Monday, August 13, 2012
How to use Joomscan to find the Joomla Vulnerability in Backtrack 5 Linux?
Published :
1:38 AM
Author :
shwekoyantaw
တစ္ကယ္ေတာ့ Jommla scan သံုးတယ္ဆိုတာ Hacking လုပ္တယ္လို႕မဆိုလိုႏိုင္ဘူးဗ်...။ယိုေပါက္ vulnerability ေတြကို Jommla CMS ထဲမွာေပါက္မေပါက္စစ္ေပးတာဗ်..ေနာက္ဆံုးထြက္ Updated version ဆိုရင္ Vulnerabilities 550 ေလာက္ကိုစံုစမ္းေထာက္လွမ္း ေပးႏိုင္တယ္..။ဒါကိုဘယ္လိုအသံုးျပဳရမလဲဆိုတာ ကိုကၽြန္ေတာ္တင္ျပေရးသားေပးပါ့မယ္...။ Jommla scan မရိွလွ်င္ jommla scan ကိုေအာက္ပါေနရာတြင္ေဒါင္းလုပ္ဆြဲလိုက္ပါ...။
http://web-center.si/joomscan/joomscan.tar.gz
ေနာက္တစ္ဆင့္အေနနဲ႕ကေတာ့ ေအာက္ေဖာ္ျပပါ directory အတိုင္းထားေပးလိုက္ပါ...။
/pentest/web/scanners/joomscan/
ေနာက္တစ္ဆင့္အေနနဲ႕ကေတာ့ Joomscan ကို set permission လုပ္ဖို႕လိုပါေသးတယ္..ဘယ္လိုလုပ္ရမလဲဆိုရင ္Terminal ထဲကိုသြာျပီးေအာက္ပါ commands မ်ားကိုရိုက္ထည့္လိုက္ပါ..။
CHMOD 0777 joomscan.pl
ေနာက္တစ္ဆင့္ကေတာ့ ေနာက္ဆံုးထြက္ version ကို update လုပ္ရမယ္..အဲလိုလုပ္မယ္ဆိုရင္ Terminal ထဲကပဲ ၀င္ျပီးေတာ့ ေအာက္ပါ commands ေတြကိုရိုက္ထည့္လိုက္ပါ...။
./joomscan.pl update
ဒါဆိုရင္အားလံုး OK ျပီ..စလို႕ရျပီ...ကၽြန္ေတာ္တို႕ Jommla scan ကိုသံုးျပီးေတာ့ ယိုေပါက္ေတြကို စတင္ ေထာက္လွမ္းႏိုင္ပါျပီ ထိုေဖာက္၀င္ေရာက္ျခင္းအတြက္ကေတာ့ ကိုယ္ရဲ႕ Hacking scale နဲ႕ဆိုင္ပါတယ္....။ Terminal ထဲကိုသြားျပီးေတာ့ေအာက္ပါ command ကိုသံုးျပီစတင္ စစ္ေဆးႏိုင္ပါျပီ...။
./joomscan.pl -u www.YourJoomlasite.com..
www.YourJoomlasite.com ဆိုတဲ့ေနရာမွာ သင့္ Terget ဆိုက္ကိုထည့္ပါ...။ျပီးရင္ စစ္ေဆးေနတဲ့အခ်ိန္ကို ခဏေစာင့္ပါ....။ယိုေပါက္ရိွပါက ေဖာ္ျပေပးပါလိမ့္မယ္...။လံုျခံဳေရးအားေကာင္းတဲ့ ဆိုက္မ်ားအတြက္ အာမ မခံပါ...။
Shwekoyantaw....
Pageviewers
CBOX
Manutd-Results
LINK
Label
Android
(3)
autorun
(3)
Backtrack
(8)
batch file
(19)
blogger
(10)
Botnet
(2)
browser
(5)
Brute Force
(6)
cafezee
(2)
cmd
(5)
Cookies
(2)
crack
(12)
Cracking
(2)
crypter
(7)
DDos
(20)
deepfreeze
(4)
defacing
(1)
defence
(16)
domain
(4)
Dos
(9)
downloader
(4)
ebomb
(2)
ebook
(48)
Exploit
(26)
firewall
(3)
game
(2)
gmail
(11)
google hack
(16)
Hacking Show
(3)
Hash
(4)
hosting
(1)
icon changer
(1)
ip adress
(6)
Keygen
(1)
keylogger
(8)
knowledge
(67)
locker
(1)
maintainence
(8)
network
(17)
news
(31)
other
(35)
passwoard viewer
(7)
password
(12)
Philosophy
(6)
Phishing
(8)
premium account
(2)
proxy
(7)
RAT
(10)
run commands
(4)
script
(27)
Shell code
(10)
shortcut Key
(2)
SMTP ports
(1)
social engineering
(7)
spammer
(1)
SQL Injection
(30)
Stealer.crack
(5)
tools
(125)
Tools Pack
(4)
tutorial
(107)
USB
(3)
virus
(32)
website
(84)
WiFi
(4)
word list
(2)
HOW IS MY SITE?
Powered by Blogger.
Blog Archive
-
▼
2012
(210)
-
▼
August
(13)
- Creating Andriod Trojan in 5 steps
- ..:: How to upload shell via Wordpress ::..[2 meth...
- [Tut]Error-Based SQL Injection[/Tut]
- [TUT]Vbulletin Forum Hacking with Header-Based SQL...
- Many Kind Of DDOS
- BackTrack 5 R3 Released - Download Now !
- Ideal Skill Set For the Penetration Testing
- Great work !!!! Myanmar cyber counter ddos team (M...
- How to use Joomscan to find the Joomla Vulnerabili...
- BD Site is hacked by Chinese Hackers
- Come Back MCST For BD Cyber Operation
- Myanmar Hacker Groups Hacked Bangladesh Sites
- Some Examples for SE
-
▼
August
(13)
Followers
About Me
Popular Posts
-
--- မိတ္ဆက္--- Injection နဲ႔ပက္သက္တဲ႔အပုိင္းကုိ အေတြ႔အၾကံဳ မရင့္က်က္ေသးတဲ႔သူေတြ၊ အေတြ႔အၾကံဳရွိၿပီးတဲ႔သူေတြပါ နားလည္ႏုိင္ေအာင္ ကၽြန္ေတာ့္...
-
အေကာင္းစားမွန္ဘီလူး (မ်တ္ခ်က္။ ။ရွားေလာ့ဟုန္းဆီကမဟုတ္ပါ) ကၽြန္ေတာ္မွန္ဘီလူးေလးတစ္လက္ရထားတယ္။ ဘယ္ႏွယ္ဗ်ာ ကၽြန္ေတာ့္မွန္ဘီလူးကိုမ်ာ...
-
အဓိက က ေတာ့ forums ေတြပဲ. Register လုပ္မွ ၀င္ေရာက္ၾကည့္ရွဳ ႏိုင္မယ္.. bypass လုပ္ဖုိ႔ ကေတာ့ SQL injection ကေတာ့ အေကာင္းဆံုးေပါ့.. အခုေတာ့ ...
-
အသိပညာ ဗဟုသုတသည္ ဟက္ကာတုိ႔ရန္မွ ကာကြယ္ရန္ စြမ္းအားတစ္ခုၿဖစ္ေပသည္။ ယေန႔ေခတ္ အုိင္တီနယ္ပယ္ဆုိင္ရာ စီမံခန္႔ခြဲမႈတြင္ တာ၀န္ရွိသူမ်ားသည္ ၄င္းတ...
-
SQL Dorks အသစ္ေလးေတြလို႔ထင္ပါတယ္..ဒီက ဟက္ကာေတြအတြက္ေတာ့ ေဟာင္းခ်င္ေဟာင္းေနမွာေပါ့..ကၽြန္ေတာ့္ဆီရွိတာေလးေတြပါ..မၾကိဳက္လဲ ေနေပါ့. :P inurl...
-
ဘာရယ္လို႕မဟုတ္ပါဘူး ဒီေန႕ဘာတင္ရ မလဲစဥ္းစားရင္း အေျခခံကစၾကတာေပါ့။ ပထမဆံုး notepad ကိုေခၚပါ။batch file ေရးနည္းက programmingအာလံုး .bat...
-
ကဲဆိုက္တစ္ခုကရတာျပန္ျပီးေတာ့ေ၀မွ်လိုက္ပါတယ္။စမ္းသပ္ခ်င္သူေတြအတြက္ပါ။ သံုးခ်င္ရင္ သံုးပါ။စည္ကမ္းေတာ့ရိွပါေစ။ code: http://13campaign.org...
-
LFI Local File Inclusion ေလး အေၾကာင္းေျပာခ်င္ပါတယ္ ညီကိုတို႔.... Online မွာ LFI ေပါက္ေနတဲ့ဆိုက္ေတြ သန္းခ်ီပီးရွိေနပါတယ္.... Web Hacking ေ...
-
ဒီပိုစ့္ေလးဟာ LFI ေပၚမွာဆင့္ကဲေျပာင္းလဲထားတာျဖစ္ျပီးေတာ့ BASE 64 php filter ကိုအသံုးျပဳမွာျဖစ္ပါတယ္....။ဆာဗာမွာရိွတဲ့ connect.php / conf...
-
Fg Power DDOSER This tool is primarily a “hostbooter” and is aimed at giving unscrupulous gamers an advantage by flooding oppon...
Labels
- Android (3)
- autorun (3)
- Backtrack (8)
- batch file (19)
- blogger (10)
- Botnet (2)
- browser (5)
- Brute Force (6)
- cafezee (2)
- cmd (5)
- Cookies (2)
- crack (12)
- Cracking (2)
- crypter (7)
- DDos (20)
- deepfreeze (4)
- defacing (1)
- defence (16)
- domain (4)
- Dos (9)
- downloader (4)
- ebomb (2)
- ebook (48)
- Exploit (26)
- firewall (3)
- game (2)
- gmail (11)
- google hack (16)
- Hacking Show (3)
- Hash (4)
- hosting (1)
- icon changer (1)
- ip adress (6)
- Keygen (1)
- keylogger (8)
- knowledge (67)
- locker (1)
- maintainence (8)
- network (17)
- news (31)
- other (35)
- passwoard viewer (7)
- password (12)
- Philosophy (6)
- Phishing (8)
- premium account (2)
- proxy (7)
- RAT (10)
- run commands (4)
- script (27)
- Shell code (10)
- shortcut Key (2)
- SMTP ports (1)
- social engineering (7)
- spammer (1)
- SQL Injection (30)
- Stealer.crack (5)
- tools (125)
- Tools Pack (4)
- tutorial (107)
- USB (3)
- virus (32)
- website (84)
- WiFi (4)
- word list (2)
Labels
- Android (3)
- autorun (3)
- Backtrack (8)
- batch file (19)
- blogger (10)
- Botnet (2)
- browser (5)
- Brute Force (6)
- cafezee (2)
- cmd (5)
- Cookies (2)
- crack (12)
- Cracking (2)
- crypter (7)
- DDos (20)
- deepfreeze (4)
- defacing (1)
- defence (16)
- domain (4)
- Dos (9)
- downloader (4)
- ebomb (2)
- ebook (48)
- Exploit (26)
- firewall (3)
- game (2)
- gmail (11)
- google hack (16)
- Hacking Show (3)
- Hash (4)
- hosting (1)
- icon changer (1)
- ip adress (6)
- Keygen (1)
- keylogger (8)
- knowledge (67)
- locker (1)
- maintainence (8)
- network (17)
- news (31)
- other (35)
- passwoard viewer (7)
- password (12)
- Philosophy (6)
- Phishing (8)
- premium account (2)
- proxy (7)
- RAT (10)
- run commands (4)
- script (27)
- Shell code (10)
- shortcut Key (2)
- SMTP ports (1)
- social engineering (7)
- spammer (1)
- SQL Injection (30)
- Stealer.crack (5)
- tools (125)
- Tools Pack (4)
- tutorial (107)
- USB (3)
- virus (32)
- website (84)
- WiFi (4)
- word list (2)
Archive
-
▼
2012
(210)
-
▼
August
(13)
- Creating Andriod Trojan in 5 steps
- ..:: How to upload shell via Wordpress ::..[2 meth...
- [Tut]Error-Based SQL Injection[/Tut]
- [TUT]Vbulletin Forum Hacking with Header-Based SQL...
- Many Kind Of DDOS
- BackTrack 5 R3 Released - Download Now !
- Ideal Skill Set For the Penetration Testing
- Great work !!!! Myanmar cyber counter ddos team (M...
- How to use Joomscan to find the Joomla Vulnerabili...
- BD Site is hacked by Chinese Hackers
- Come Back MCST For BD Cyber Operation
- Myanmar Hacker Groups Hacked Bangladesh Sites
- Some Examples for SE
-
▼
August
(13)