Advertisement
Altenator_IWnet

1337scan v0.4 (Modified Edition) (1337day Engine and Proxy)

Dec 20th, 2012
271
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <!--
  2. ########################################################################
  3. # Script : 1337 Multiple CMS Scanner Online v0.4 ( Modified Edition )
  4. # Author : AlternatorIWnet
  5. # Original Author : KedAns-Dz ( ked-h [ at ] hotmail [ dot ] com )
  6. # Author HomePage : www.1337day.com
  7. # What Change ?! :-
  8. #   - Better Reverse IP method
  9. #   - Replace File_Get_Contents with cURL
  10. #   - Change Style  ;)
  11. #   - Change PacketStormSecurity to Exploit-DB  :D
  12. #   - Add 1337day exploit finder engine
  13. #   - Proxy Support
  14. # Greets to : Dz Offenders Cr3W - Algerian Cyber Army - Inj3ct0r Team - TBD Security
  15. #########################################################################
  16.  
  17. // Script Functions , start ..!
  18. -->
  19.  
  20. <html>
  21. <head>
  22. <meta http-equiv="Content-Language" content="fr">
  23. <meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
  24. <title>1337 Multiple CMS Scanner Online v0.4 (0!IIIV) by KedAns-Dz ( Modified by AlternatorIWnet )</title>
  25. <meta content="KedAns-Dz , Inj3ct0r Team , 1337 Multiple CMS Scanner Online, AltenatorIWnet" name="description">
  26. <link href="http://209.217.227.77/~forumant/favicon.ico" type="image/x-icon" rel="shortcut icon" />
  27. <style>
  28. @import url(http://fonts.googleapis.com/css?family=Fredoka+One);@import url(http://fonts.googleapis.com/css?family=Alike);body {background: #000000 repeat-x;font: 75%/170% Arial, Helvetica, sans-serif;padding: 0px;margin: 0px;color: #C4C4C4;}a:visited {COLOR: #0066cc;text-decoration none;cursor:pointer;}a:link {COLOR: #ffcb07;cursor:pointer;}input{vertical-align: middle;color: #000;cursor:pointer;padding:4px 7px;font-weight:bold;background rgba(0, 0, 0, .75);border:1px solid #afbccb;border-radius:5px;box-shadow:0 1px 2px rgba(175,188,203,0.6), inset 0 10px 15px rgba(255,255,255,0.5), inset 1px 1px rgba(255,255,255,0.5), inset -1px -1px rgba(255,255,255,0.5);text-shadow:0 1px rgba(255,255,255,0.5);}input:hover, input:focus{background-color: #ffcb07;border-color:rgba(0,0,0,.25);color:#000}textarea{font-family: 'Alike', serif;font-weight:200;padding:5px;box-shadow: rgba(255, 255, 255, .75) 0px 0px 9px 1px;background-color:rgba(0, 0, 0, .25);    color:#ffcb07;border-radius:5px;height: 168px; width: 887px;}.link{font-size:12px;}.head{color: #FFF;font-family: 'Fredoka One', cursive;font-size: 30px;font-weight:400;}.link {font-size:}.foot{font-family: 'Fredoka One', cursive;padding: 2px;border-top: 1px solid #EBEBEB;background-color: #FFF;bottom:0;position:fixed;width:100%;height: 20px;font-size: 15px;}.number{ font-size:15px; color:#fff; }
  29. </style>
  30.  
  31. </head>
  32.  
  33. <body>
  34. <?
