Filename | Thank You UTHM ! |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 1:10 PM |
Label | |
Action |
name | author | perms | com | modified | label |
Pentesting UCITV UTHM (Local Area Network) | 0b0xed | rwxr-xr-x | 14 | 10:58 AM |
Filename | Pentesting UCITV UTHM (Local Area Network) |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 10:58 AM |
Label | |
Action |
This is just a Proof Of Concept , pentesting in http://ucitv3.uthm.edu.my/ for my certificate of appreciation only.
Web to Test : http://ucitv3.uthm.edu.my/ (work in UTHM LAN ONLY)
Bug : A simple SQLinjection
Front Page of ucitv :
Method : Using sqlmap , here is the proof
Proof : The admin page
The Bug Was Reported , Thank YOU !
Web to Test : http://ucitv3.uthm.edu.my/ (work in UTHM LAN ONLY)
Bug : A simple SQLinjection
Front Page of ucitv :
Method : Using sqlmap , here is the proof
Proof : The admin page
The Bug Was Reported , Thank YOU !
Pentesting in Intern Place | 0b0xed | rwxr-xr-x | 18 | 11:30 PM |
Filename | Pentesting in Intern Place |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 11:30 PM |
Label | |
Action |
http://sacad.uthm.edu.my/ - Changing User to Super User | 0b0xed | rwxr-xr-x | 12 | 11:47 PM |
Filename | http://sacad.uthm.edu.my/ - Changing User to Super User |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 11:47 PM |
Label | |
Action |
Pentesting UTHM WiFi Login | 0b0xed | rwxr-xr-x | 13 | 4:00 AM |
Filename | Pentesting UTHM WiFi Login |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 4:00 AM |
Label | |
Action |
UTHM CCTV Pentesting | 0b0xed | rwxr-xr-x | 10 | 2:38 AM |
Filename | UTHM CCTV Pentesting |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 2:38 AM |
Label | |
Action |
POC - UTHM WiFi | 0b0xed | rwxr-xr-x | 18 | 2:06 PM |
Filename | POC - UTHM WiFi |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 2:06 PM |
Label | |
Action |
[Filtering File Upload] https://community.uthm.edu.my/ | 0b0xed | rwxr-xr-x | 13 | 12:20 AM |
Filename | [Filtering File Upload] https://community.uthm.edu.my/ |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 12:20 AM |
Label | |
Action |
[POC] ipamwifi.uthm.edu.my - DHCP Server ,maybe ? | 0b0xed | rwxr-xr-x | 14 | 10:05 PM |
Filename | [POC] ipamwifi.uthm.edu.my - DHCP Server ,maybe ? |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 10:05 PM |
Label | |
Action |
1.Open terminal : ifconfig
Result : .....
1.Get that point (bug)
Default Gateway : 10.8.237.254
DHCP Server : 192.168.240.99
2.Login via SSH : sudo ssh -D 22 [email protected]
Password ? easy :) , just use simple bruteforce
3.Let your 'footprint' on the site
sudo echo "Hacked By 0b0x3d" >> hack.txt
4.Done ? Discover whole system ,and guess what i got ?
[MySQLi - OOP] Phishing - DB | 0b0xed | rwxr-xr-x | 17 | 7:37 AM |
Filename | [MySQLi - OOP] Phishing - DB |
Permission | rw-r--r-- |
Author | 0b0xed |
Date and Time | 7:37 AM |
Label | |
Action |
/.Tutorial
1.Set Up Your MySQL User,Password and DB_Name.
2.Find $username,$password,$dbname and replace it.
3.Open phpmyadmin,excute this SQL .
CREATE TABLE phish(
id INT NOT NULL AUTO_INCREMENT,
PRIMARY KEY(id),
username TEXT,
password TEXT,
victimemail TEXT,
victimpass TEXT,
secretcode TEXT
)
4.If Created,Just Paste INDEX.php to index.php and etc.
Live :
- http://v1.hpi.or.id/phish/index.php (INDEX.php)
- http://v1.hpi.or.id/phish/register.php (REGISTER.php)
- http://v1.hpi.or.id/phish/login.php (LOGIN.php)
Subscribe to:
Posts (Atom)