paxnWo Posted January 23, 2009 Report Posted January 23, 2009 Facilitati: Scaneaza site'ul de LFI , RFI si Path Disclosure. Poti sa iti setezi User-Agent'ul si Referer'ul.Instalare:Uploadati fisierele acestea pe un host care suporta PHP si cURL. Accesati index.php .Mod de utilizare: Copiati un link de forma http://site.com/index.php?= in fieldul "Targhet" si dati "Schean !". Demo: http://www.testeweb.com/rst/php_scanner_by_PaxNwo/ ---------------------------------------------------------------------------------------JavaScript'ul nu este facut de mine. Google helped =]La PHP nea Google a ajutat inca o data.Ideea si proiectul in sine ii apartin lui RoMeO. Eu l-am rescris, l-am adaptat si l-am fixat. In viitor probabil o sa fac suport de proxy.Nu e ceva stralucit, dar mi-a placut sa lucrez la el. Quote
Guest Praetorian Posted January 23, 2009 Report Posted January 23, 2009 PeHasPe, Scheaner,Targher = cine putea scoate asa ceva decat un debil Bv ma.. o sa il descarc maine sa vad ce e de el. Quote
Acidripp Posted January 23, 2009 Report Posted January 23, 2009 Il aveti instalat aici: http://www.testeweb.com/rst/php_scanner_by_PaxNwo/ Quote
Nytro Posted January 23, 2009 Report Posted January 23, 2009 Cat la % e facut de tine ca sa intreb asa? Si de ce ai pus la RST Power? Poate la darkq Power... Quote
Hellboundsss Posted January 23, 2009 Report Posted January 23, 2009 Uite !!! Da nu merge , exemplu scriu asa http://www.site.com/index.php?=../../../../../../../../etc/shadowsi toate alea care le mai gaseste si tot nimic nu apare am incercat si http://www.site.com/index.php?module= si tot nik Quote
Clyde Posted February 16, 2009 Report Posted February 16, 2009 Good (blow)job! ...numai un gay putea face asa ceva .. Quote
BlAcKhAcKeR Posted March 19, 2009 Report Posted March 19, 2009 sa zicem ca aa gasit un site care e vulnerabil full...cum poti abuza de aceste vulnerabilitati?OFF: un sfat pentru un noviceScanning Local File Inclusion - root [ ../../../../../../../../etc/passwd ] Scheaning ... Found _)_ [ ../../../../../../../../etc/passwd%00 ] Scheaning ... Found _)_ [ ../../../../../../../../etc/security/passwd ] Scheaning ... Found _)_ [ ../../../../../../../../etc/security/passwd%00 ] Scheaning ... Found _)_ [ ../../../../../../../../etc/master.passwd ] Scheaning ... Found _)_ [ ../../../../../../../../etc/master.passwd%00 ] Scheaning ... Found _)_ [ ../../../../../../../../.secure/etc/passwd ] Scheaning ... Found _)_ [ ../../../../../../../../.secure/etc/passwd%00 ] Scheaning ... Found _)_ [ ../../../../../../../../etc/security/passwd.adjunct ] Scheaning ... Found _)_ [ ../../../../../../../../etc/security/passwd.adjunct%00 ] Scheaning ... Found _)_ [ ../../../../../../../../etc/shadow ] Scheaning ... Found _)_ [ ../../../../../../../../etc/shadow%00 ] Scheaning ... Found _)_ [ ../../../../../../../../etc/hosts ] Scheaning ... Found _)_ [ ../../../../../../../../etc/hosts%00 ] Scheaning ... Found _)_ Quote
test Posted March 19, 2009 Report Posted March 19, 2009 sa zicem ca aa gasit un site care e vulnerabil full...cum poti abuza de aceste vulnerabilitati?OFF: un sfat pentru un noviceCiteste p'aici http://milw0rm.org/papers/106 Quote
smbgpla Posted February 24, 2010 Report Posted February 24, 2010 il poate upload-a cineva iar va rog? Quote
trxtxx Posted February 28, 2010 Report Posted February 28, 2010 ultimul post a fost facut acum 1 an...smbgpla dece draqu reinvii topicuri...nu stii cum sa faci posturi ?puteai sa ii dai un mesaj frumos lu pax..il rugai pana la cer si pamant sa iti uploadeze undeva ca nu il ai si tu si vrei sa te joci cu el..si gata.daca eram in locul lu nytro iti dadeam ban.numai reinvia posturi. google/ sau da mesaj la persoana care a creat topicul daca vrei ceva. Quote