1 <?php
2 //786
3 /*
4 ==============================================================================
5 _ _ _ _ _ _
6 / \ | | | | / \ | | | |
7 / _ \ | | | | / _ \ | |_| |
8 / ___ \ | |___ | |___ / ___ \ | _ |
9 IN THE NAME OF /_/ \_\ |_____| |_____| /_/ \_\ |_| |_|
10
11
12 ==============================================================================
13 ____ _ _ _ _ ___ _ __
14 / ___| | || | | \ | | / _ \ | |/ /
15 | | _ | || |_ | \| | | | | | | ’ /
16 | |_| | |__ _| | |\ | | |_| | | . \
17 \____| |_| |_| \_| \___/ |_|\_\ I’m From Iran...
18
19 ==============================================================================
20
eLitius v1.0 Remote Command Execution Exploit
21 ==============================================================================
22
23
[ª] Script:.............[ eLitius v1.0 ]..............................
24
[ª] Website:............[ http://www.elitius.com/ ]...................
25
[ª] Today:..............[ 30042009 ]..................................
26
[ª] Founder:............[ G4N0K | mail[o]ganok[sh!t]gmail.com ].......
27
28
29
[!] What is going on...
30
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−
31
00. Auth Bypass...
32
01. Arbitrary File upload (MIME−Type Spoofing)...
33
34
35 [+] demo...
36
−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−
37
xpl.php 127.0.0.1 /eLitius_v_1_0/
38
39 +−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−+
40 | eLitius v1.0 Remote Command Execution Exploit |
41 | by: G4N0K | mail[o]ganok[ta]com |
42 | Thanks: ALLAH, MSD, SMN, AMD, AFN |
43 +−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−+
44