SHA1: eaa4173d5745f6594f85e24c85ce5e8538f099b4
A tool for hacking administrative control panel of PhpMyAdmin which is used to manage relational databases. This tool is designed for Linux OSes. When launched, it receives data on IP range and two files; one of these files has a dictionary with login:password pairs, while another file contains the path to the administrative panel of PMA.
The following specific User-Agent value is used to brute-force passwords and logins:
User-Agent: Mozilla/5.0 Jorgee
Data on hacked resources is saved to "vulnerables.txt" as follows:
UNSECURED-Win32
http://<host>/<path/index.php?pma_username=<login>&pma_password=<pass>
or
UNSECURED-Unix
http://<host>/<path/index.php?pma_username=<login>&pma_password=<pass>
depending on the OS under which PMA operates.