Welcome To My Blog!!
Friday, July 25, 2014
1-Footholds
*Google search: intitle:"WSO 2.4" [ Sec. Info ], [ Files ], [ Console ], [ Sql ], [ Php ], [ Safe mode ], [ String tools ], [ Bruteforce ], [ Network ], [ Self remove
Submited: 2014-01-03
*Google search: intitle:"=[ 1n73ct10n privat shell ]="
Submited: 2014-01-03
*Google search: filetype:php intext:"!C99Shell v. 1.0 beta"
Submited: 2013-11-25
*Google search: intitle:"uploader by ghost-dz" ext:php
Submited: 2013-11-25
Monday, July 21, 2014
SQL 2014 DORK
SQL 2014 DORK SQL DORK 2014
Nguồn: CEH
trainers.php?id=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
Nguồn: CEH
trainers.php?id=
play_old.php?id=
declaration_more.php?decl_id=
Pageid=
games.php?id=
newsDetail.php?id=
staff_id=
historialeer.php?num=
product-item.php?id=
news_view.php?id=
humor.php?id=
communique_detail.php?id=
sem.php3?id=
opinions.php?id=
spr.php?id=
pages.php?id=
chappies.php?id=
prod_detail.php?id=
viewphoto.php?id=
view.php?id=
website.php?id=
hosting_info.php?id=
Saturday, July 19, 2014
Exploit Joomla!: JCE
It has been a very long time that i haven't post here, so as for today i'm going to post a new tutorial on how to upload shell with method JCE.
Thing Required:
JCE Exploiter : DOWNLOAD
DORKS:
inurl:"images/stories" php
"index of /images/stories/powered_by.png"
"index of /images/stories/joomla-dev_cycle.png"
"index of /images/stories/food"
"index of /images/stories/fruit"
inurl:"/images/stories/food"
Exploit WordPress: Optin Pro - File Upload Vulnerability
Once again, i'm not gonna explain anything about this exploit since it is exactly the same as my previous post. So, i'm just gonna give you the dork and exploit.
DORK: inurl:/wp-content/uploads/svp/headerimage/
inurl:/wp-content/plugins/wp_optin_pro/
EXPLOIT:/wp-content/plugins/wp_optin_pro/media-upload.php
SHELL UPLOADED TO: /wp-content/uploads/svp/headerimage/random_id_filename.php
DORK: inurl:/wp-content/uploads/svp/headerimage/
inurl:/wp-content/plugins/wp_optin_pro/
EXPLOIT:/wp-content/plugins/wp_optin_pro/media-upload.php
SHELL UPLOADED TO: /wp-content/uploads/svp/headerimage/random_id_filename.php
Subscribe to:
Posts (Atom)