Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- <br/><center><img alt="" src="https://i.imgur.com/QeEUB8u.png" style="width: 261px; height: 67px;" /></center>
- <?php
- ob_start();
- /************************************
- Zone-H Mass Deface Poster | bY Team.MDx
- *************************************/
- // curl var mi ?
- $sub = get_loaded_extensions();
- if(!in_array("curl", $sub)){
- die('Can not connect to this server to reconnect to the server ip_address');
- }
- // sari sari ?rdekler ucusuyorrrrrr...
- ?>
- <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
- <html xmlns="http://www.w3.org/1999/xhtml">
- <style>
- body{background:black;font-family:MS Serif;color:white;}</style>
- <title>Zone-H Mass Deface Poster</title>
- </head>
- <?php
- if($_POST) {
- $hacker = $_POST['defacer'];
- $method = $_POST['hackmode'];
- $neden = $_POST['reason'];
- $site = $_POST['domain'];
- // bosmu dolumu
- if ($hacker == "") {
- die ("<center>Which distorted and said that if the answer is yes, type the name of<center>");
- }
- elseif($method == "--------SELECT--------") {
- die("<center>Method must be told</center>");
- }
- elseif($neden == "--------SELECT--------") {
- die("<center>Why do I have to tell</center>");
- }
- elseif($site == "") {
- die("<center>Registration continued breakthroughs in the locations Zone H </center>");
- }
- $i = 0;
- $sites = explode("\n", $site);
- while($i < count($sites)) {
- if(substr($sites[$i], 0, 4) != "http") {
- $sites[$i] = "http://".$sites[$i];
- }
- poster("http://zone-h.org/notify/single", $hacker, $method, $neden, $sites[$i]);
- ++$i;
- }
- echo "<center><p>Zone-h Mass Deface Poster</p></center>";
- }else{
- echo '<center>
- <form action="" method="post">
- <div id="option">
- <br/>Defacer
- <br /><span class="ok"><input type="text" name="defacer" size="40" value="D@rk_H1s@n"/></span>
- <br/><br/>How to hack
- <br /><select name="hackmode">
- <option >--------SELECT--------</option>
- <option value="1">known vulnerability (i.e. unpatched system)</option>
- <option value="2" >undisclosed (new) vulnerability</option>
- <option value="3" >configuration / admin. mistake</option>
- <option value="4" >brute force attack</option>
- <option value="5" >social engineering</option>
- <option value="6" >Web Server intrusion</option>
- <option value="7" >Web Server external module intrusion</option>
- <option value="8" >Mail Server intrusion</option>
- <option value="9" >FTP Server intrusion</option>
- <option value="10" >SSH Server intrusion</option>
- <option value="11" >Telnet Server intrusion</option>
- <option value="12" >RPC Server intrusion</option>
- <option value="13" >Shares misconfiguration</option>
- <option value="14" >Other Server intrusion</option>
- <option value="15" >SQL Injection</option>
- <option value="16" >URL Poisoning</option>
- <option value="17" >File Inclusion</option>
- <option value="18" >Other Web Application bug</option>
- <option value="19" >Remote administrative panel access through bruteforcing</option>
- <option value="20" >Remote administrative panel access through password guessing</option>
- <option value="21" >Remote administrative panel access through social engineering</option>
- <option value="22" >Attack against the administrator/user (password stealing/sniffing)</option>
- <option value="23" >Access credentials through Man In the Middle attack</option>
- <option value="24" >Remote service password guessing</option>
- <option value="25" >Remote service password bruteforce</option>
- <option value="26" >Rerouting after attacking the Firewall</option>
- <option value="27" >Rerouting after attacking the Router</option>
- <option value="28" >DNS attack through social engineering</option>
- <option value="29" >DNS attack through cache poisoning</option>
- <option value="30" >Not available</option>
- </select>
- <br/><br/> Cause of hack ?
- <br /><select name="reason">
- <option >--------SELECT--------</option>
- <option value="1" >Heh...just for fun!</option>
- <option value="2" >Revenge against that website</option>
- <option value="3" >Political reasons</option>
- <option value="4" >As a challenge</option>
- <option value="5" >I just want to be the best defacer</option>
- <option value="6" >Patriotism</option>
- <option value="7" >Not available</option>
- </select>
- <br/><br/>Sites
- <br /><textarea name="domain" cols="43" rows="17"></textarea>
- <br/><input type="submit" value="Send" />
- </form>
- <br>
- </div>
- </center>';
- }
- function poster($url, $hacker, $hackmode,$reson, $site )
- {
- $k = curl_init();
- curl_setopt($k, CURLOPT_URL, $url);
- curl_setopt($k,CURLOPT_POST,true);
- curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
- curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
- curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
- $kubra = curl_exec($k);
- curl_close($k);
- return $kubra;
- }
- ?>
- <body>
- </body>
- </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement