung dork | 16:07 |
shipcode | dork >> google query po | 16:07 |
shipcode | for example | 16:08 |
compromised | safe mode? | 16:08 |
shipcode | inurl: c99.php site:br | 16:08 |
shipcode | safe mode >> lang run or execute command at d ka mka upload | 16:08 |
shipcode | but sa shell na yan pwede | 16:08 |
compromised | ahh ic | 16:09 |
compromised | karamihan ginagamit yan sa hacking? | 16:10 |
shipcode | actually | 16:10 |
shipcode | pag backdoor na | 16:10 |
shipcode | meaning napasok na yan | 16:10 |
compromised | san ba yan galing | 16:11 |
compromised | paano napasok un dun | 16:11 |
shipcode | through sql injection,rfi,remote code execution,sniffing, md5 cracking, bruteforce,etc | 16:11 |
shipcode | anong saan galing? | 16:11 |
shipcode | yung site ba? | 16:11 |
shipcode | actually yung admin ng site na yan | 16:12 |
shipcode | d na active | 16:12 |
shipcode | so what i did | 16:12 |
shipcode | exploit | 16:12 |
shipcode | then i emailed the admin | 16:12 |
shipcode | then he said | 16:12 |
shipcode | i can just have it | 16:12 |
shipcode | na | 16:12 |
compromised | I mean yung backdoor na shell | 16:12 |
shipcode | after reporting it can be xploited | 16:12 |
compromised | Ikaw nag lagay nun dun? | 16:12 |
compromised | buong server hawak mo mismo? | 16:13 |
shipcode | nope sa site lang pre ^^ | 16:17 |
shipcode | with the admin's permission after saying ur site can be xploited | 16:17 |
shipcode | and said | 16:17 |
shipcode | u can have it boy coz i don't use it anymore :p | 16:18 |
shipcode | promise | 16:18 |
compromised | ah ic | 16:24 |
compromised | anu namn makukuha mo dun after mo lagyan | 16:25 |
shipcode | chk mo post ko sa blog | 16:28 |
shipcode | yun na | 16:28 |
shipcode | mga benefits | 16:28 |
Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!