After very long times I didn't write about hacking webserver, today "again" when surfing around I've found that Jcow Social networking engine can be exploited and the exploit ranking marked as "excellent". So actually, what happen when you have this Jcow vulnerable version??The simple thing is the attacker can go through your web server directory and doing everything there. For example, if you hosting your Jcow vulnerable version(on insecure hosting also ) you can own your web server directory . In this example, let's say I have a Jcow vulnerable web server in IP address 192.168.8.94. Actually, it's better to try installing your own web server, but if you want to find out Jcow in the wild you can search through Google dork " intext: Powered by Jcow 4.2.0 " and register as the normal user there. In this tutorial I have already registered as username: victi...
Komentar
Posting Komentar