You are here: hacking technology > crack analyzes > Content
Hot Articles
Recommend Articles
New Articles
hzhost hypothesized main engine system fatal crack
  Add date: 07/11/2008   Publishing date: 07/11/2008   Hits: 201
Total 2 pages, Current page:1, Jump to page:
 
Editor note: The HZHOST hypothesized main engine management system management system, is quite widespread in the domestic hypothesized main engine application, but saved a such crack to let the human think the heart startled, also let the entire hypothesized main engine system fall to the enemy. Dike of the great distance, destroys in the ant nest! Reminds the fellow network administrators in this (stationmaster), while makes the web procedure which system's maintenance's must pay attention to itself to use to be whether safe.

    Last night is entrusted school teacher, to investigate somebody material (is because on school BBS uncombed hair thing, therefore receives investigation), teacher gives ID is zszs11 and lymft. This 2 ID looks that is very optional, because before is once now had also obtained this BBS the jurisdiction, therefore manager comrade hoped that I assisted to maintain, therefore also gave me one to manage ID, but too long on already had not been deleted. Thereupon does not have in the means the backstage to carry on the operation inquiry user information, the information which the onstage inquires are too few. the zszs11 registration mailbox is zszs11@ *** .com,lymft is lymft126@ ** the Z*.com two people because similarly has replied a title is “our law department has such degenerate unexpectedly…”Card deletion record, card not, therefore does not have the means to continue to trace, but guessed that these 2 ID is a waistcoat, but does not have the conclusive evidence to be unable to draw the conclusion randomly, therefore had a following examination process.

    Examination environment:
    Server: IIS6.0 (non-server crack)
    Hypothesized main engine platform: HzHost
    FTP:Serv-u6.4 (, because table of contents does not have access authority, therefore has not used value)
    Port open situation:
    127.0.0.1: 21 .........Opening
    127.0.0.1: 1433 .........Opens (Mssql) to be very happy has this…
    127.0.0.1: 3306 .........Opens (Mysql)
    127.0.0.1: 3389 .........Opening
    127.0.0.1: 5631 .........Closure
    127.0.0.1: 8080 .........Opening
    127.0.0.1: 43958 .........The closure (showed once more has not used value)

    Front the marginal notes obtain ordinary Asp+Access stand process here to be unclear relate in detail the perspicuity, behind mainly speaks the thorough seepage and a gain jurisdiction process and the mentality.



    The hypothesized main engine jurisdiction establishment unusual dies, is unable including the information to examine.

 The attempt skips other table of contents prompt:



    The typical hypothesized main engine, the majority of people caught in here give up. Actually I also am this idea from the very beginning, but in was too bored, therefore everywhere randomly turned, finally let me not be careful discovers a very serious issue. Has deposited many server IIS unexpectedly under C:\windows\Temp table of contents the advancement pond Session record, but also some are bewildered document Sysdbftp.scr (looked that name and database also have FTP related, did not know that does?)

 
Other pages: : 1 * 2 * Next>>
Prev:About XSS crack another attack tendency Next:php the escapeshellcmd many byte code cracks analyze and extend

Comment:

Category: Home > crack analyzes