Transparency Myanmar

transparency.myanmar@gmail.com

hi
13910412792182135665noreply

Glad to hear that, here are the details below

More information here:
http://www.realsocialsignals.co/buy-social-signals/

For the best ranking results, buy Monthly basis Social signals, provided
daily, month after month:
http://www.realsocialsignals.co/custom-social-signals/


Regards
Ryder












http://www.realsocialsignals.co/unsubscribe/


2018-11-9, tr, 19:37 13910412792182135665noreply
<13910412792182135665noreply@blogger.com> ra�e:
Hi there, Please send me the Social signals offer that we talked about
o$ver the phone. I`m interested and I want to boost my %SEO metrics with
this new SEO method. Thanks again, will wait your reply.

hi
cronica-salonera.htmlnoreply

here it is, social website traffic:
http://www.mgdots.co/detail.php?id=113


Full details attached




Regards
Traci Boykins �












Unsubscribe option is available on the footer of our website

We`ll get your website to have Domain Authority 50 or we`ll refund you every
cent

for only 150 usd, you`ll have DA50 for your website, guaranteed

Order it today:
http://www.str8-creative.co/product/moz-da-seo-plan/

thanks
Alex Peters

Rank the google maps top 5 for your money keywords, guaranteed

http://www.str8-creative.io/product/1500-gmaps-citations/

regards,
Str8 Creative

We`ll get your website to have Domain Authority 50 or we`ll refund you every
cent

for only 150 usd, you`ll have DA50 for your website, guaranteed

Order it today:
http://www.str8-creative.co/product/moz-da-seo-plan/

thanks
Alex Peters

XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE

XSStrike is really advanced XSS exploitation and detection suite, which contains a very powerful XSS fuzzer and provides no false positive results using fuzzy matching. XSStrike is the first XSS scanner that generates its own payloads. Download xsstrike and test it out.
It also has built in an artificial intelligent enough to detect and break out of various contexts.

FEATURES:

  • Powerful Fuzzing Engine
  • Context Breaking Intelligence
  • AI Payload Generation
  • GET & POST Methods Support
  • Cookie Support
  • WAF Fingerprinting
  • Handcrafted Payloads to Filter and WAF Evasion
  • Hidden Parameter Discovery
  • Accurate Results

DOWNLOAD XSSTRIKE – ADVANCED XSS EXPLOITATION SUITE

Click here to download xsstrike.
Related posts
  1. Hacking Tools For Games
  2. Hacker Tools Free
  3. New Hack Tools
  4. Pentest Tools Url Fuzzer
  5. Hacking Tools For Pc
  6. Pentest Tools Android
  7. Wifi Hacker Tools For Windows
  8. Hacking Tools Kit
  9. Hacking Tools For Beginners
  10. New Hack Tools
  11. Blackhat Hacker Tools
  12. Hacker Hardware Tools
  13. Hacking Tools Mac
  14. Hacking Tools Windows 10
  15. Pentest Tools Nmap
  16. Hacker Tools 2020
  17. Nsa Hacker Tools
  18. Pentest Tools Online
  19. Hacking Tools Hardware
  20. Hacking Tools For Mac
  21. Hacking Tools For Windows 7
  22. Pentest Tools For Mac
  23. Physical Pentest Tools
  24. Hacking Tools For Mac
  25. Physical Pentest Tools
  26. Hacking Tools Windows 10
  27. Hack Website Online Tool
  28. Hacking Tools Usb
  29. Hacking Tools And Software
  30. Pentest Box Tools Download
  31. Hacking Tools Github
  32. Hacker Tool Kit
  33. Hack Tools For Mac
  34. Computer Hacker
  35. Pentest Tools Open Source
  36. Hackrf Tools
  37. Hack Tools For Mac
  38. Pentest Tools For Windows
  39. Hack Tools For Mac
  40. Tools For Hacker
  41. Pentest Box Tools Download
  42. Best Hacking Tools 2019
  43. Pentest Tools Apk
  44. Hack Tools Github
  45. Pentest Automation Tools
  46. Pentest Tools Framework
  47. How To Install Pentest Tools In Ubuntu
  48. What Are Hacking Tools
  49. Hacking Tools Online
  50. Hackrf Tools
  51. Pentest Tools Website
  52. Hak5 Tools
  53. Pentest Box Tools Download
  54. Pentest Tools Bluekeep
  55. Android Hack Tools Github
  56. Hacking Tools And Software
  57. Pentest Tools
  58. Hacking Tools Windows 10
  59. Kik Hack Tools
  60. Pentest Reporting Tools
  61. Hacks And Tools
  62. Hacker Tools
  63. Pentest Tools Bluekeep
  64. Hacker Tools For Ios
  65. Growth Hacker Tools
  66. Tools For Hacker
  67. Hak5 Tools
  68. What Is Hacking Tools
  69. Pentest Automation Tools
  70. Nsa Hacker Tools
  71. Blackhat Hacker Tools
  72. Hacking Tools For Pc
  73. Computer Hacker
  74. Pentest Tools Free
  75. Pentest Tools Windows
  76. Tools For Hacker
  77. Hacking Tools Pc
  78. Tools Used For Hacking
  79. New Hack Tools
  80. Github Hacking Tools
  81. Kik Hack Tools
  82. Hacker Tools For Mac
  83. Install Pentest Tools Ubuntu
  84. Pentest Tools For Mac
  85. Hacking Apps
  86. Wifi Hacker Tools For Windows
  87. Bluetooth Hacking Tools Kali
  88. Hack Tools For Ubuntu
  89. Hack Tools For Ubuntu
  90. Best Hacking Tools 2020
  91. Hacking Tools Download
  92. Hacking Tools For Windows
  93. Hacker Tools 2019
  94. Hack Tools Github
  95. Tools Used For Hacking
  96. Blackhat Hacker Tools
  97. Pentest Tools Find Subdomains
  98. Hacks And Tools
  99. How To Hack
  100. Tools 4 Hack
  101. New Hack Tools
  102. Pentest Recon Tools
  103. Hacking Tools For Windows 7
  104. Hack Rom Tools
  105. Hack Tool Apk No Root
  106. Hacker Tools Github
  107. Hack Tools For Pc
  108. New Hacker Tools
  109. Hacking Tools
  110. Pentest Tools Website
  111. World No 1 Hacker Software
  112. Hacking Tools Hardware
  113. Hacker Tools Software
  114. Hacking Tools Windows 10
  115. Hacker Tools Apk
  116. Hacking Tools And Software
  117. Top Pentest Tools
  118. How To Make Hacking Tools
  119. Hacking Tools For Pc
  120. Hack Tools For Games
  121. Pentest Tools Review
  122. Hacking Tools For Pc
  123. Pentest Reporting Tools
  124. Hacking Tools Mac
  125. What Are Hacking Tools

It's a 32bits elf binary of some version of vsftpd, where it have been added a backdoor, they don't specify is an authentication backdoor, a special command or other stuff.

I started looking for something weird on the authentication routines, but I didn't found anything significant in a brief period of time, so I decided to do a bindiff, that was the key for locating the backdoor quickly. I do a quick diff of the strings with the command "strings bin | sort -u" and "vimdiff" and noticed that the backdoored binary has the symbol "execl" which is weird because is a call for executing elfs, don't needed for a ftp service, and weird that the compiled binary doesn't has that symbol.





Looking the xrefs of "execl" on IDA I found that code that is a clear backdoor, it create a socket, bind a port and duplicate the stdin, stdout and stderr to the socket and use the execl:



There are one xrefs to this function, the function that decides when trigger that is that kind of systems equations decision:


The backdoor was not on the authentication, it was a special command to trigger the backdoor, which is obfuscated on that systems equation, it was no needed to use a z3 equation solver because is a simple one and I did it by hand.



The equation:
cmd[0] = 69
cmd[1] = 78
cmd[1] + cmd[2] = 154
cmd[2] + cmd[3] = 202
cmd[3] + cmd[4] = 241
cmd[4] + cmd[5] = 233
cmd[5] + cmd[6] = 217
cmd[6] + cmd[7] = 218
cmd[7] + cmd[8] = 228
cmd[8] + cmd[9] = 212
cmd[9] + cmd[10] = 195
cmd[10] + cmd[11] = 195
cmd[11] + cmd[12] = 201
cmd[12] + cmd[13] = 207
cmd[13] + cmd[14] = 203
cmd[14] + cmd[15] = 215
cmd[15] + cmd[16] = 235
cmd[16] + cmd[17] = 242

The solution:
cmd[0] = 69
cmd[1] = 75
cmd[2] = 79
cmd[3] = 123
cmd[4] = 118
cmd[5] = 115
cmd[6] = 102
cmd[7] = 116
cmd[8] = 112
cmd[9] = 100
cmd[10] = 95
cmd[11] = 100
cmd[12] = 101
cmd[13] = 106
cmd[14] = 97                    
cmd[15] = 118
cmd[16] = 117
cmd[17] = 125


