Inconnu-Dz

JooMla server scanner

May 7th, 2016
43
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 3.79 KB | None | 0 0
  1. <!--
  2.  
  3. Title.......: [ JooMla server scanner ]
  4. c0d3r.......: [ Inconnu Dz ]
  5. fb........: [ https://www.facebook.com/ghost.attack.dz ]
  6.  
  7. -->
  8. <html>
  9. <head>
  10. <meta http-equiv="Content-Language" content="fr">
  11. <meta http-equiv="Content-Type" content="text/html; charset=windows-1252">
  12. <title>#~JooMla Server Scanner</title>
  13. <style>
  14. body,table{background: black; font-family:Verdana,tahoma; color: white; font-size:10px; }
  15. A:link {text-decoration: none;color: red;}
  16. A:active {text-decoration: none;color: red;}
  17. A:visited {text-decoration: none;color: red;}
  18. A:hover {text-decoration: underline; color: red;}
  19. #new,input,table,td,tr,#gg{border-style:solid;text-decoration:bold;}
  20. input:hover,tr:hover,td:hover{background-color: #FFFFCC; color:green;}
  21. </style>
  22. </head>
  23.  
  24. <body>
  25.  
  26. <p align="center">&nbsp;</p>
  27. <p align="center">&nbsp;</p>
  28. <p align="center">&nbsp;</p>
  29. <p align="center"><font size="3">#~JooMla Server Scanner</font></p><br>
  30. <form method="POST">
  31.     <p align="center"><input type="text" name="site" size="65"><input type="submit" value="ScaN"></p>
  32. </form><center>
  33. <?php
  34. @set_time_limit(0);
  35. @error_reporting(E_ALL | E_NOTICE);
  36.  
  37. function check_exploit($comxx){
  38.  
  39. $link ="http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=$comxx&filter_exploit_text=&filter_author=&filter_platform=0&filter_type=0&filter_lang_id=0&filter_port=&filter_osvdb=&filter_cve=";
  40.  
  41. $result = @file_get_contents($link);
  42.  
  43. if (eregi("No results",$result))  {
  44.  
  45. echo"<td>Not Found</td><td><a href='http://www.google.dz/#hl=en&q=download+$comxx+joomla+extension'>Download</a></td></tr>";
  46.  
  47. }else{
  48.  
  49. echo"<td><a href='$link'>Found</a></td><td><=</td></tr>";
  50.  
  51. }
  52. }
  53.  
  54. function check_com($url){
  55.  
  56. $source = @file_get_contents($url);
  57.  
  58. preg_match_all('{option,(.*?)/}i',$source,$f);
  59. preg_match_all('{option=(.*?)(&amp;|&|")}i',$source,$f2);
  60. preg_match_all('{/components/(.*?)/}i',$source,$f3);
  61.  
  62. $arz=array_merge($f2[1],$f[1],$f3[1]);
  63.  
  64. $coms=array();
  65.  
  66. foreach(array_unique($arz) as $x){
  67. $coms[]=$x;
  68. }
  69.  
  70. foreach($coms as $comm){
  71.  
  72. echo "<tr><td>$comm</td>";
  73. check_exploit($comm);
  74. }
  75.  
  76. }
  77.  
  78. function sec($site){
  79. preg_match_all('{http://(.*?)(/index.php)}siU',$site, $sites);
  80. if(eregi("www",$sites[0][0])){
  81. return $site=str_replace("index.php","",$sites[0][0]);
  82. }else{
  83. return $site=str_replace("http://","http://www.",str_replace("index.php","",$sites[0][0]));
  84. }}
  85.  
  86. $npages = 50000;
  87.  
  88. if ($_POST)
  89. {
  90.   $ip = trim(strip_tags($_POST['site']));
  91.   $npage = 1;
  92.   $allLinks = array();
  93.  
  94.  
  95.    while($npage <= $npages)
  96.   {
  97.  
  98.   $x=@file_get_contents('http://www.bing.com/search?q=ip%3A' . $ip . '+index.php?option=com&first=' . $npage);
  99.  
  100.  
  101.     if ($x)
  102.     {
  103.         preg_match_all('(<div class="sb_tlst">.*<h3>.*<a href="(.*)".*>(.*)</a>.*</h3>.*</div>)siU', $x, $findlink);
  104.        
  105.         foreach ($findlink[1] as $fl)
  106.        
  107.         $allLinks[]=sec($fl);
  108.        
  109.        
  110.         $npage = $npage + 10;
  111.        
  112.         if (preg_match('(first=' . $npage . '&amp)siU', $x, $linksuiv) == 0)
  113.             break;             
  114.     }
  115.    
  116.     else
  117.         break;
  118.   }
  119.  
  120.  
  121. $allDmns = array();
  122.  
  123. foreach ($allLinks as $kk => $vv){
  124.  
  125. $allDmns[] = $vv;
  126. }
  127.            
  128. echo'<table border="1"  width=\"80%\" align=\"center\">
  129. <tr><td width=\"30%\"><b>Server IP&nbsp;&nbsp;&nbsp;&nbsp; : </b></td><td><b>'.$ip.'</b></td></tr>         
  130. <tr><td width=\"30%\"><b>Sites Found&nbsp; : </b></td><td><b>'.count(array_unique($allDmns)).'</b></td></tr>
  131. </table>';
  132. echo "<br><br>";
  133.  
  134. echo'<table border="1" width="80%" align=\"center\">';
  135.  
  136. foreach(array_unique($allDmns) as $h3h3){
  137.  
  138. echo'<tr id=new><td><b><a href='.$h3h3.'>'.$h3h3.'</a></b></td><td><b>Exploit-db</b></td><td><b>challenge of Exploiting ..!</b></td></tr>';
  139.  
  140. check_com($h3h3);
  141.  
  142. }
  143.  
  144. echo"</table>";
  145.  
  146. }
  147. ?></center>
  148. <br><p align="center">
  149. coded By <a href='https://www.facebook.com/ghost.attack.dz'>Inconnu Dz</a>
  150. </p>
  151. </body>
  152.  
  153. </html>
Add Comment
Please, Sign In to add comment