Ò׽ؽØͼÈí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

Rooting A Linux System 101

So you want to root a linux system? But, you don't know shit about it?

Well, this guide is for you.

Tools covered by this guide
-----------------------
netcat [utility for creating a backdoor shell, but can be used for a plethora of other things]
gcc [c program compiler, the heart of exploits]
rm [for clearing those pesky logs]
other basic commands [ls, grep, vi (cool people use vi), etc etc.]


Step one [Getting in]
----------------------

Getting access to an exploitable server.

Believe it or not, this isn't as hard as it sounds, generally most webpages run on one of two operating systems:
a *nix derivative [BSD, Debian, Ubuntu, etc] or windows server

Most servers are simple "guess a password or bruteforce until you get in".

Step two [Basic Recon and Log Clearing]
-------------------------

So, you've accessed a server under a lowly user account, great.
You're probably saying to yourself "Time to exploit and get this shit going."
Well, if you want to get caught and your access removed, go right on ahead, otherwise, we got some shit to cover.

a) You want to get rid of .bash_history [or .sh_history for BSD], on your local account.

There are two methods to do this:

ln -s ./.bash_history /dev/null

This invokes the link command to link ./.bash_history [you're current working directory, which if you followed my commands, is your exploited users home dir] to /dev/null, which in essence, is nothing.

and, my favourite:

ln -s ./.bash_history /dev/urandom

which links .bash_history to /dev/urandom, which is a large file that contains nothing but gibberish.

If an unwitting sysadmin were to grep it, they could potentially crash their ssh app [if it's putty], or in my personal experiences, cause weird graphical glitches that would remain until you restarted the ssh client.

you want to check for any monitoring software and either br


Ïà¹ØÎĵµ£º

ʵսLinux Bluetooth±à³Ì£¨ËÄ£© L2CAP²ã±à³Ì

£¨L2CAPЭÒé¼ò½é£¬L2CAPÔÚBlueZÖеÄʵÏÖÒÔ¼°L2CAP±à³Ì½Ó¿Ú£©
Ò»£ºL2CAPЭÒé¼ò½é£º
Logical Link Control and Adaptation Protocol(L2CAP)
Âß¼­Á¬½Ó¿ØÖƺÍÊÊÅäЭÒé (L2CAP) ΪÉϲãЭÒéÌṩÃæÏòÁ¬½ÓºÍÎÞÁ¬½ÓµÄÊý¾Ý·þÎñ£¬²¢Ìṩ¶àЭÒ鹦ÄܺͷָîÖØ×é²Ù×÷¡£L2CAP ³äÐíÉϲãЭÒéºÍÓ¦ÓÃÈí¼þ´«ÊäºÍ½ÓÊÕ×î´ó³¤¶ÈΪ 64K µÄ L2CAP Ê ......

Network Booting a Linux STB with PXE

Summary
PXE (Preboot eXecution Environment) is, in one persons words, Intel's attempt at making PCs work more like SUNs (
ref
). PXE
outlines a protocol for enabling the BIOS to retrieve the operating system over standard network protocols.
This document outlines the process of setting up a ......

LinuxÏ¿ª·¢»·¾³µÄ½¨Á¢£¨Emasc + gtags + ......£©

Ò»¡¢Emacs °²×°
1.       Èí¼þÏÂÔØ£ºhttp://ftp.gnu.org/gnu/emacs/  ÕÒlatest °æ±¾ÏÂÔØ¡£
2.       Èí¼þÉÏ´«£º±¾È˲ÉÓÃÐéÄâ»ú°²×°µÄlinuxϵͳ£¬Ö÷»úÊÇWindows XP£¬¶øÓÉXPÏòlinuxÉÏ´«Îļþ²ÉÓõŤ¾ßÊÇ£ºFileZilla£»´ó¼Ò¿ÉÒÔÔÚÍøÉÏÏÂÔØ£¬ÊµÔÚÏÂÔز»ÁË£¬ ......

VMwareµ÷ÕûLinuxÐéÄâ»úÓ²ÅÌ´óСµÄ·½·¨

Èç¹ûÔ¤ÏÈ×°µÄVMware LinuxÐéÄâ»úµÄÓ²ÅÌ¿Õ¼ä¹ýС,ÖØÐÂ×°Ò»¸öÓÖͦÂé·³¡£ËÑË÷ÍøÉϵķ½·¨,¼ò½éÈçÏÂ:
 Ò»£ºÓ²ÅÌÀ©Èݵķ½·¨£º
1¡¢vmwareÌṩһ¸öÃüÁîÐй¤¾ß£¬vmware-vdiskmanager.exe£¬Î»ÓÚvmwareµÄ°²×°Ä¿Â¼Ï£¬±ÈÈç
C:\Program Files\VMware\VMware Workstation\vmware-vdiskmanager.exe.
ÔÚwindowsµÄcmd´°¿ÚÖУ¬×ªµ½vm ......

linuxÖ®Îҵļû½â

     »¹ÊǸßÖеÄʱºò£¬Ñ§Ð£°²ÅżÆËã»ú¿Î£¬ºÃÏñ½Ì²Ä½Ð¡¶¼ÆËã»úXXX¡·¡£´ÓÄÇÀïÃæÖªµÀÓиö¶«Î÷½Ðlinux£¬ÄÇÊǵÚÒ»´ÎÖªµÀlinux¡£ºóÀ´¼ÒÀïÂòÁĘ̈µçÄÔ£¨Æ·ÅÆ»ú£©Ô¤×°windows xp¡£ËÍÁËÒ»ÕÅϵͳÅÌ“ÉñÖÝÊÀ¼ÍÖÐÎÄ×ÀÃæϵͳ”£¬Æäʵ¾ÍÊÇRed flag linuxÄÚºËÊÇ2.4.27µÄ¡£µ±Ê±Á¬xpºÍ2000¶¼²»ÖªµÀÊÇÔõô»ØÊ£¬ ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØͼ | ¸ÓICP±¸09004571ºÅ