Yesterday complied to look for several linux meat chicken test order to wzt, opened http://www.milw0rm.com/webapps.php, looked for the include crack's procedure to try, obtained webshell very quickly, did not have any flattery, redhat9 machine, then localroot.
Inserted the sentence words, in this article ip address and main engine has been replaced, please do not take a seat according to ticket number, this article technique only supplied the reference, in the regular invasion examination operation, we needed to pay attention to many flows and the detail question. Moreover this article to some basic concepts or procedure and so on does not make the explanation, if has not the clear place, consults google.
Has entered the meat chicken, exchanges our ssh back door, the concrete method might finds on http://baoz.net or http://xsec.org, brings the video frequency course.
As soon as enters ssh, oh, strange, the rice country people send regards the South Korean people? Has the difference ......
Last login: Fri Nov 17 08:21: 14 2006 from ac9e2da9.ipt.aol.com
Curious, sweeps.
[fatb@baoz ~] $ nmap - P0 ac9e2da9.ipt.aol.com - O
Has entered the machine first matter has a look is vmware, is the words hurried to travel, do not fall to others' unhealthy person has gone, ha-ha
Comes, to have a look:
is the ## inspection the vmware machine
[root@victim root] # ifconfig - a | grep - i - e “00-05-69” - e “00-0C-29” - e “00-50-56”; dmesg | grep - i vmware
If does not have output, fortunately. . . . Even if is honeypot, the good and evil has also invested equipment's honeypot. Continued to have a look at him to invest any equipment:
[root@victim root] # cat /proc/cpuinfo | grep name; cat /proc/meminfo | grep MemTotal
model name : Intel(R) Xeon(TM) CPU 2.80GHz
model name : Intel(R) Xeon(TM) CPU 2.80GHz
model name : Intel(R) Xeon(TM) CPU 2.80GHz
model name : Intel(R) Xeon(TM) CPU 2.80GHz
MemTotal: 1030228 kB
May also machine, although 4CPU only then the 1G memory, a little is actually strange, but has forced, runs password anything also good.
About anti-honeynet, below has two articles to be good, but was aims at vmware or User Mode Linux, if others with the real machine, that must depend on the moral behavior, ha-ha.
http://xsec.org/index.php?module=archives&act=view&type=3&id=5
http://xsec.org/index.php?module=archives&act=view&type=3&id=6
About honeynet and the anti-honeynet discussion, may come here to chat
http://cnhonker.com/bbs/thread.php?fid=15&type=1
The idle talk little said that then the second matter has a look not to have the drug addict in above, some words have been embarrassed, please exit:)
Generally I will hit several orders to have a look first, because some rootkit he will change is not good, or will be because of the edition question, no matter any reason, will have some have replaced procedure some parameters not to meet in any case.
Other pages: : 1 * 2 * 3 * 4 * 5 * 6 * 7 * 8 * 9 * 10 * Next>>
|