BBSXP5.15 latest vulnerability Lite version

Source: Internet
Author: User

First open www.google.com and enter Po ...... bBsxp5.15 has a lot of such forums. If you just click one, you will be lucky to have this bbs.yuntea.com. This site hasn't been patched yet. It's just a blow to the end. bbsxp5.15 has the latest vulnerability. The vulnerability mainly lies in the BLOG. ASP allows you to directly construct database commands

Blog. asp? Id = 1% 20 union % 20 select % 20top % 201% 201, [adminpassword], 1%, 20 from % 20 [clubconfig]

The md5 password of the background administrator is displayed.

The front-end password is also available,

Related animations and software are available on the Internet.

By exploiting this vulnerability, a group of bbsxp websites must have fallen.

Next we will talk about the tool and prepare the MD5 password cracking tool.

For md5 cracking, the md5cracker speed enhancement version is better.

1. First Run with 8 or 9 digits. Soon.

2. If not, run it in lowercase letters. It is better to select 5-6 digits.

3. No, it means that the password may add a number to a letter, and you can try your luck. You can configure a boutique user-defined code, such as 10 Gb,

Run on and for several hours. (Your machine configuration must be good)

4. No, I suggest you give up. It's so abnormal.

Foreground OK... background password... (Note: you must know the Administrator account)

The default configuration is to directly win the background password...

The front-end md5 password is exposed.

The rest is about to crack md5.

Now we start working.

It becomes a token.

The password is 7CB2BE65EB9F215215A0725A10B6E39E. The front-end password may be the same as the backend password. If there are two encryption passwords, the front-end password is the same as the front-end password.

Follow the introduction of the above tool to use numbers first,

Breaking === patience, etc.

If you don't mind ~

Come out. The password is 82246124. log in. His account is wzwu. The password is 82246124. The logon is successful. The backend logon is successful. The password is 82246124. You should know the cause below, I will not talk much about it, so as not to be scolded by others.

The author of the latest bBsxp5.15 vulnerability is unclear.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.