Skip to content
Permalink
main
Switch branches/tags
Go to file
 
 
Cannot retrieve contributors at this time
<!doctype html public "-//w3c//dtd html 4.0 transitional//en">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="Author" content="El Shadow">
<meta name="GENERATOR" content="Mozilla/4.51 [en] (Win98; I) [Netscape]">
<title>Hacked, fuk french!</title>
</head>
<body>
Ae pessoal, hackers brasileiros, parece q uns francezinhos
metido a besta veio canta de galo no nosso quintal...
<br>http://www.attrition.org/mirror/attrition/2000/03/16/www.usf.com.br
<p>Bom, acontece q o Brasil embora muitos n&atilde;o acreditem &eacute;
uma na&ccedil;&atilde;o talvez n&atilde;o superior financeiramente mas
com um povo q faz tudo e tudo melhor q todos. Hacking, cracking kct &agrave;
4 &eacute; s&oacute; mais uma dessas coisas e o pessoal n&atilde;o quer
acreditar nessas possibilidades, bom, fik a crit&eacute;rio de vcs brasileiros
fazer ou n&atilde;o fazer alguma coisa, c algu&eacute;m kiser ver alguma
coisa a respeito vai uma listinha de sites franceses e um coment&aacute;riozinho
sobre eles...
<br>Ahh, amantes do windows, lembra dakela velha receitinha de bolo sobre
invas&atilde;o tcp/ip?? Usem ela em www.nic.fr eu acho, c n&atilde;o tenta
otras a&iacute;, vai com f&eacute; q nem d&aacute; nada. Hehehe
<br>El_Shadow
<br>&amp;
<br>VSO Inc.
<br>s&oacute; pra voc&ecirc; oh baby!!!
<p><font color="#CC0000">www.elysee.fr</font>
<br><font color="#CC0000">www.ac-poitiers.fr</font>
<br><font color="#CC0000">www.nic.fr</font>
<br><font color="#CC0000">www.bapteme.fr</font>
<br><font color="#CC0000">www.wfi.fr</font>
<br><font color="#CC0000">www.musee-orsay.fr</font>
<br><font color="#CC0000">www.fr-financial.com</font>
<br><font color="#CC0000">www.univ-mulhouse.fr</font>
<br><font color="#CC0000">www.verts.imaginet.fr</font>
<br><font color="#CC0000">www.amba-ottawa.fr</font>
<br><font color="#CC0000">www.vtcom.fr</font>
<br><font color="#CC0000">www.insee.fr</font>
<br><font color="#CC0000">www.senat.fr</font>
<br><font color="#CC0000">www.certu.fr</font>
<br><font color="#CC0000">www.dgac.fr</font>
<br><font color="#CC0000">www.edutel.fr</font>
<br><font color="#CC0000">www.environnement.gouv.fr</font>
<br><font color="#CC0000">www.education.gouv.fr</font>
<p><font color="#999900">www.amba-ottawa.fr</font>
<br><font color="#999900">--------------------------&lt;[ * report for
host 209.217.86.225 *</font>
<br><font color="#999900">&lt;[ tcp port: 80 (www) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 23 (telnet) ]></font>
<br><font color="#999900">&lt;[ tcp port: 111 (sunrpc) ]>&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 79 (finger) ]></font>
<br><font color="#999900">&lt;[ tcp port: 31337 (unknown) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 25 (smtp) ]></font>
<br><font color="#999900">&lt;[ tcp port: 21 (ftp) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 22 (ssh) ]></font>
<br><font color="#999900">--&lt;[ *OS*: 209.217.86.225: os detected: solaris
2.x</font>
<br><font color="#999900">-&lt;[ *FINGER*: 209.217.86.225: root: account
exists.</font>
<br><font color="#999900">-&lt;[ *FINGER*: 209.217.86.225: guest: account
exists.</font>
<br><font color="#999900">--&lt;[ *VULN*: 209.217.86.225: sendmail will
'expn' accounts for us</font>
<br><font color="#999900">--&lt;[ *VULN*: 209.217.86.225: port 31337(tcp)
open..</font>
<br><font color="#999900">--&lt;[ *VULN*: 209.217.86.225: solaris running
statd (automountd remote?)&yuml;&yuml;</font>
<br><font color="#999900">--&lt;[ *VULN*: 209.217.86.225: solaris running
nlockmgr.. remote</font>
<br><font color="#999900">---------------------------&lt;[ * scan of 209.217.86.225
