hack antispam code (if numbers are not changed) - نوشته شده در (2102 Views)
New Member
Sonic
مطلب: 82
82
where: anti-spam-registration code and
guestbook 3.6

what: users / scripts can count back the antispam code and can enter the right security code

exploit: right click on a security image you should see --> e.g. http://aspire/register.asp?code=image&rc=12343321851&p=1

- we now need the number red marked
- and the count variable (in the antispam code)
RandCode = (strRCCode + 17456) / 50000

==> now count:
12343321851 + 17456 / 50000 = you get the image code
bugfix: to prevent this change the numbers to some other e.g.
from -> RandomizedCode = NumbersToShow * 50000 - 17456 to => RandomizedCode = NumbersToShow * 47900 - 15249
and:

from -> RandCode = (strRCCode + 17456) / 50000 to => RandCode = (strRCCode + 15249) / 47900
don't use the numbers here it is just a sample use other numbers... i don't know a page where it was happen but the way is there... so it is better to change everything to make it heavy to hack something smile<
ich finds genial... bei uns ist es ratzekuz dunkel und bei dene alle heller nachmittag smile
 پیش‌فرض مرتب‌سازی برای تاریخ DESC به معنی جدیدترین است  
 تعداد در صفحه 
نوشته شده در
Junior Member
Nertz
مطلب: 341
341
Actually if you submit this URL with register.asp?code=image&rc=12343321851&p=1, it will redirect to the first digit image which is usually in the form of n.gif. The file name actually gives away the digit in the code. Increasing the number for p will eventually get you all the digits, ireegardless of what formula you used. There should be a way to prevent register.asp from showing the digits if the page was not called from a form submit.
cheers,
Nat<
Sadly, most Family Court Judges wrongfully reward opportunistic gold diggers
that use our children unjustly as "instruments" of power.

www.fathers-4-justice-canada.ca
 
شما باید یک متن وارد کنید