Advertisement
YeiZeta

Exploit*s By yei zeta Created

Nov 21st, 2012
232
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.84 KB | None | 0 0
  1. Exploit*s By yei zeta Created:
  2.  
  3.  
  4. intitle:Joomla! Installation inurl:/installation/index.php
  5.  
  6. ejemplo:
  7.  
  8. http://userpages.umbc.edu/~shan15/Joomla/installation/index.php
  9.  
  10.  
  11.  
  12. inurl:wp-content/plugins/easy-comment-uploads/upload-form.php
  13.  
  14. ejemplo:
  15.  
  16. http://www.ritalee.com.br/blog/wp-content/plugins/easy-comment-uploads/upload-form.php
  17.  
  18.  
  19. Este Sirve para ver las Ips que han subido contenido en paginas Wordpress.>
  20.  
  21. inurl:/wp-content/uploads/tdomf/tmp/1/
  22.  
  23. ejemplo:
  24.  
  25. http://derebane.com/wp-content/uploads/tdomf/tmp/1/
  26.  
  27.  
  28. IPS:
  29.  
  30. 173.11.42.134/
  31. 186.114.114.45/
  32. 187.194.238.129/
  33. 189.154.27.108/
  34. 189.190.146.226/
  35. 189.203.156.91/
  36. 190.49.250.34/
  37. 201.165.126.204/
  38. 201.214.73.42/
  39.  
  40.  
  41. site:gov intitle:Server Error in inurl:aspx?id=
  42.  
  43. Sirve para buscar fallas en tipo "aspx" Lines 278 ("Imposible Injection")
  44.  
  45. Not-SQL
  46. Not-XSS
  47. ("id")
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement