| === deng_c is now known as deng | ||
| Antrax2000 | :D | 11:26 |
|---|---|---|
| * Craw^ mano kay Antrax2000 | 14:35 | |
| === scryptz0 is now known as shipcode | ||
| === shipcode is now known as projectxeno | ||
| projectxeno | my new blog article >> http://blog.rootcon.org/2011/09/demystifying-backdoor-shell.html | 15:38 |
| compromised | dugo ilong | 15:57 |
| compromised | heh | 15:57 |
| compromised | astig, ikaw nag code nung backoodr shell? | 15:57 |
| compromised | backdoor* | 15:58 |
| compromised | may ganun pala | 15:58 |
| compromised | IRC bots | 15:58 |
| projectxeno | actually avalon | 15:59 |
| projectxeno | nope d ako | 15:59 |
| projectxeno | pero may personal released ako | 15:59 |
| projectxeno | na php | 15:59 |
| projectxeno | hehe | 16:00 |
| projectxeno | yung sa screenshot r57 shell yan | 16:00 |
| projectxeno | tapos site na na napawn which I backdoored | 16:00 |
| projectxeno | i mean private shell ako | 16:00 |
| projectxeno | hehe | 16:01 |
| projectxeno | modify ko lang | 16:01 |
| projectxeno | this for example is an r57 shell > http://ns10.freeheberg.com/~axelkama/images/configu.php | 16:02 |
| projectxeno | hmmm | 16:02 |
| projectxeno | may c99 din na kind of shell | 16:02 |
| === projectxeno is now known as shipcode | ||
| shipcode | may personal ako shell pero prvate po. nxt time cguro debug ko php functions nun | 16:04 |
| compromised | cool | 16:04 |
| compromised | para ba yang sa terminal | 16:04 |
| compromised | pwde mag execute ng commands | 16:05 |
| shipcode | yep | 16:05 |
| shipcode | like ls -la | 16:05 |
| shipcode | perl ircbot.pl | 16:05 |
| shipcode | uname -a | 16:05 |
| shipcode | sbin/ifconfig | 16:05 |
| shipcode | cat /etc/issue | 16:05 |
| shipcode | kaya lang yang bingay ko sau wla yang run command ^^ | 16:06 |
| shipcode | sa google | 16:07 |
| shipcode | dami mga shells na masesearch | 16:07 |
| compromised | ahh | 16:07 |
| shipcode | mga sites na may shells | 16:07 |
| shipcode | hehe | 16:07 |
| compromised | oo | 16:07 |
| compromised | nde pwde | 16:07 |
| shipcode | basta dork mo lang | 16:07 |
| compromised | bakit | 16:07 |
| shipcode | nka safe mode yan ^^ | 16:07 |
| compromised | anu yung dork | 16:07 |
| shipcode | dork >> google query po | 16:07 |
| shipcode | for example | 16:08 |
| compromised | safe mode? | 16:08 |
| shipcode | inurl: c99.php site:br | 16:08 |
| shipcode | safe mode >> lang run or execute command at d ka mka upload | 16:08 |
| shipcode | but sa shell na yan pwede | 16:08 |
| compromised | ahh ic | 16:09 |
| compromised | karamihan ginagamit yan sa hacking? | 16:10 |
| shipcode | actually | 16:10 |
| shipcode | pag backdoor na | 16:10 |
| shipcode | meaning napasok na yan | 16:10 |
| compromised | san ba yan galing | 16:11 |
| compromised | paano napasok un dun | 16:11 |
| shipcode | through sql injection,rfi,remote code execution,sniffing, md5 cracking, bruteforce,etc | 16:11 |
| shipcode | anong saan galing? | 16:11 |
| shipcode | yung site ba? | 16:11 |
| shipcode | actually yung admin ng site na yan | 16:12 |
| shipcode | d na active | 16:12 |
| shipcode | so what i did | 16:12 |
| shipcode | exploit | 16:12 |
| shipcode | then i emailed the admin | 16:12 |
| shipcode | then he said | 16:12 |
| shipcode | i can just have it | 16:12 |
| shipcode | na | 16:12 |
| compromised | I mean yung backdoor na shell | 16:12 |
| shipcode | after reporting it can be xploited | 16:12 |
| compromised | Ikaw nag lagay nun dun? | 16:12 |
| compromised | buong server hawak mo mismo? | 16:13 |
| shipcode | nope sa site lang pre ^^ | 16:17 |
| shipcode | with the admin's permission after saying ur site can be xploited | 16:17 |
| shipcode | and said | 16:17 |
| shipcode | u can have it boy coz i don't use it anymore :p | 16:18 |
| shipcode | promise | 16:18 |
| compromised | ah ic | 16:24 |
| compromised | anu namn makukuha mo dun after mo lagyan | 16:25 |
| shipcode | chk mo post ko sa blog | 16:28 |
| shipcode | yun na | 16:28 |
| shipcode | mga benefits | 16:28 |
Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!