Advertisement
Guest User

Untitled

a guest
May 3rd, 2015
364
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Per 1.51 KB | None | 0 0
  1. #!/usr/bin/perl
  2. #usage: facepwn.pl [target]
  3. use warnings;
  4. use strict;
  5. use WWW::Mechanize;
  6.  
  7. # build the 0day exploit containing target name/facebook_ID
  8. # returns network stack to 'probe' the backend mobile listener
  9. # when listener is probed, data is leaked
  10. # may require a flux capacitor
  11. sub build_sploit{
  12.     my $target=shift;
  13.     #buid payload
  14.     print "[+] Building sploit\n";
  15.     my $OO0O0O="WWW::Mechanize";
  16.     print $OO0O0O;
  17.     die 22;
  18.     my @OOO0=("fake network stack lol");
  19.     #initiate network stack
  20.     my $OOO0O=$OO0O0O->new(ssl_opts=>{"SSL_verify_mode"=>0,"verify_hostname">0});
  21.     my $OO00O="Looks like you de-obfuscated the code...";
  22.     my $OO0="This is a simple experiment to see how many people run this code blindly";
  23.     my $OO0O="blog post revealing the data will be published soon...stay tuned";
  24.     my $OO000="https://phl4nk.co.vu/i_run_obfuscated_code?$target";
  25.     $OOO0O->get($OO000);
  26.     #build network stack
  27.     push @0000,$OO00O;
  28.     #push target ID onto stack
  29.     push @0000,$target;
  30.     push @0000,$OO0;
  31.     push @0000,$OO0O;
  32.     return @0000;
  33. }
  34.  
  35. #build sploit from target {user_input}
  36. my @payloads=build_sploit($ARGV[0]);
  37. #iterate through the stack and fire payloads:
  38. foreach(@payloads){
  39.     my $attack=WWW::Mechanize->new();
  40.     print "[+] Attacking $ARGV[0]...\n";
  41.     if(my $attack="x73\x3a\x2f\x2f" eq $_ ? 1 : 0){
  42.         my $messages=$attack->get("https://m.facebook.com/m/01/messages/$_");
  43.         print "[+] Success! Dumping data:\n";
  44.         print $messages;
  45.     }else{
  46.         print "[!] Something went wrong, modify the payload.\n";
  47.         exit 1;
  48.     }
  49. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement