bastard
[Only registered and activated users can see links. Click Here To Register...] -> nmapQuote:
bastard
Quote:
So, as thread subject says, operation "SRO Blitzkrieq" starts soon. More info comes in next few hours.
For mods, please, stick this thread - this is going to be interesting.
=========================================
SRO Blitzkrieq -> Beginning
So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.
The IP address is pretty well known to everyone out here.
(u can use wireshark to get the ip addr of xtrap default vsro test update server)Code:123.30.200.70
You may try pinging it, to ensure it's up.
cmd -> ping 123.30.200.70
Well, let's see what we got there ?
Let's trace route.
(first few hops removed)Code:cmd -> tracert 123.30.200.70
We see few gateways there, huh ? Seems like a pretty huge network, lulz.Code:7 277 ms 276 ms 276 ms 80.156.161.62 8 303 ms 304 ms 303 ms 203.162.217.25 9 304 ms 304 ms 303 ms static.vdc.vn [222.255.165.33] 10 313 ms 313 ms 313 ms 203.162.231.9 11 318 ms 318 ms 319 ms static.vdc.vn [123.30.63.26] 12 313 ms 313 ms 313 ms static.vdc.vn [123.30.63.66] 13 314 ms 314 ms 313 ms dynamic.vdc.vn [123.30.200.254] 14 313 ms 313 ms 313 ms dynamic.vdc.vn [123.30.200.70] Trace complete.
Let's scan the "closest" machines to our target. (i'd preffer NMAP)
And what do we see there ? Lots of shit.Code:nmap -T4 -A -v 123.30.200.0-255
Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...
=========================================
More hints comes shortly.
Quote:
So, as thread subject says, operation "SRO Blitzkrieq" starts soon. More info comes in next few hours.
For mods, please, stick this thread - this is going to be interesting.
=========================================
SRO Blitzkrieq -> Beginning
So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.
The IP address is pretty well known to everyone out here.
(u can use wireshark to get the ip addr of xtrap default vsro test update server)Code:123.30.200.70
You may try pinging it, to ensure it's up.
cmd -> ping 123.30.200.70
Well, let's see what we got there ?
Let's trace route.
(first few hops removed)Code:cmd -> tracert 123.30.200.70
We see few gateways there, huh ? Seems like a pretty huge network, lulz.Code:7 277 ms 276 ms 276 ms 80.156.161.62 8 303 ms 304 ms 303 ms 203.162.217.25 9 304 ms 304 ms 303 ms static.vdc.vn [222.255.165.33] 10 313 ms 313 ms 313 ms 203.162.231.9 11 318 ms 318 ms 319 ms static.vdc.vn [123.30.63.26] 12 313 ms 313 ms 313 ms static.vdc.vn [123.30.63.66] 13 314 ms 314 ms 313 ms dynamic.vdc.vn [123.30.200.254] 14 313 ms 313 ms 313 ms dynamic.vdc.vn [123.30.200.70] Trace complete.
Let's scan the "closest" machines to our target. (i'd preffer NMAP)
And what do we see there ? Lots of shit.Code:nmap -T4 -A -v 123.30.200.0-255
Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...
=========================================
More hints comes shortly.
So you actually want us to leave our IP`s on their servers as every1 says ? if you are 'releasing' <--- By giving us the way how you hack the files ( so you want us to get the files ) why don`t you just post your serverfiles in here isn`t that allot of easier ? or is it just me that thinks that`s easier ? xDQuote:
Use any security methods you want, it depends on you.