In practice, we often face the following dilemma: we feel that the target website uses an open source code, however, the webmaster's modification to the page erased the explicit mark that could directly obtain the source code name. This is obviously not good for our cracking. We may be tired of downloading similar source code from various download websites to find the source code for research, we have obtained the website's background password, but cannot find the background path, and sometimes the background is still the default source code-what is the choice after the dictionary cannot be run?
Now I recommend another option: source code directory query-a service launched by www.seeknot.com. In fact, this idea is also common, that is, determine the source code name through the special file name of the website. Let's take a look at an example:
The target website is a shopping website. One of the topics "My sale" points to mycsproc. asp -- this page name is very characteristic. Oh, enter mycsproc in the search bar of www.seeknot.com. asp, select the default directory-based search method, and submit.
Two search results are returned: one is "the second version of integrity treasure Store" and the other is "the virtual game equipment trading station program". You can view all file names and directory structures through the "Directory List" link, further verification is the source code we are looking for, and we find that the default database path is "/db. mdb ", try to go down. If it succeeds, you can directly obtain the database, although the user password is md5 encrypted (ps: seeknot also provides an md5 hash query, simple md5 encrypted strings can be cracked, and other websites can also use this function. If you are lucky enough, you will encounter simple hash values and default backend paths, you can use "Manager/Admin_Login.asp.
In other words, with the source code directory query function of seeknot, you can obtain all sensitive information such as the database and background path in the best case. In the worst case, you can determine the source code and download a set, read the source code and find the vulnerability.
In fact, the source code Directory Search and md5 search are all information retrieval methods. Specifically, the search is essentially an action that exchanges space for time, we will launch similar targeted services one after another. The whole article seems to be advertising its own website, but if it is helpful and timely, then why do you recommend it yourself. By the way, we recommend this site to the majority of webmasters. I hope you can find the source code from here.