Перейти к содержимому

 Друзья: Всё для вебмастера | [ Реклама на форуме ]


Rutor
Rutor


[ DDos Услуги. DDos атака. Заказать ДДос ]


LinuQ Sploit Pack


  • Авторизуйтесь для ответа в теме
Сообщений в теме: 2

#1
###

###

    Экзабайт

  • Advanced
  • PipPipPipPipPipPip
  • 1743 сообщений

LinuQ Sploit Pack

Цитата

What is it?
I represent your attention not new, but still quite rare in the "Internet" system for the automatic creation of Linux-botnets. This system can be called a bunch of sploitov, but there are significant differences:
1) Autonomy. Starting work in 5 steps
2) Do not need the traffic. This software does everything himself.
3) This bundle is designed for hacking Linux systems.
It certainly is possible to alter the Windows server, but on how many windows server is rarely used to create a hosting server - this is not true.
4) The final product of the bundle gives you all the hacked operating systems.

Archive version at the moment: 1.6.2
The first version of the archive was not written by me, and friends from Romania. Later, after the analysis of its work, the archive was used to create powerful Linux DDoS botnet.
Unlike all other versions of this software:
1) Use just four vulnerabilities in the PMA
2) Scan runs 2.5 times faster
3) Optimized dvizhek.
4) The simplified interface and work with him. All versions of the archive are provided.

What can I use this software?
His use of the most advanced! It can be used for various kinds of software progruza languages ​​PHP, Perl, and generally any software that does not require root user to Nix.
Can be used to crack some hosting and easy to get important information about the target system.
A) DDoS botnets.
2) Socks botnets
3) Networking Linux backdoors
4) Networking Linux Dedikov
And much more.

How does it work?
There are 3 modes of backup:
1) Full - Scan IP, scan PMA, a direct hack
2) Find - Scan PMA, hacking
3) Exp - hacking
Work with each of them is designed for any user.

As can be seen from the regime of Full - first you scan a range of IP.
For example take the "71":


After scanning, the search begins PMA admin panel:


After finding the PMA operates a system of four exploits for PMA.
It supports almost all versions of the PMA!

Most of the code sployty 2,3,4:


Quote: Piercing through the current range of 24 archive server is 32!
Exemplary x-ki servers:
Channel (average): 112.3 Mbps
OS: Debian, Ubuntu, Fedora, Gentoo, CentOS
root: server 1 of 121.

]]>Скачать]]>

Ссылки из под хайдов не выдаю!


#2
PrivareDDoS

PrivareDDoS

    Бит

  • Members
  • 1 сообщений
перезалейте. линк офф :(
Legald.net Заказать ддос атаку / Заказать DDoS атаку

#3
Aini

Aini

    Бит

  • Members
  • 5 сообщений

Просмотр сообщенияPrivareDDoS (01 August 2014 - 17:05) писал:

перезалейте. линк офф :(

Археологией решил заняться? :lol:
Да и зачем вообще тебе усрался Sploit 2011 года?


Количество пользователей, читающих эту тему: 0

0 пользователей, 0 гостей, 0 анонимных