Maintaining Access
文章平均质量分 68
Nixawk
这个作者很懒,什么都没留下…
展开
-
Weevely
Weevely 出现已经有一段时间了, 今天原创 2014-07-31 16:56:10 · 2008 阅读 · 0 评论 -
Pentest - Mimikatz
Active Directory supports two primary authentication protoc ols, NTLM and Kerberos. Modern Windows versions default to Kerberos authentication. NTLM suffers from two main weaknesses: 1) the NTLM pass原创 2015-09-12 18:22:56 · 7331 阅读 · 0 评论 -
Joomla - Error-Based SQL Injection
DescriptionTrustwave SpiderLabs researcher Asaf Orpani has discovered an SQL injection vulnerability in versions 3.2 through 3.4.4 of Joomla, a popular open-source Content Management System (CMS). CVE原创 2015-10-24 13:26:42 · 2086 阅读 · 0 评论 -
Security Lab
Following table gives the URLs of all the vulnerable web applications,operating system installations, old software and war games [hacking] sites. TheURLs for individual applications that are part of o原创 2014-08-10 22:40:16 · 2497 阅读 · 0 评论 -
metasploit - encode php backdoor with php/base64
In order to bypass some anti-virus software, we need to encode backdoor file. Metasploit is a good way, e.x.msfvenom -p generic/custom -e php/base64 -f raw PAYLOADFILE=~/source.php -o ~/destination.php原创 2015-03-24 16:10:27 · 1084 阅读 · 0 评论 -
remove chinese caidao mdb password
Backdoors information is in the file called “db.mdb”, we need to export it. When we open the access file, it show us that a invalid password is needed.Oh, what’s the password ? After filtering some se原创 2015-03-21 23:16:53 · 875 阅读 · 0 评论 -
OPENSSH - Build a backdoor
Platforms:CentOS 6.5 x64_x86OPENSSH 5.3This is a OPENSSH backdoor patch.diff -u openssh-5.9p1/auth.c openssh-5.9p1_backdoor/auth.c--- openssh-5.9p1/auth.c 2011-05-29 07:40:42.000000000 -0400++原创 2015-03-11 14:05:27 · 1646 阅读 · 0 评论 -
Metasploit - Tips for Evading Anti-Virus
绕过杀毒软件,有许多钟方法。此处介绍一种,编写python程序调用shellcode,并使用Pyinstaler将python程序编译为exe程序。原创 2014-08-28 01:12:25 · 2389 阅读 · 0 评论 -
Openvas install
OpenVAS 6 installation can be a little confusing for those notfamiliar with the different OpenVAS components. Making it evenmore so is a little problem with libgnutls that is causing manypeople more原创 2014-09-13 15:24:11 · 1659 阅读 · 0 评论 -
create a backdoor deb package
创建 deb 后门安装包, 以常见程序 tree 为例进行说明, 接收第三方的安装包时, 一定要谨慎.原创 2014-08-26 17:36:49 · 1073 阅读 · 0 评论 -
metasploit - HP Data Protector Remote Command Execution
53641 (1) - HP Data Protector Remote CommandExecutionSynopsisThe remoteservice allows remote execution of arbitrary commands withoutauthentication.DescriptionThe remote HPData Protector client原创 2014-09-05 08:39:18 · 2425 阅读 · 0 评论 -
Unix系统后门技术指南
Unix系统后门技术指南简介黑客攻入系统后,面临一项艰巨的任务----保留对系统的访问权限.为了获取服务器固定的访问权限,入侵者必须知道服务器的所有弱点.这不是一件容易的事.后门或 木马,能够让黑客长期享有目标主机的访问权限.不过,这不能一概而论;后门可以做很多不同的事情,但它们的主要目的是保持对受限区域的访问权限.后门(又名,暗门)与木马之间存在着差异:黑客攻入系统后,会在系统中放置后门(入侵者用它进一步访问系统),而木马则为黑客提供独立访问的权限(取决于你是否有权限).入侵者如果不知道如何再次攻原创 2014-08-19 13:05:44 · 4325 阅读 · 0 评论 -
Basic Linux Privilege Escalation
Before starting, I would like to point out - I’m noexpert. As far as I know, there isn’t a “magic”answer, in this huge area. This is simply my finding, typed up, tobe shared(my startingpoint). Bel转载 2014-08-27 20:01:10 · 1607 阅读 · 0 评论