pls check this link
http://www.securityfocus.com/archive/1/359414
it was 2 years ago :D
http://www.root-security.org/danger/boastMachine.txt
Was this tried on a running site?or was this just source inspected?
in boastmachine folder, the below shouldn't be vulnerable with config.php
declaring $bmc_dir.
vote.php
--
include_once dirname(__FILE_
en, rizal, cR4SH3R, metalsploit
~ [EMAIL PROTECTED]
~ #aikmel #e-c-h-o @irc.dal.net
---
Contact:
K-159 || echo|staff || eufrato[at]gmail[dot]com
Homepage: http://k-159.echo.or.id/
[ EOF ] --
ylaw
~ sinChan,x`shell,tety,sakitjiwa, m_beben, rizal, cR4SH3R, metalsploit
~ [EMAIL PROTECTED]
~ #aikmel #e-c-h-o @irc.dal.net
-------
Contact:
K-159 || echo|staff || eufrato[at]gmail[dot]com
Homepag
--
Contact:
K-159 || echo|staff || eufrato[at]gmail[dot]com
Homepage: http://k-159.echo.or.id/
[ EOF ] --
Perl Exploit:
#!/usr/bin/perl
#
# Clever Copy <= 3.0 connect.inc Critical Informatio
bithedz,murp,an0maly,fleanux,baylaw
~ sinChan,x`shell,tety,sakitjiwa, m_beben, rizal, cR4SH3R, metalsploit
~ [EMAIL PROTECTED]
~ #aikmel #e-c-h-o @irc.dal.net
---
Contact:
K-159 || echo|staff || eufrato[at]gmail[d
y,sakitjiwa, m_beben, rizal, cR4SH3R, metalsploit
~ [EMAIL PROTECTED]
~ #aikmel #e-c-h-o @irc.dal.net
---
Contact:
~~~
K-159 || echo|staff || eufrato[at]gmail[dot]com
Homepage: htt
OTECTED]
~ #aikmel #e-c-h-o @irc.dal.net
---
Contact:
K-159 || echo|staff || eufrato[at]gmail[dot]com
Homepage: http://k-159.echo.or.id/
[ EOF ] --
irva32, anonymous
~ masterpop3, biatch-x, bithedz, Lieur-Euy, mr_Ny3m, maSter-oP, stev, sinChan,
cowok_1seng, x`shell, m_beben, etc
~ [EMAIL PROTECTED]
~ #e-c-h-o, #aikmel @irc.dal.net
-------
Contact:
K-159 || echo|s