completed *</font><font color="#999900"></font>
<p><font color="#999900">www.dgac.fr</font>
<br><font color="#999900">--------------------------&lt;[ * report for
host dgac.entreprises.cegetel.fr *</font>
<br><font color="#999900">&lt;[ tcp port: 80 (www) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 23 (telnet) ]></font>
<br><font color="#999900">&lt;[ tcp port: 110 (pop3) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 111 (sunrpc) ]></font>
<br><font color="#999900">&lt;[ tcp port: 79 (finger) ]>&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 53 (domain) ]></font>
<br><font color="#999900">&lt;[ tcp port: 31337 (unknown) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 25 (smtp) ]></font>
<br><font color="#999900">&lt;[ tcp port: 21 (ftp) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 22 (ssh)</font>
<br><font color="#999900">--&lt;[ *OS*: dgac.entreprises.cegetel.fr: os
detected: windows 95/98/nt</font>
<br><font color="#999900">--&lt;[ *VULN*: dgac.entreprises.cegetel.fr:
port 31337(tcp) open.. backdoor?</font>
<br><font color="#999900">---------------------------&lt;[ * scan of dgac.entreprises.cegetel.fr
completed *</font><font color="#999900"></font>
<p><font color="#999900">www.edutel.fr</font>
<br><font color="#999900">--------------------------&lt;[ * report for
host www.education.gouv.fr *</font>
<br><font color="#999900">&lt;[ tcp port: 80 (www) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 23 (telnet) ]></font>
<br><font color="#999900">&lt;[ tcp port: 31337 (unknown) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 21 (ftp) ]></font>
<br><font color="#999900">--&lt;[ *OS*: www.education.gouv.fr: os detected:
solaris 2.x</font>
<br><font color="#999900">-&lt;[ *CGI*: 193.51.6.247: tried to redirect
a /cgi-bin/phf request.</font>
<br><font color="#999900">--&lt;[ *VULN*: www.education.gouv.fr: port 31337(tcp)
open.. backdoor?</font>
<br><font color="#999900">---------------------------&lt;[ * scan of www.education.gouv.fr
completed *</font><font color="#999900"></font>
<p><font color="#999900">www.wfi.fr</font>
<br><font color="#999900">---------------------------&lt;[ *report for
host pc1.wfi.fr</font>
<br><font color="#999900">&lt;[ tcp port: 80 (www) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 23 (telnet) ]></font>
<br><font color="#999900">&lt;[ tcp port: 143 (imap2) ]>&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 110 (pop3) ]></font>
<br><font color="#999900">&lt;[ tcp port: 111 (sunrpc) ]>&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 53 (domain) ]></font>
<br><font color="#999900">&lt;[ tcp port: 31337 (unknown) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 139 (netbios-ssn) ]></font>
<br><font color="#999900">&lt;[ tcp port: 25 (smtp) ]>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
&lt;[ tcp port: 21 (ftp) ]></font>
<br><font color="#999900">--&lt;[ *OS*: pc1.wfi.fr: os detected: redhat
linux 5.2</font>
<br><font color="#999900">-&lt;[ *NFS exp0rt*: 193.105.58.1: to: u2.wfi.fr&nbsp;
dir: /</font>
<br><font color="#999900">-&lt;[ *NFS exp0rt*: 193.105.58.1: to: u2.wfi.fr&nbsp;
dir: /sdb</font>
<br><font color="#999900">--&lt;[ *VULN*: pc1.wfi.fr: linux bind/iquery
remote buffer overflow&yuml;&yuml;&yuml;&yuml;</font>
<br><font color="#999900">--&lt;[ *VULN*: pc1.wfi.fr: port 31337(tcp) open..
backdoor?</font>
<br><font color="#999900">--&lt;[ *VULN*: pc1.wfi.fr: linux mountd remote
buffer overflow</font>
<br><font color="#999900">---------------------------&lt;[ * scan of pc1.wfi.fr
completed *</font>
<br><font color="#00CC00"></font>&nbsp;
<br><font color="#00CC00"></font>&nbsp;
</body>
</html>
<!-- www.attrition.org web hack mirror - watermark or something -->