  35. if(isset($_REQUEST['searchleet'])){
  36.     echo "<center><br><h2> 1337day Exploit Finder </h2><h4> Author : Altenator Iwnet </h4>";
  37.     $search = getcookie(getdata("http://1337day.net/", "", "agree=Ok"));
  38.     $search = getdata("http://1337day.net/search", $search, "dong=".$_REQUEST['searchleet']."&submit_search=Submit");
  39.     if(strpos($search, "DESCRIPTION")){
  40.         echo'<table border="1" width="80%" align=\"center\"><tr><td><b> Name </b></td><td align=center><b> Date </b></td></tr>';
  41.         $data = explode("<tr class='TableContent'>", $search);
  42.         foreach($data as $a){
  43.             if(strpos($a, "/exploit/")){
  44.                 $date = explode("'>", $a);
  45.                 $date = explode('</a><', $date[1]);
  46.                 $link = explode("/exploit/description/", $a);
  47.                 $link = explode("' >", $link[1]);
  48.                 $name = explode('</a>', $link[1]);
  49.                 echo "<tr><td><a href=\"http://1337day.net/exploit/".$link[0]."\">".$name[0]."</a></td><td align=center>".$date[0]."</td><tr>";
  50.             }
  51.         }
  52.     }else{
  53.         echo "<br><h2>No exploit search \"".$_REQUEST['searchleet']."\" found</h2>";
  54.     }
  55.     echo "</table>";
  56.     die();
  57. }
  58. ?>
  59. <br><br>
  60. <p align="center"><font size="4">1337 Multiple CMS Scanner Online v0.4 (0!IIIV) | T0olKit By : KedAns-Dz </font></p><br><p align="center"><font size="4">( Modified by AltenatorIWnet )</font></p><br>
  61. <center><table align=center border=1>
  62. <form method="POST">
  63. <tr><td>Site</td><td><input type="text" name="site" size="40" value="<?php if(isset($_POST['site'])){ echo $_POST['site']; } ?>"></td></tr>
  64. <tr><td>Proxy</td><td><input type="text" name="proxy" size="40" value="<?php if(isset($_POST['proxy'])){ echo $_POST['proxy']; } ?>"></td></tr>
  65. <tr><td colspan=2 align=center><input type="submit" value="Scan.."></td></tr>
  66. </table>
  67. </form>
  68. *Use proxy if problem with reverse IP<br>
  69. You can get proxy <a href="http://www.freeproxylists.net/" target="_blank">here</a>
  70.  
  71. <?php
  72. @session_start();
  73. @error_reporting(0);
  74. @ini_set('error_log',NULL);
  75. @ini_set('log_errors',0);
  76. @ini_set('max_execution_time',0);
  77. @set_time_limit(0);
  78. @set_magic_quotes_runtime(0);
  79.  
  80. /* Use Curl to replace file_get_contents */
  81. function getdata($url, $cookies = "", $post = "")
  82. {
  83.     $ch = @curl_init();
  84.     curl_setopt($ch, CURLOPT_URL, $url);
  85.     curl_setopt($ch, CURLOPT_HEADER, 1);
  86.     if ($cookies) curl_setopt($ch, CURLOPT_COOKIE, $cookies);
  87.     curl_setopt($ch, CURLOPT_USERAGENT, 'Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.11 (KHTML, like Gecko) Chrome/23.0.1271.97 Safari/537.11');
  88.     curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  89.     if ($post){
  90.         curl_setopt($ch, CURLOPT_POST, 1);
  91.         curl_setopt($ch, CURLOPT_POSTFIELDS, $post);
  92.     }
  93.     curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, FALSE);
  94.     curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, FALSE);
  95.    
  96.     curl_setopt($ch, CURLOPT_TIMEOUT, 30);
  97.     curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, 20);
  98.     $page = curl_exec( $ch);
  99.     curl_close($ch);
  100.     return $page;
  101. }
  102.  
  103. /* Extract cookie from respond data */
  104. function getcookie($content){
  105.     preg_match_all('/Set-Cookie: (.*);/U',$content,$temp);
  106.     $cookie = $temp[1];
  107.     $cookies = implode('; ',$cookie);
  108.     return $cookies;
  109. }
  110.  
  111. /* Check Exploit At 1337day */
  112. function leetday($data){
  113.     $cookie = getcookie(getdata("http://1337day.net/", "", "agree=Ok"));
  114.     $search = getdata("http://1337day.net/search", $cookie, "dong=".$data."&submit_search=Submit");
  115.     if(strpos($search, "DESCRIPTION")){
  116.         return true;
  117.     }else{
  118.         return false;
  119.     }
  120. }
  121.  
  122. /* Check Exploit At Exploit-DB */
  123. function exploitdb($data){
  124.     $search = getdata("http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=&filter_exploit_text=".$data."&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=", "", "");
  125.     if(strpos($search, "No results")){
  126.         return false;
  127.     }else{
  128.         return true;
  129.     }
  130. }
  131.  
  132. /* Search Exploit */
  133. function check_exploit($cpmxx){
  134.  
  135.     $leetday = leetday($cpmxx);
  136.     $exploitdb = exploitdb($cpmxx);
  137.    
  138.     if($exploitdb){
  139.         echo "<td><a href=\"http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=&filter_exploit_text=".$cpmxx."&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=\">Found</a></td>";
  140.     }else{
  141.         echo "<td>Not Found</td>";
  142.     }
  143.    
  144.     if($leetday){
  145.         echo "<td><a href=\"?searchleet=".$cpmxx."\">Found</a></td>";
  146.     }else{
  147.         echo "<td>Not Found</td>";
  148.     }
  149.    
  150.     if($exploitdb == TRUE || $leetday == TRUE){
  151.         echo "<td><=</td></tr>";
  152.     }else{
  153.         echo "<td><a href='http://www.google.com/#hl=en&q=download+".$cpmxx."'>Download</a></td></tr>";
  154.     }
  155. }
  156.  
  157.  
  158. /* Joomla Conf */
  159. function check_com($url){
  160.     $source = @getdata("http://".$url."/", "", "");
  161.     preg_match_all('{option,(.*?)/}i',$source,$f);
  162.     preg_match_all('{option=(.*?)(&amp;|&|")}i',$source,$f2);
  163.     preg_match_all('{/components/(.*?)/}i',$source,$f3);
  164.     $arz=array_merge($f2[1],$f[1],$f3[1]);
  165.     $coms=array();
  166.     if(count($arz)==0){ echo "<tr><td colspan=4>[ Joomla ] ...Nothing Found !</td></tr>";}
  167.     foreach(array_unique($arz) as $x){
  168.         $coms[]=$x;
  169.     }
  170.     foreach($coms as $comm){
  171.         if(strlen($comm) < 40 & !strpos($comm, ".js")) {
  172.             echo "<tr><td>$comm</td>";
  173.             check_exploit($comm);
  174.         }
  175.     }
  176. }
  177.  
  178. /* WordPress Conf */
  179. function get_plugins($url){
  180.     $source = @getdata("http://".$url."/", "", "");
  181.     preg_match_all("#/plugins/(.*?)/#i", $source, $f);
  182.     $arz=array_unique($f[1]);
  183.     if(count($arz)==0){
  184.         echo "<tr><td colspan=4>[ Wordpress ] ...Nothing Found !</td></tr>";
  185.     }
  186.     foreach($arz as $plugin){
  187.         if(strlen($plugin) < 40 & !strpos($comm, ".js")) {
  188.             echo "<tr><td>$plugin</td>";
  189.             check_exploit($plugin);
  190.         }
  191.     }
  192. }
  193.  
  194. /* Nuke's Conf */
  195. function get_numod($url){
  196.     $source = @getdata("http://".$url."/", "" ,"");
  197.     preg_match_all('{?name=(.*?)/}i',$source,$f);
  198.     preg_match_all('{?name=(.*?)(&amp;|&|l_op=")}i',$source,$f2);
  199.     preg_match_all('{/modules/(.*?)/}i',$source,$f3);
  200.     $arz=array_merge($f2[1],$f[1],$f3[1]);
  201.     $cpm=array();
  202.     if(count($arz)==0){
  203.         echo "<tr><td colspan=4>[ Nuke's ] ...Nothing Found !</td></tr>";
  204.     }
  205.     foreach(array_unique($arz) as $x){
  206.         $cpm[]=$x;
  207.     }
  208.     foreach($cpm as $nmod){
  209.         if(strlen($nmod) < 40 & !strpos($comm, ".js")) {
  210.             echo "<tr><td>$nmod</td>";
  211.             check_exploit($nmod);
  212.         }
  213.     }
  214. }
  215.  
