# Exploit Title: Orpak Fueling Systems - Google Dork and Exploit and Default Password
# Date: 12/2/2023
# Exploit Author: Parsa Rezaie Khiabanloo - Parsa Rezaei khiabanloo
# Vendor Homepage: Orpak (https://www.orpak.com/)
# Tested on: Linux/Android(termux)/Windows
Step 1 : Attacker can use this dork to find the panel
intitle:"SiteOmat Loader"
Step 2 : Attacker can login the panel with default password OR brute force it but sometimes default
username: Admin
password: Admin