Friday, July 25, 2014


1-Footholds


*Google search: intitle:"WSO 2.4" [ Sec. Info ], [ Files ], [ Console ], [ Sql ], [ Php ], [ Safe mode ], [ String tools ], [ Bruteforce ], [ Network ], [ Self remove
Submited: 2014-01-03



*Google search: intitle:"=[ 1n73ct10n privat shell ]="
Submited: 2014-01-03



*Google search: filetype:php intext:"!C99Shell v. 1.0 beta"
Submited: 2013-11-25



*Google search: intitle:"uploader by ghost-dz" ext:php
Submited: 2013-11-25

Monday, July 21, 2014

Lan Hack With dSploit On Android


SQL 2014 DORK

SQL 2014 DORK SQL DORK 2014

  Nguồn: CEH
trainers.php?id=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=

Saturday, July 19, 2014

Exploit Joomla!: JCE



It has been a very long time that i haven't post here, so as for today i'm going to post a new tutorial on how to upload shell with method JCE.




Thing Required:

JCE Exploiter : DOWNLOAD




DORKS:


inurl:"images/stories" php
"index of /images/stories/powered_by.png"
"index of /images/stories/joomla-dev_cycle.png"
"index of /images/stories/food"
"index of /images/stories/fruit"
inurl:"/images/stories/food"

Exploit WordPress: Optin Pro - File Upload Vulnerability

Once again, i'm not gonna explain anything about this exploit since it is exactly the same as my previous post. So, i'm just gonna give you the dork and exploit.

DORK: inurl:/wp-content/uploads/svp/headerimage/
inurl:/wp-content/plugins/wp_optin_pro/

EXPLOIT:/wp-content/plugins/wp_optin_pro/media-upload.php

SHELL UPLOADED TO: /wp-content/uploads/svp/headerimage/random_id_filename.php