  216. /* Xoops Conf */
  217. function get_xoomod($url){
  218.     $source = @getdata("http://".$url."/", "", "");
  219.     preg_match_all('{/modules/(.*?)/}i',$source,$f);
  220.     $arz=array_merge($f[1]);
  221.     $cpm=array();
  222.     if(count($arz)==0){
  223.         echo "<tr><td colspan=4>[ Xoops ] ...Nothing Found !</td></tr>";
  224.     }
  225.     foreach(array_unique($arz) as $x){
  226.         $cpm[]=$x;
  227.     }
  228.     foreach($cpm as $xmod){
  229.         if(strlen($xmod) < 40 & !strpos($comm, ".js")) {
  230.             echo "<tr><td>$xmod</td>";
  231.             check_exploit($xmod);
  232.         }
  233.     }
  234. }
  235.  
  236. /**************************************************************/
  237.  
  238. if(!isset($_POST['site'])) { $credit = credit();die("<br><br>$credit"); }
  239.  
  240. function revip($ip){
  241. $SiteToRev = $ip;
  242. $site = "";
  243. $proxy = $_POST['proxy'];
  244.  
  245. $ch = curl_init();
  246. curl_setopt($ch, CURLOPT_URL, "http://www.yougetsignal.com/tools/web-sites-on-web-server/php/get-web-sites-on-web-server-json-data.php?remoteAddress=$SiteToRev");
  247. curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
  248. if(isset($proxy)){
  249.     curl_setopt($ch, CURLOPT_HTTPPROXYTUNNEL, TRUE);
  250.     curl_setopt($ch, CURLOPT_PROXY, $proxy);
  251. }
  252. $result = curl_exec($ch);
  253.  
  254. $jDecode = json_decode($result);
  255. if(strtolower($jDecode->status) == "fail"){
  256.     echo "<center>".$jDecode->message."</center>";
  257. }else{
  258.     for($i = 0; $i < $jDecode->domainCount; $i++){
  259.         if(isset($jDecode->domainArray[$i][0])){
  260.             $site = $site."++".$jDecode->domainArray[$i][0];
  261.         }
  262.     }
  263.     return $site;
  264. }
  265. }
  266.  
  267. function CleanAndClear($site) {
  268.     $output = strtolower($site);
  269.     $aaa = array("http://" ,"www.");
  270.     foreach($aaa as $aa1) {
  271.         if (strpos($output, "$aa1") != FALSE) {
  272.             $output = (str_replace("$aa1", "", $output));
  273.         }
  274.     }
  275.     return $output;
  276. }
  277.  
  278. $start_array = array_filter(explode("++", revip($_POST['site'])));
  279.            
  280. echo'<table border="1"  width=\"80%\" align=\"center\">
  281. <tr><td width=\"30%\"><b>Server IP&nbsp;&nbsp;&nbsp;&nbsp; : </b></td><td><b>'.gethostbyname(CleanAndClear($_POST['site'])).'</b></td></tr>        
  282. <tr><td width=\"30%\"><b>Sites Found&nbsp; : </b></td><td><b>'.count($start_array).'</b></td></tr>
  283. </table>';
  284.  
  285. echo "<br><br>";
  286. echo'<table border="1" width="80%" align=\"center\">';
  287.  
  288.  
  289. foreach($start_array as $h3h3){
  290.     echo'<tr id=new><td><b><a href=http://'.$h3h3.'/>'.$h3h3.'</a></b></td><td><b>Exploit-DB</b></td><td><b>1337Day</b></td><td><b>Challenge of Exploiting ..!</b></td></tr>';
  291.     check_com($h3h3);
  292.     get_plugins($h3h3);
  293.     get_numod($h3h3);
  294.     get_xoomod($h3h3);
  295. }
  296.  
  297. echo"</table>";
  298.  
  299. function credit(){
  300.     echo "</center>
  301.     <br><p align=\"center\">
  302.     Coded By : <a href='http://facebook.com/KedAns'>KedAns-Dz</a> | Modified by <b>AltenatorIWnet</b> | <a href='http://1337day.com/'>Inj3ct0r 1337day Exploit Database</a><br>
  303.     Made in Algeria | CopyCenter (^.^) 2o12
  304.     </p>
  305.     </body>
  306.     </html>";
  307. }
  308. ?>
  309. <!-- ' Thanks to KedAns-Dz,Lagripe-Dz aNd K!LLer-Dz'-->
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement