G2A Many GEOs
SHARE
TWEET

ZONE-H CHECK AND POST

malwareconf Oct 21st, 2012 75 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. #!/usr/bin/perl
  2.  
  3. #
  4.  
  5. # ZONE-H.ORG CHECK REDEFACEMENTS AND POST.
  6.  
  7. #
  8.  
  9. # by Malware
  10.  
  11. #
  12.  
  13. # ( ONLY WORK IN LINUX. )
  14.  
  15. #
  16.  
  17. #
  18.  
  19. # # # # # # #
  20.  
  21. use HTTP::Request;
  22.  
  23. use LWP::UserAgent;
  24.  
  25. use IO::Socket::INET;
  26.  
  27. # # # # # # #
  28.  
  29. if ($#ARGV != 1) {
  30.  
  31. print "\n\n [xxxxxxxxxxxxxxx] ZONE-H CHECK AND POST [xxxxxxxxxxxxxxxx] \n";
  32.  
  33. print " [x] Including you to deface results domainlist.txt\n";
  34.  
  35. print " [x] \n";
  36.  
  37. print " [x] $0 Dominios.txt Defacer-Nick\n\n";
  38.  
  39. exit;
  40.  
  41. }
  42.  
  43.  
  44.  
  45.  
  46.  
  47. $dominio=$ARGV[0];
  48.  
  49. $grupo=$ARGV[1];
  50.  
  51.  
  52.  
  53. $remote='http://www.zone-h.org/component/option,com_attacks/Itemid,43/filter_domain,';
  54.  
  55.  
  56.  
  57. print "\n [x] Removing the redefacements and posting the sites! Wait..\n\n";
  58.  
  59.  
  60.  
  61. open(HOSTS, "<$dominio") || die ("Not found!");
  62.  
  63. @hosts= <HOSTS>;
  64.  
  65. close(HOSTS);
  66.  
  67.  
  68.  
  69. foreach $vitima (@hosts) {
  70.  
  71. chomp($vitima);
  72.  
  73. if($vitima =~ http) { substr($vitima, 0, 7) =""; }
  74.  
  75.  
  76.  
  77. $url2="$remote$vitima";
  78.  
  79. my $req=HTTP::Request->new(GET=>$url2);
  80.  
  81. my $sockz=LWP::UserAgent->new();
  82.  
  83. $sockz->timeout(10);
  84.  
  85. my $response=$sockz->request($req);
  86.  
  87.  
  88.  
  89. if ($response->is_success) {
  90.  
  91. if( $response->content =~ /No results were found/ ) {
  92.  
  93. open(FILE,">> ok.txt");
  94.  
  95. print FILE "$vitima\n";
  96.  
  97. close(FILE);
  98.  
  99. }
  100.  
  101. # # # # # #
  102.  
  103. $arq = 'ok.txt';
  104.  
  105. chomp $grupo;
  106.  
  107. open(a,"<$arq");
  108.  
  109. @site = <a>;
  110.  
  111. close(a);
  112.  
  113. $b = scalar(@site);
  114.  
  115. for($a=0;$a<=$b;$a++)
  116.  
  117. {chomp $site[$a];
  118.  
  119. $sock = IO::Socket::INET->new(PeerAddr => "www.zone-h.org", PeerPort => 80, Proto => "tcp") or next;
  120.  
  121. print $sock "POST /component/option,com_notify/Itemid,89/task,single/ HTTP/1.0\r\n";
  122.  
  123. print $sock "Accept: */*\r\n";
  124.  
  125. print $sock "Referer: http://www.zone-h.org/component/option,com_notify/Itemid,89/task,single/\r\n";
  126.  
  127. print $sock "Accept-Language: pt-br\r\n";
  128.  
  129. print $sock "Content-Type: application/x-www-form-urlencoded\r\n";
  130.  
  131. print $sock "Connection: Keep-Alive\r\n";
  132.  
  133. print $sock "User-Agent: Mozilla/5.0 (X11; U; Linux i686; pt-BR; rv:1.8.1.3)\r\n";
  134.  
  135. print $sock "Host: www.zone-h.org\r\n";
  136.  
  137. $length=length("defacer=$grupo&domain=http%3A%2F%2 F$site[$a]&method=22&reason=5&option=com_notify");
  138.  
  139. print $sock "Content-Length: $length\r\n";
  140.  
  141. print $sock "Pragma: no-cache\r\n";
  142.  
  143. print $sock "\r\n";
  144.  
  145. print $sock "defacer=$grupo&domain=http%3A%2F%2F$site[$a]&method=22&reason=5&option=com_notify\r\n";
  146.  
  147. close($sock);
  148.  
  149. system('rm -rf ok.txt');
  150.  
  151. }
  152.  
  153. }
  154.  
  155. }
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top