Advertisement
Hasannetbd

Zone-H Mass Poster

Jun 17th, 2017
562
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 4.74 KB | None | 0 0
  1. <br/><center><img alt="" src="https://i.imgur.com/QeEUB8u.png" style="width: 261px; height: 67px;" /></center>
  2. <?php
  3. ob_start();
  4. /************************************
  5. Zone-H Mass Deface Poster | bY Team.MDx
  6. *************************************/
  7. // curl var mi ?
  8. $sub = get_loaded_extensions();
  9. if(!in_array("curl", $sub)){
  10. die('Can not connect to this server to reconnect to the server ip_address');
  11. }
  12. // sari sari ?rdekler ucusuyorrrrrr...
  13. ?>
  14. <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
  15. <html xmlns="http://www.w3.org/1999/xhtml">
  16. <style>
  17. body{background:black;font-family:MS Serif;color:white;}</style>
  18. <title>Zone-H Mass Deface Poster</title>
  19.  
  20. </head>
  21. <?php
  22. if($_POST) {
  23. $hacker = $_POST['defacer'];
  24. $method = $_POST['hackmode'];
  25. $neden = $_POST['reason'];
  26. $site = $_POST['domain'];
  27. // bosmu dolumu
  28. if ($hacker == "") {
  29. die ("<center>Which distorted and said that if the answer is yes, type the name of<center>");
  30. }
  31. elseif($method == "--------SELECT--------") {
  32. die("<center>Method must be told</center>");
  33. }
  34. elseif($neden == "--------SELECT--------") {
  35. die("<center>Why do I have to tell</center>");
  36. }
  37. elseif($site == "") {
  38. die("<center>Registration continued breakthroughs in the locations Zone H </center>");
  39. }
  40. $i = 0;
  41. $sites = explode("\n", $site);
  42. while($i < count($sites)) {
  43. if(substr($sites[$i], 0, 4) != "http") {
  44. $sites[$i] = "http://".$sites[$i];
  45. }
  46. poster("http://zone-h.org/notify/single", $hacker, $method, $neden, $sites[$i]);
  47. ++$i;
  48. }
  49. echo "<center><p>Zone-h Mass Deface Poster</p></center>";
  50. }else{
  51. echo '<center>
  52. <form action="" method="post">
  53. <div id="option">
  54. <br/>Defacer
  55. <br /><span class="ok"><input type="text" name="defacer" size="40" value="D@rk_H1s@n"/></span>
  56. <br/><br/>How to hack
  57. <br /><select name="hackmode">
  58. <option >--------SELECT--------</option>
  59. <option value="1">known vulnerability (i.e. unpatched system)</option>
  60. <option value="2" >undisclosed (new) vulnerability</option>
  61. <option value="3" >configuration / admin. mistake</option>
  62. <option value="4" >brute force attack</option>
  63. <option value="5" >social engineering</option>
  64. <option value="6" >Web Server intrusion</option>
  65. <option value="7" >Web Server external module intrusion</option>
  66. <option value="8" >Mail Server intrusion</option>
  67. <option value="9" >FTP Server intrusion</option>
  68. <option value="10" >SSH Server intrusion</option>
  69. <option value="11" >Telnet Server intrusion</option>
  70. <option value="12" >RPC Server intrusion</option>
  71. <option value="13" >Shares misconfiguration</option>
  72. <option value="14" >Other Server intrusion</option>
  73. <option value="15" >SQL Injection</option>
  74. <option value="16" >URL Poisoning</option>
  75. <option value="17" >File Inclusion</option>
  76. <option value="18" >Other Web Application bug</option>
  77. <option value="19" >Remote administrative panel access through bruteforcing</option>
  78. <option value="20" >Remote administrative panel access through password guessing</option>
  79. <option value="21" >Remote administrative panel access through social engineering</option>
  80. <option value="22" >Attack against the administrator/user (password stealing/sniffing)</option>
  81. <option value="23" >Access credentials through Man In the Middle attack</option>
  82. <option value="24" >Remote service password guessing</option>
  83. <option value="25" >Remote service password bruteforce</option>
  84. <option value="26" >Rerouting after attacking the Firewall</option>
  85. <option value="27" >Rerouting after attacking the Router</option>
  86. <option value="28" >DNS attack through social engineering</option>
  87. <option value="29" >DNS attack through cache poisoning</option>
  88. <option value="30" >Not available</option>
  89. </select>
  90. <br/><br/> Cause of hack ?
  91. <br /><select name="reason">
  92. <option >--------SELECT--------</option>
  93. <option value="1" >Heh...just for fun!</option>
  94. <option value="2" >Revenge against that website</option>
  95. <option value="3" >Political reasons</option>
  96. <option value="4" >As a challenge</option>
  97. <option value="5" >I just want to be the best defacer</option>
  98. <option value="6" >Patriotism</option>
  99. <option value="7" >Not available</option>
  100. </select>
  101. <br/><br/>Sites
  102. <br /><textarea name="domain" cols="43" rows="17"></textarea>
  103. <br/><input type="submit" value="Send" />
  104. </form>
  105. <br>
  106. </div>
  107. </center>';
  108. }
  109. function poster($url, $hacker, $hackmode,$reson, $site )
  110. {
  111. $k = curl_init();
  112. curl_setopt($k, CURLOPT_URL, $url);
  113. curl_setopt($k,CURLOPT_POST,true);
  114. curl_setopt($k, CURLOPT_POSTFIELDS,"defacer=".$hacker."&domain1=". $site."&hackmode=".$hackmode."&reason=".$reson);
  115. curl_setopt($k,CURLOPT_FOLLOWLOCATION, true);
  116. curl_setopt($k, CURLOPT_RETURNTRANSFER, true);
  117. $kubra = curl_exec($k);
  118. curl_close($k);
  119. return $kubra;
  120. }
  121. ?>
  122. <body>
  123. </body>
  124. </html>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement