Skip navigation

Title : Umbra Loader (all versions) multiple Vulnerabilies
Author : Th3breacher
E-mail : th3breacher@gmail.com
platform : php
Type : SQL Injection / unprotected login bruteforce
Severity : medium
Tested on : ArchLinux
Download : [http://ss-rat.blogspot.in/]
Overview : Umbra Loader is a popular HTTP botnet open source project, and version 1.1.1 has been released recently by the developer, Slayer616.
Vulnerabilities :
–POST-authentification Blind SQL Injection
+POC : http://www.botnet.com/Panel/Panel/delete_command.php?deleteID=%5BBlind_sql_injection%5D

–Unprotected POST credentials check (credentials bruteforce is possible)
+POC : http://www.botnet.com/Panel/Panel/login.php

Advertisements

INTRODUCTION

Once you have a shell and you have some control over a target you go into the post-exploitation phase and you start thinking on how to exploit this control to achieve more stuff. That’s what post-exploitation is about.
We all know how to use Nessus or Acunetix to find remote vulnerabilities (SQLI, XSS, you name it…) but actually there are few tools that could be used to scan the server locally.

In this paper, I will talk about finding local vulnerabilities and I will talk a bit about exploiting them to gain root or to have access to valuable files. Although this article will be focused on Linux, the same basic idea can be applied to other Operating systems.

Download the Paper

Hello Guys , today i’m releasing this new tool i coded some months ago , it’s called “R00tdabitch”
rootdabitch is a multithreaded Linux/UNIX tool to brute-force cracking local root
through su using sucrack =>> http://www.leidecker.info/projects/sucrack.shtml
the magic about this tool is that it works in background , so you can leave it
working for days untill you have results…
Performance : 10 tries per 3 seconds with 10 threads

A howto is included in the zip archive !

Download Link

Hello guys ,

In this tutorial i will be talking about some advanced system backdooring ,
i mean after gaining root on a server , many people will create a new root user ,
others will bind a rootshell in a port and come back later on it , those methods work perfectly but they are easilly detected with logs or just by watching openports or /etc/passwd.

Some other people use rootkits which are widely detected by antimalware , or difficult to setup.

In this tutorial i will show you how to make the easiest/undetectable(kinda) backdoor.
Read More »

Me and Angel Injection released a new tool called Sensitive buster
The Tool has an aim to find vulnerabilities On WebServer ,Admin panels, sensitive files and folders and even backups. This Tool was Coded with Python.

Tutorial and usage

Hello guys , after a long time , i came back with a great SYN Ddos firewall for you !

This is a simple SYN Ddos firewall that i wrote it uses tcp_syncookies ,backlog protection and also
iptables rules and runs in background.

read the description below and enjoy


Usage : Simple , when a SYN attack comes out , run the script as "./antiSyn watchtime & " , watch time deals with the severity of the attack , 10 seconds as default.

Tested on : linux(all)

Here is the source code : http://pastebin.com/MvSibQnd

Hello Guys ,

Chrono deface is basically a shell script that will be executed in the background and will deface a website When you want just give it a date , and With the option that you want.

Features

I’ve chosen to write 2 versions the first one “Grey edition” will be open source and available for everyone :

Grey edition Features:
[+] DEFACE:TO DEFACE a WEBSITE (you need to specify the path and the URL of your deface)
[+] DUMP:TO Dump files and databases to your dropbox (you need to specify the path and database credentials)
[+] MAIL:TO Send you a mail once the deface is done

Black edition Features:

[+] DEFACE:TO DEFACE a WEBSITE (you need to specify the path and the URL of your deface)
[+] DUMP:TO Dump files and databases to your dropbox (you need to specify the path and database credentials)
[+] MAIL:TO Send you a mail once the deface is done
[+] ERASE(black edition):TO Erase all the files (you need to specify the path)
[+] DROPDATABASES(black edition):TO Erase all the databases for a specific user (you need to specify database credentials)
[+] MASSDEFACE(black edition):TO DEFACE all WEBSITES (you need to specify the path /home for example and the URL of your deface)
[+] DELETELOGS(black edition):TO DELETE log files (You need to be root 😀 )

Download:
Download it from here : http://chrono-deface.googlecode.com/files/chronodeface.tar.gz

Screenshot :