The flag:
EKO{vsftpd_dejavu}

The binary:
https://ctf.ekoparty.org/static/pre-ekoparty/backdoor


Related word
  1. Pentest Tools Online
  2. Hacking Tools Windows
  3. Beginner Hacker Tools
  4. Pentest Tools Windows
  5. Pentest Tools Subdomain
  6. Hack Tools 2019
  7. Hack Tools Online
  8. Hacker Tools For Windows
  9. Tools Used For Hacking
  10. Hacking Tools And Software
  11. How To Make Hacking Tools
  12. Hack Tools
  13. Hacker Tools Linux
  14. Hacker Tools For Ios
  15. Hacker Tools Free Download
  16. Pentest Reporting Tools
  17. Hacker Tools 2020
  18. Pentest Tools Alternative
  19. Hack Tools For Pc
  20. Hacker
  21. Pentest Tools Android
  22. Top Pentest Tools
  23. Github Hacking Tools
  24. Hack Tools 2019
  25. Pentest Tools Download
  26. Hack Tools For Games
  27. Hack Tools For Pc
  28. Github Hacking Tools
  29. Pentest Tools For Mac
  30. Best Pentesting Tools 2018
  31. Hacking Tools Software
  32. Hackers Toolbox
  33. Hacker Hardware Tools
  34. Hack Tools Pc
  35. Hacking Tools Usb
  36. Hacker Tools
  37. Wifi Hacker Tools For Windows
  38. Hacking Tools Download
  39. Pentest Tools Review
  40. Hacking Tools Kit
  41. Pentest Tools Linux
  42. Github Hacking Tools
  43. Hack Tools Mac
  44. Hacker Tools Online
  45. Hacking Tools Software
  46. Hacking Apps
  47. Hacking Tools
  48. Hack Tools Github
  49. Hacking Tools Mac
  50. Hacking Tools Mac
  51. Hack Tools Online
  52. Top Pentest Tools
  53. Hacking Tools Mac
  54. Nsa Hack Tools
  55. Pentest Tools List
  56. Android Hack Tools Github
  57. Hacking Tools 2019
  58. Hacking Tools For Pc
  59. Github Hacking Tools
  60. Hacker Tools For Windows
  61. Pentest Tools Linux
  62. Best Hacking Tools 2020
  63. Wifi Hacker Tools For Windows
  64. Computer Hacker
  65. Blackhat Hacker Tools
  66. Hack Tool Apk No Root
  67. Blackhat Hacker Tools
  68. Hacking Tools Windows
  69. Best Hacking Tools 2020
  70. Black Hat Hacker Tools
  71. Hacking Tools
  72. Pentest Tools Open Source
  73. Hackers Toolbox
  74. Pentest Tools Android
  75. Hacker Tools Hardware
  76. Hacking Tools Github
  77. Pentest Tools Free
  78. Hacker Tools Apk
  79. Hacking Tools And Software
  80. Hacking Tools For Beginners
  81. Hack Tools Mac
  82. Hack Tools Online

It's a 32bits elf binary of some version of vsftpd, where it have been added a backdoor, they don't specify is an authentication backdoor, a special command or other stuff.

I started looking for something weird on the authentication routines, but I didn't found anything significant in a brief period of time, so I decided to do a bindiff, that was the key for locating the backdoor quickly. I do a quick diff of the strings with the command "strings bin | sort -u" and "vimdiff" and noticed that the backdoored binary has the symbol "execl" which is weird because is a call for executing elfs, don't needed for a ftp service, and weird that the compiled binary doesn't has that symbol.





Looking the xrefs of "execl" on IDA I found that code that is a clear backdoor, it create a socket, bind a port and duplicate the stdin, stdout and stderr to the socket and use the execl:



There are one xrefs to this function, the function that decides when trigger that is that kind of systems equations decision:


The backdoor was not on the authentication, it was a special command to trigger the backdoor, which is obfuscated on that systems equation, it was no needed to use a z3 equation solver because is a simple one and I did it by hand.



The equation:
cmd[0] = 69
cmd[1] = 78
cmd[1] + cmd[2] = 154
cmd[2] + cmd[3] = 202
cmd[3] + cmd[4] = 241
cmd[4] + cmd[5] = 233
cmd[5] + cmd[6] = 217
cmd[6] + cmd[7] = 218
cmd[7] + cmd[8] = 228
cmd[8] + cmd[9] = 212
cmd[9] + cmd[10] = 195
cmd[10] + cmd[11] = 195
cmd[11] + cmd[12] = 201
cmd[12] + cmd[13] = 207
cmd[13] + cmd[14] = 203
cmd[14] + cmd[15] = 215
cmd[15] + cmd[16] = 235
cmd[16] + cmd[17] = 242

The solution:
cmd[0] = 69
cmd[1] = 75
cmd[2] = 79
cmd[3] = 123
cmd[4] = 118
cmd[5] = 115
cmd[6] = 102
cmd[7] = 116
cmd[8] = 112
cmd[9] = 100
cmd[10] = 95
cmd[11] = 100
cmd[12] = 101
cmd[13] = 106
cmd[14] = 97                    
cmd[15] = 118
cmd[16] = 117
cmd[17] = 125


The flag:
EKO{vsftpd_dejavu}

The binary:
https://ctf.ekoparty.org/static/pre-ekoparty/backdoor


Continue reading