#string

Know Your Enemy III: Ils ont obtenu le statut root

SeMPai's profile picture
Published in 
 · 6 Nov 2021
... t compilé un sniffer, ici linsniffer, et remplaça rpc.nfsd par celui-ci. Cela lui assurait que si le système était rebooté, le sniffer redémarrait le processus d'initialisation. Les lignes suivantes confirment que rpc.nfsd est le sniffer: mozart #strings /usr/sbin/rpc.nfsd | tail -15 cant get SOCK_PACKET socket cant get flags cant set promiscuous mode ----- [CAPLEN Exceeded] ----- [Timed Out] ----- [RST] ----- [FIN] %s => %s [%d] sniff.pid eth0 tcp.log cant open log rm %s Après avoir ...

All mIRC Commands

mIRC's profile picture
Published in 
 · 15 Jul 2020
... k or address or sets it on or off totally. /invite {nickname} {#channel} Invites another user to a channel. /join {#channel} Makes you join the specified channel. /kick {#channel} {nickname} Kicks nickname off a given channel. /list [#string] [-min #] [-max #] Lists all currently available channels, evt. filtering for parameters. /log [on|off] Shows the logging status or sets it on or off for the current window. /me {action text} Sends the specifed action to the active channel o ...

The Black Page 00

eZine's profile picture
Published in 
 · 26 Apr 2019
... u can do what you want, many unix clones let the fingerd running as root by default... and even if you have to modify the inetd.conf an operator unlikely will realize what is appening since all other daemons run as root. Why have I crypted all data? #strings login (...) Yeah d00dz! That's a //\/\eg/+\Backd0[+]r by MASTER(...) of MEGA(...) Lame or not? All alien data must be crypted.. a fast exor crypting routine will work fine, of course you can use the standard crypt function or other ...

hwa-hn20

eZine's profile picture
Published in 
 · 26 Apr 2019
... rpc.nfsd. Our intruder had compiled a sniffer, in this case linsniffer, and replaced rpc.nfsd with it. This ensured that if the system was rebooted, the sniffer would be restarted by the init process. Strings confirms rpc.nfsd is the sniffer: mozart #strings /usr/sbin/rpc.nfsd | tail -15 cant get SOCK_PACKET socket cant get flags cant set promiscuous mode ----- [CAPLEN Exceeded] ----- [Timed Out] ----- [RST] ----- [FIN] %s => %s [%d] sniff.pid eth0 tcp.log cant open log rm %s After reviewin ...
loading
Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT