Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/user/bing/ruby
- # dz Server Scanerr V 1.0 for scan server
- #to UZun-dz & Black-id & G-B & jsass & r0x & Massacreur & sql_st & and All Arab
- # WwW.Sec4ever.com
- # Hamza Killer
- require 'socket'
- require 'timeout'
- require 'net/http'
- require 'open-uri'
- def url(vu)
- begin
- uri = URI.parse(vu)
- xs="#{uri.scheme}://#{uri.host}/#{uri.path.split('/')[1]}"
- xss="#{xs}"
- return xss
- rescue
- puts" Error "
- end
- puts 'I am after the begin block.'
- end
- def xip(ips,dr)
- (0..15).each do |xdv|
- if dr == 'wordpress'
- dork="ip:#{ips}+page_id="
- elsif dr == 'jom'
- dork="ip:#{ips}+index.php?option=com_"
- end
- xs=URI("http://www.bing.com/search?q=#{dork}&first=#{xdv*10+1}")
- xd= Net::HTTP.get_response(xs)
- body=xd.body
- begin
- sos=body.scan(/<cite>(.*?)<strong>/)
- return sos.uniq
- rescue
- puts" Error "
- end
- puts'Retry ..... '
- end
- end
- def opp(ip, port)
- begin
- Timeout::timeout(1) do
- begin
- s = TCPSocket.new(ip, port)
- s.close
- return true
- rescue Errno::ECONNREFUSED, Errno::EHOSTUNREACH
- return false
- end
- end
- rescue Timeout::Error
- end
- return false
- end
- class String
- def red; "\033[31m#{self}\033[0m" end
- def green; "\033[32m#{self}\033[0m" end
- def brown; "\033[33m#{self}\033[0m" end
- def blue; "\033[34m#{self}\033[0m" end
- def cyan; "\033[36m#{self}\033[0m" end
- def gray; "\033[37m#{self}\033[0m" end
- def bg_red; "\033[41m#{self}\033[0m" end
- def bg_cyan; "\033[46m#{self}\033[0m" end
- def bg_gray; "\033[47m#{self}\033[0m" end
- def bg_blue; "\033[44m#{self}\033[0m" end
- def bg_brown; "\033[43m#{self}\033[0m" end
- end
- def cc(ip)
- path="/domains.php"
- http = Net::HTTP.new("domains.yougetsignal.com", 80)
- posts="remoteAddress=#{ip}"
- resp, data = http.post(path, posts)
- mp=resp.body.scan(/\"domainCount\":\"(.*?)\"/)
- for xon in mp
- return xon[0]
- end
- end
- def getsp(ip)
- http = Net::HTTP.new('www.infobyip.com', 80)
- path = "/ip-#{ip}.html"
- resp, data = http.get(path, nil)
- x=resp.body
- p=x.scan(/<tr><td class='center' >Domain: <b>(.*?)<\/b><br>/)
- for xp in p
- return xp[0]
- end
- end
- def xdzd(ip)
- path="/webserver.php"
- http = Net::HTTP.new("browserspy.dk", 80)
- posts="server=#{ip}"
- resp, data = http.post(path, posts)
- mp=resp.body.scan(/Web server<\/td>\n<td class="value">(.*?)<\/td>/)
- for xdz in mp
- return xdz[0]
- end
- end
- def xx(ip)
- xx=URI("http://www.infobyip.com/ip-#{ip}.html")
- f = open(xx)
- x=f.readlines.join
- p=x.scan(/<tr><td class='center' >Domain: <b>(.*?)<\/b><br>/)
- for xp in p
- return xp[0]
- end
- end
- print"[+] DZ Server Scaner V 1.0 \n"
- print"[+] C0ded By hamza killer \n"
- print "# Enter Ip ->"
- ip=gets.chomp
- x={'80'=>'www-http','443'=>'https','25'=>'SMTP','21'=>'Ftp','22'=>'ssh','23'=>'Telnet','3306'=>'mysql'}
- print"[+] Scan Port \n"
- x.each {|key, value|
- xss=opp(ip,key)
- if xss
- print"[+] port :#{key} ".green;print" for service #{value} open \n".bg_red
- end
- }
- xppp=xdzd(ip)
- print"[+] Server #{xppp}\n".red
- cx=getsp(ip)
- print"[+] Server Host: #{cx}\n".red
- xxxx=cc(ip)
- print"[+] Found #{xxxx} domain\n".cyan
- xsdsq=xip(ip,'wordpress')
- print"[+] extracting wordpress Sites \n".bg_blue
- for dz in xsdsq
- x=url("http://#{dz[0]}")
- print "[+]#{x}\n".blue
- end
- ss=xip(ip,'jom')
- print"[+] extracting Joomla Sites \n".blue.bg_brown
- for dz in xsdsq
- x=url("http://#{dz[0]}")
- print "[+]#{x}\n".brown
- end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement