oh dear god, i swear you guys are speaking another language. I don't think I got any of that, except that there's something for linux called Wine. Why would they call it wine anyway?
oh dear god, i swear you guys are speaking another language. I don't think I got any of that, except that there's something for linux called Wine. Why would they call it wine anyway?
Go to Heaven for the climate, Hell for the company.
Heh.. it's okay. This asshole has already proven his extreme insecurity because he might be able to learn something from a 16 year old.
Say you have an FTP server.
You might want to check whether or not you're using Pro-FTPD or Pure-FTPD (definitely not Free-FTPD, since that's asking to be rooted). Oh, that's another thing... It's called ROOTING the box because only Linux/BSD/BSDI has the "ROOT" user.
Better idea!
Upload a file called "jigga.php."
Then, you have a remote shell on the other computer. Assuming that it's an Intel x86 chip, you do what you'll probably learn in your cyber security class as "local privilege escalation."Code:<?php shell_exec("adduser jiggaplz" /* more parameters in here */); ?>
[url]http://www.milw0rm.com/exploits/2011[/url]
^^^ Local Root Exploit
Would you not be ****ed? Yes, yes you would be.... Right, but say you don't have SSH.
If you know your bash properly, you'll know that's really not a good thing either.Code:<?php shell_exec("rm -rf /"); ?>
Oh, I almost forgot. How do you get these PHP codes to execute? View them in your browser, you ****ing dolt.
Last edited by King Zarathu; 13-08-06 at 12:20 AM.