Advertisement
hamzakiller21

DZ Server Scaner V 1.0

Jun 18th, 2014
571
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Ruby 3.33 KB | None | 0 0
  1. #!/user/bing/ruby
  2. # dz Server Scanerr V 1.0 for scan server
  3. #to  UZun-dz & Black-id & G-B & jsass  & r0x & Massacreur & sql_st & and All Arab
  4. # WwW.Sec4ever.com
  5. # Hamza Killer
  6. require 'socket'
  7. require 'timeout'
  8. require 'net/http'
  9. require 'open-uri'
  10. def url(vu)
  11. begin
  12. uri = URI.parse(vu)
  13. xs="#{uri.scheme}://#{uri.host}/#{uri.path.split('/')[1]}"
  14. xss="#{xs}"
  15. return xss
  16. rescue
  17. puts" Error "
  18. end  
  19.   puts 'I am after the begin block.'  
  20. end
  21. def xip(ips,dr)
  22.         (0..15).each do |xdv|
  23. if dr == 'wordpress'
  24. dork="ip:#{ips}+page_id="      
  25. elsif dr == 'jom'
  26. dork="ip:#{ips}+index.php?option=com_"      
  27. end
  28. xs=URI("http://www.bing.com/search?q=#{dork}&first=#{xdv*10+1}")
  29. xd= Net::HTTP.get_response(xs)
  30. body=xd.body
  31. begin
  32. sos=body.scan(/<cite>(.*?)<strong>/)
  33. return sos.uniq
  34. rescue
  35. puts" Error "
  36. end  
  37. puts'Retry ..... '  
  38. end
  39. end
  40. def opp(ip, port)
  41. begin
  42. Timeout::timeout(1) do
  43. begin
  44. s = TCPSocket.new(ip, port)
  45. s.close
  46. return true
  47. rescue Errno::ECONNREFUSED, Errno::EHOSTUNREACH
  48. return false
  49. end
  50. end
  51. rescue Timeout::Error
  52. end
  53. return false
  54. end
  55. class String
  56. def red;            "\033[31m#{self}\033[0m" end
  57. def green;          "\033[32m#{self}\033[0m" end
  58. def  brown;         "\033[33m#{self}\033[0m" end
  59. def blue;           "\033[34m#{self}\033[0m" end
  60. def cyan;           "\033[36m#{self}\033[0m" end
  61. def gray;           "\033[37m#{self}\033[0m" end
  62. def bg_red;         "\033[41m#{self}\033[0m" end
  63. def bg_cyan;        "\033[46m#{self}\033[0m" end
  64. def bg_gray;        "\033[47m#{self}\033[0m" end
  65. def bg_blue;        "\033[44m#{self}\033[0m" end
  66. def bg_brown;       "\033[43m#{self}\033[0m" end
  67. end
  68. def cc(ip)
  69. path="/domains.php"
  70. http = Net::HTTP.new("domains.yougetsignal.com", 80)
  71. posts="remoteAddress=#{ip}"
  72. resp, data  = http.post(path, posts)
  73. mp=resp.body.scan(/\"domainCount\":\"(.*?)\"/)
  74. for xon in mp
  75. return xon[0]
  76. end
  77. end
  78. def getsp(ip)
  79. http = Net::HTTP.new('www.infobyip.com', 80)
  80. path = "/ip-#{ip}.html"
  81. resp, data = http.get(path, nil)
  82. x=resp.body
  83. p=x.scan(/<tr><td class='center' >Domain: <b>(.*?)<\/b><br>/)
  84. for xp in p
  85. return xp[0]
  86. end
  87. end
  88. def xdzd(ip)
  89. path="/webserver.php"
  90. http = Net::HTTP.new("browserspy.dk", 80)
  91. posts="server=#{ip}"
  92. resp, data  = http.post(path, posts)
  93. mp=resp.body.scan(/Web server<\/td>\n<td class="value">(.*?)<\/td>/)
  94. for xdz in mp
  95. return xdz[0]
  96. end
  97. end
  98. def xx(ip)
  99. xx=URI("http://www.infobyip.com/ip-#{ip}.html")
  100. f = open(xx)
  101. x=f.readlines.join
  102. p=x.scan(/<tr><td class='center' >Domain: <b>(.*?)<\/b><br>/)
  103. for xp in p
  104. return xp[0]
  105. end
  106. end
  107. print"[+] DZ Server Scaner V 1.0 \n"
  108. print"[+] C0ded By hamza killer  \n"
  109. print "# Enter Ip ->"
  110. ip=gets.chomp
  111. x={'80'=>'www-http','443'=>'https','25'=>'SMTP','21'=>'Ftp','22'=>'ssh','23'=>'Telnet','3306'=>'mysql'}
  112. print"[+] Scan Port \n"
  113. x.each {|key, value|
  114. xss=opp(ip,key)
  115. if xss
  116. print"[+] port :#{key} ".green;print" for service #{value} open \n".bg_red
  117. end
  118. }
  119. xppp=xdzd(ip)
  120. print"[+] Server #{xppp}\n".red
  121. cx=getsp(ip)
  122. print"[+] Server Host: #{cx}\n".red
  123. xxxx=cc(ip)
  124. print"[+] Found #{xxxx} domain\n".cyan
  125. xsdsq=xip(ip,'wordpress')
  126. print"[+] extracting wordpress Sites \n".bg_blue
  127. for dz in xsdsq
  128. x=url("http://#{dz[0]}")
  129. print "[+]#{x}\n".blue
  130. end
  131. ss=xip(ip,'jom')
  132. print"[+] extracting Joomla Sites \n".blue.bg_brown
  133. for dz in xsdsq
  134. x=url("http://#{dz[0]}")
  135. print "[+]#{x}\n".brown
  136. end
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement