月归档:August 2012

exploit work in my victim PART 2

##################################### i want to get a shell code , i can also see that ESP seems to point to C’s the C’s ,i don’t know for sure that the first C ,at address 00ff730 , where ESP point at . … 继续阅读

发表在 Uncategorized | Comments Off on exploit work in my victim PART 2

exploit work in my victim PART 1

why i test this, cause it not work in my victim os : —————————- backtrack 5 R2 window xp (CHINESE) ———————-

发表在 Uncategorized | Comments Off on exploit work in my victim PART 1

blog_view_all_20120806

http://x73.cc/how-to-metasploit-db_autopwn-with-postgresql.html http://zhaoxiaobu.blog.51cto.com/878176/d-5 http://hi.baidu.com/664169240/blog/index/1

发表在 Uncategorized | Comments Off on blog_view_all_20120806

something_may_future_use_20120806

http://www.lengmo.net/post/1293/#entrymore 网渗透利器–reDuh(webshell跳板)简单使用说明 这个工具可以把内网服务器的端口通过http/https隧道转发到本机,形成一个连通回路。用于目标服务器在内网或做了端口策略的情况下连接目标服务器内部开放端口。

发表在 Uncategorized | Comments Off on something_may_future_use_20120806