[11:26] <Antrax2000> :D
[14:35]  * Craw^ mano kay Antrax2000 
[15:38] <projectxeno>  my new blog article >> http://blog.rootcon.org/2011/09/demystifying-backdoor-shell.html
[15:57] <compromised> dugo ilong
[15:57] <compromised> heh
[15:57] <compromised> astig, ikaw nag code nung backoodr shell?
[15:58] <compromised> backdoor*
[15:58] <compromised> may ganun pala
[15:58] <compromised> IRC bots
[15:59] <projectxeno> actually avalon
[15:59] <projectxeno> nope d ako
[15:59] <projectxeno> pero may personal released ako
[15:59] <projectxeno> na php
[16:00] <projectxeno> hehe
[16:00] <projectxeno> yung sa screenshot r57 shell yan
[16:00] <projectxeno> tapos site na na napawn which I backdoored
[16:00] <projectxeno> i mean private shell ako
[16:01] <projectxeno> hehe
[16:01] <projectxeno> modify ko lang
[16:02] <projectxeno> this for example is an r57 shell > http://ns10.freeheberg.com/~axelkama/images/configu.php
[16:02] <projectxeno> hmmm
[16:02] <projectxeno> may c99 din na kind of shell
[16:04] <shipcode> may personal ako shell pero prvate po. nxt time cguro debug ko php functions nun
[16:04] <compromised> cool
[16:04] <compromised> para ba yang sa terminal
[16:05] <compromised> pwde mag execute ng commands
[16:05] <shipcode> yep
[16:05] <shipcode> like ls -la
[16:05] <shipcode> perl ircbot.pl
[16:05] <shipcode> uname -a
[16:05] <shipcode> sbin/ifconfig
[16:05] <shipcode> cat /etc/issue
[16:06] <shipcode> kaya lang yang bingay ko sau wla yang run command ^^
[16:07] <shipcode> sa google
[16:07] <shipcode> dami mga shells na masesearch
[16:07] <compromised> ahh
[16:07] <shipcode> mga sites na may shells
[16:07] <shipcode> hehe
[16:07] <compromised> oo
[16:07] <compromised> nde pwde
[16:07] <shipcode> basta dork mo lang
[16:07] <compromised> bakit
[16:07] <shipcode> nka safe mode yan ^^
[16:07] <compromised> anu yung dork
[16:07] <shipcode> dork >> google query po
[16:08] <shipcode> for example
[16:08] <compromised> safe mode?
[16:08] <shipcode> inurl: c99.php site:br
[16:08] <shipcode> safe mode >> lang run or execute command at d ka mka upload
[16:08] <shipcode> but sa shell na yan pwede
[16:09] <compromised> ahh ic
[16:10] <compromised> karamihan ginagamit yan sa hacking?
[16:10] <shipcode> actually
[16:10] <shipcode> pag backdoor na
[16:10] <shipcode> meaning napasok na yan
[16:11] <compromised> san ba yan galing
[16:11] <compromised> paano napasok un dun
[16:11] <shipcode> through sql injection,rfi,remote code execution,sniffing, md5 cracking, bruteforce,etc
[16:11] <shipcode> anong saan galing?
[16:11] <shipcode> yung site ba?
[16:12] <shipcode> actually yung admin ng site na yan
[16:12] <shipcode> d na active
[16:12] <shipcode> so what i did
[16:12] <shipcode> exploit
[16:12] <shipcode> then i emailed the admin
[16:12] <shipcode> then he said
[16:12] <shipcode> i can just have it
[16:12] <shipcode> na
[16:12] <compromised> I mean yung backdoor na shell
[16:12] <shipcode> after reporting it can be xploited
[16:12] <compromised> Ikaw nag lagay nun dun?
[16:13] <compromised> buong server hawak mo mismo?
[16:17] <shipcode> nope sa site lang pre ^^
[16:17] <shipcode> with the admin's permission after saying ur site can be xploited
[16:17] <shipcode> and said
[16:18] <shipcode> u can have it boy coz i don't use it anymore :p
[16:18] <shipcode> promise
[16:24] <compromised> ah ic
[16:25] <compromised> anu namn makukuha mo dun after mo lagyan
[16:28] <shipcode> chk mo post ko sa blog
[16:28] <shipcode> yun na
[16:28] <shipcode> mga benefits