=== deng_c is now known as deng [11:26] :D [14:35] * Craw^ mano kay Antrax2000 === scryptz0 is now known as shipcode === shipcode is now known as projectxeno [15:38] my new blog article >> http://blog.rootcon.org/2011/09/demystifying-backdoor-shell.html [15:57] dugo ilong [15:57] heh [15:57] astig, ikaw nag code nung backoodr shell? [15:58] backdoor* [15:58] may ganun pala [15:58] IRC bots [15:59] actually avalon [15:59] nope d ako [15:59] pero may personal released ako [15:59] na php [16:00] hehe [16:00] yung sa screenshot r57 shell yan [16:00] tapos site na na napawn which I backdoored [16:00] i mean private shell ako [16:01] hehe [16:01] modify ko lang [16:02] this for example is an r57 shell > http://ns10.freeheberg.com/~axelkama/images/configu.php [16:02] hmmm [16:02] may c99 din na kind of shell === projectxeno is now known as shipcode [16:04] may personal ako shell pero prvate po. nxt time cguro debug ko php functions nun [16:04] cool [16:04] para ba yang sa terminal [16:05] pwde mag execute ng commands [16:05] yep [16:05] like ls -la [16:05] perl ircbot.pl [16:05] uname -a [16:05] sbin/ifconfig [16:05] cat /etc/issue [16:06] kaya lang yang bingay ko sau wla yang run command ^^ [16:07] sa google [16:07] dami mga shells na masesearch [16:07] ahh [16:07] mga sites na may shells [16:07] hehe [16:07] oo [16:07] nde pwde [16:07] basta dork mo lang [16:07] bakit [16:07] nka safe mode yan ^^ [16:07] anu yung dork [16:07] dork >> google query po [16:08] for example [16:08] safe mode? [16:08] inurl: c99.php site:br [16:08] safe mode >> lang run or execute command at d ka mka upload [16:08] but sa shell na yan pwede [16:09] ahh ic [16:10] karamihan ginagamit yan sa hacking? [16:10] actually [16:10] pag backdoor na [16:10] meaning napasok na yan [16:11] san ba yan galing [16:11] paano napasok un dun [16:11] through sql injection,rfi,remote code execution,sniffing, md5 cracking, bruteforce,etc [16:11] anong saan galing? [16:11] yung site ba? [16:12] actually yung admin ng site na yan [16:12] d na active [16:12] so what i did [16:12] exploit [16:12] then i emailed the admin [16:12] then he said [16:12] i can just have it [16:12] na [16:12] I mean yung backdoor na shell [16:12] after reporting it can be xploited [16:12] Ikaw nag lagay nun dun? [16:13] buong server hawak mo mismo? [16:17] nope sa site lang pre ^^ [16:17] with the admin's permission after saying ur site can be xploited [16:17] and said [16:18] u can have it boy coz i don't use it anymore :p [16:18] promise [16:24] ah ic [16:25] anu namn makukuha mo dun after mo lagyan [16:28] chk mo post ko sa blog [16:28] yun na [16:28] mga benefits