Deface sch.id Teknik Bugbalitbang

Oke sob, seperti biasa, langsung saja kita simak bersama (^_^).

Dork in google..
1. inurl:"/html/index.php" intext:"Tim Balitbang"
2. inurl:"/html/index.php" intitle:"Selamat Datang"
3. inurl:"/member/" intext:"Tim Balitbang" 

D in bing..
1. IP:[target-IP] /html/
2. IP:[target-IP] sch.id
3. IP:[target-IP] ac.id
4. IP:[target-IP] blablablaa… having fun!


Dalam teknik ini, kita menggukan default pass member CMS Balitbang.



USERNAMEPASSWORDDETAILSSHELL UPLOAD
alan123456guruavailable
kickdody123456guruavailable
siswanto123456guruavailable
choirulyogya123456guruavailable
wardjana123456guruavailable
taufik123456guruavailable
tomi123456guruavailable
alumni123456siswanot available
070810120123456siswanot available














Setelah kita ketahui data - data default login member CMS Balitbang diatas, langkah selanjutnya adalah.

Sign in member form,,,
http://localhost/member/



Nah, seperti ini...




Login dan upload shell, lewat SIM -> Data Laporan, kemudian tambahkan laporan, nah dari sini kita upload shell kita, otomatis shell yg terupload akan berada pada path http://localhost/laporan/



Lalu terserah mau kita apakan, asal jangan merusak yaa sob (^_^)

X-Forum Hacking


Categories: , , , , Share

Leave a Reply