Anti-armenia.ORG - Forumlar - PHP Zone-H Reporter



Istifadəçi
    2013-01-29 22:59 GMT                 

SkarY



VIP
Mesaj Sayı : 19
Mövzu Sayı :
Rep Ver : 
Rep Sayı :   0  
Indi Saytda : Durum
Cinsiyyət : Oğlan
Şəhər :
Ölkə :
Məslək : SkarY
Yaş : 31
Mesaj :

Mövzunu Paylaş!


Hello today I bring a good php code and very useful to publish vulnerabilities page of Zone-H

The script is in PHP

Previous images:
http://i10.servimg.com/u/f10/12/98/31/84/th/sin_ta10.png

http://i10.servimg.com/u/f10/12/98/31/84/sin_ta10.png


http://i10.servimg.com/u/f10/12/98/31/84/th/sin_ta11.png

http://i10.servimg.com/u/f10/12/98/31/84/sin_ta11.png


http://i10.servimg.com/u/f10/12/98/31/84/th/sin_ta12.png

http://i10.servimg.com/u/f10/12/98/31/84/sin_ta12.png


Kod:
    <title>Zone-h Reporter # ANTI-Armenia.Org</title>

<pre>
________MMMMMoooooooooooM8888888,
________M6ooooMMMmoooooooM888888888,
_____Mmooo8oooooooooooooM88888888888,
____MmmmooooooooooooooM88888888888888,
___Moooooooooo8888888M8888888888888888,
__Mooooooooooooo88888M88888888888888888,
___MmooooooooooooooommM88888888888888888,
_______M88ooooo888mooMM88888888888888888,
________M88888888oommooM88888888888888888,
_________M888888ooooMM8888888888888888888,
_________MooooooooooM888888888888888888888,
______888MoooooooooM8888888888888888888888,
___888888MooooooooM88888888888888888888888,
__88888888MoooooooM8888888888mmmm888888888,
_888888888Mo8oooooM8888888MooooooooM888888,
8888888888Moo8oooM8888MM8ooooooooooooM88888,
8888888888Mooo88ooooM888MoooooooooooooM8888,
_M8o8888ooo8oo88ooo0ooMMoo888oooooooooooM88,
Mooo88888ooo8o88o8oooooooooo8888oooooooooM8,
Moo8888o8ooooo8ooooooooooooooo8888ooooooooM8,
Mooo88oooooooooooooooooooooooo888888oooooooM8,
Mooooooooooooooooooooooooooooo88888888ooooooM8,
_MooMooooooooooooooooooooooooooM888ooo88oooooM,
__Mmoooooooooooooooooooooooooo888Moooo8oooooooM,
___Moooooooooo8oooooooooooooo8888MMooooooooooooM,
____Moooooooo88ooooooooooooo88888MMM8oooooooooooM,
____Moooooooo88oooooooooooooo88888MMMMoooooooooooM,
____Moooooooo88Moooooooooooooooo88888MMMMoooooooooM,
___Mooooooooo88Moooooooooooooooo8MooooMMMMoooooooooM,
__Mooooooooo8MMooooooooooooooo88MoooooMMMMooooooooooM,
_Mooooooooo88MMoom888mooooooo88MooooooMM_MMoooooooooo,
_M8moooooo888MMoom@@8moooo8888M8oooooooMM__MMooooooo,
M@88moooo888MooMom8@8mooo8888MooooooooMM___Mmoooooo0,
_*M8mooo8888MooooMm8mooo888M888ooooooooMM___Moooooo00,
____MMMMMM8888oooooMMmmmmM88888oooooooMM_Moooooooo0,
__________M88Moooooo8888888888oooooooooooMMoooooooooo,
__________M88Mooooo8o888888888ooooooooooooMoooooooo88, ─────────────────────╔═══╦╗╔═╦═══╦═══╦╗──╔╗
___________M88Mooooo8ooo888888oooooooooooMooooooo8888, ─────────────────────║╔═╗║║║╔╣╔═╗║╔═╗║╚╗╔╝║
____________M888Mooo888ooooo888ooooooooooMoooooo8888M, ─────────────────────║╚══╣╚╝╝║║─║║╚═╝╠╗╚╝╔╝
____________M88888Moo888oooooo8888ooooooMooooooo888M8, ╔══╦══╦══╦══╦══╦══╦══╬══╗║╔╗║║╚═╝║╔╗╔╝╚╗╔╬══╦══╦══╦══╦══╦══╦══╗
_____________M888888Mo8888oooooo8888oooMooooooo888M88, ╚══╩══╩══╩══╩══╩══╩══╣╚═╝║║║╚╣╔═╗║║║╚╗─║║╚══╩══╩══╩══╩══╩══╩══╝
______________M8888888Mo8888ooooooooooMoooooooo88M888, ─────────────────────╚═══╩╝╚═╩╝─╚╩╝╚═╝─╚╝
________________M888888M88888oooooooooMoooooooo8M8888, ╔═══╦═╗─╔╦════╦══╗─╔═══╦═══╦═╗╔═╦═══╦═╗─╔╦══╦═══╗╔═══╦═══╦═══╗
_________________M8oo888M888888ooooooMoooooooo8M88888, ║╔═╗║║╚╗║║╔╗╔╗╠╣╠╝─║╔═╗║╔═╗║║╚╝║║╔══╣║╚╗║╠╣╠╣╔═╗║║╔═╗║╔═╗║╔═╗║
__________________M8ooooMM88888888ooMooooooooM8888ooo, ║║─║║╔╗╚╝╠╝║║╚╝║║──║║─║║╚═╝║╔╗╔╗║╚══╣╔╗╚╝║║║║║─║║║║─║║╚═╝║║─╚╝
___________________MooooM_M88888888MooooooooM888ooooo, ║║─║║╔╗╚╝╠╝║║╚╝║║──║║─║║╚═╝║╔╗╔╗║╚══╣╔╗╚╝║║║║║─║║║║─║║╚═╝║║─╚╝
____________________MooooM_M888888Mooooooo8M88**ooooo, ║╚═╝║║╚╗║║─║║──║╠══╣╚═╝║╔╗╔╣║║║║║╔══╣║╚╗║║║║║╚═╝║║║─║║╔╗╔╣║╔═╗
_____________________MooooM_mmmmmmMoooooo8Mmooooooooo, ║╔═╗║║─║║║─║║─╔╣╠╦═╣╔═╗║║║╚╣║║║║║╚══╣║─║║╠╣╠╣╔═╗╠╣╚═╝║║║╚╣╚╩═║
______________________MoooQooommmmMoooMMooooooooooooo, ╚╝─╚╩╝─╚═╝─╚╝─╚══╝─╚╝─╚╩╝╚═╩╝╚╝╚╩═══╩╝─╚═╩══╩╝─╚╩╩═══╩╝╚═╩═══╝
_____________________MM88ooo8ooooMMMooooooooooooooooo,
__________________mM8888M88o88mMmoooooooooooooooooooo,
____________mMMMoooooooooM888Mmoooooooooooooooooooooo,
_______MMMMoooooooooooooooMMooooooooooooooooooooooooo,
___MMMoooooooooooooooooMMoooooooooooooooooooooooooooo,
MMMooooooooooooooooooMMooooooooooooooooooooooooooooo8,
oooooooooooooooooooMMooooooooooooooooooooooooooooo888,
oooooooooooooooooMMooooooooooooooooooooooooooo8888888,
oooooooooooooooMMoooooooooooooooooooooooooo8888888888,
oooooooooooooMooooooooooooooooooooooooooo88888888888M,
ooooooooooooMooooooooooooooooooooooooo8888888888M____,
oooooooo88Mooooooooooooooooooooooo88888888888M_______,
oo8888888Mooooooooooooooooooooo888888MMMMMMMMMMMM888,
8888MMMMMooooooooooooooooooooo8888M888888888888888888,
8MMM888Moooooooooooooooooooo88M8ooooooooooo8888888888,
88oooooMoooooooooooooooooooMMoooooo888888888888888888,
8888888M8888oooooo88ooooooMoo888888888888888888888MM,
MMMMMMMM888888ooo88888oo8Mo8888888888888888888888888
</pre>
    <center><form method="POST" action="sc.php">
    url1:<br><input type="text" name="report" value="http://"><br>
url2:<br><input type="text" name="report1" value="http://"><br>
url3:<br><input type="text" name="report2" value="http://"><br>
url4:<br><input type="text" name="report3" value="http://"><br>
url5:<br><input type="text" name="report4" value="http://"><br>
url6:<br><input type="text" name="report5" value="http://"><br>
url7:<br><input type="text" name="report6" value="http://"><br>
url8:<br><input type="text" name="report7" value="http://"><br>
url9:<br><input type="text" name="report8" value="http://"><br>
url10:<br><input type="text" name="report9" value="http://"><br>
   Nick: <br><input type="text" name="nick"><br>
    Reason: <br><input type="text" name="rason"><br>
    Mode Hack:<br><input type="text" name="mode"><br>
    <input type="submit" value="Report">
    </form></center>
   
    <font size="5" color="red">Modo De Hackeo/Mode hack:</font>
<pre>
    [1] known vulnerability (i.e. unpatched system) -> vulnerabilidad conocida (es decir, sistema sin parchear)
    [2] undisclosed (new) vulnerability -> no divulgada (nueva) vulnerabilidad
    [3] configuration / admin. mistake -> Error de configuracion Del Admin
    [4] brute force attack -> Ataque de fuerza bruta
    [5] social engineering -> Ingenieria Social
    [6] Web Server intrusion -> Intrusion a el servidor web
    [7] Web Server external module intrusion -> Intrusión en el modulo externo del servidor
    [8] Mail Server intrusion -> Intrusion por el servidor del email (SMTP)
    [9] FTP Server intrusion -> Intrusion FTP
    [10] SSH Server intrusion -> Intrusion al servidor SSH
    [11] Telnet Server intrusion -> Intrusion al servidor Telnet
    [12] RPC Server intrusion -> Intrusion RPC
    [13] Shares misconfiguration -> Mala Configuracion
    [14] Other Server intrusion -> Otra intrusion en el servidor
    [15] SQL Injection -> Injeccion SQL (SQLi)
    [16] URL Poisoning -> Envenenamiento de URL
    [17] File Inclusion -> Intrusion de archivo
    [18] Other Web Application bug -> Otro error de aplicacion Web
    [19] Remote administrative panel access through bruteforcing -> Acceso remoto a traves de un panel administrativo con fuerza bruta
    [20] Remote administrative panel access through password guessing -> Adivinando la Password
    [21] Remote administrative panel access through social engineering -> Acceso remoto a traves de ingenieria social
    [22] Attack against the administrator/user (password stealing/sniffing) -> Ataque contra el administrador / usuario
    [23] Access credentials through Man In the Middle attack -> Obteniendo credenciales de acceso
    [24] Remote service password guessing -> Adivinando la contraseña del servicio
    [25] Remote service password bruteforce -> Fuerza bruta a el servicio
    [26] Rerouting after attacking the Firewall -> Atacando el firewall
    [27] Rerouting after attacking the Router -> Atacando el router
    [28] DNS attack through social engineering -> Ataque DNS con ingenieria social
    [29] DNS attack through cache poisoning -> Envenenamiento de cache
    [30] Not available -> No avaliable
    [31] Cross-Site Scripting -> XSS
</pre>
    <font size="5" color="red">Razones De El Hackeo/Reasons hacking:</font>
<pre>
    [1] Heh...just for fun! -> Por divercion
    [2] Revenge against that website -> La venganza contra este sitio web
    [3] Political reasons -> Razones de politica
    [4] As a challenge -> Un desafio
    [5] I just want to be the best defacer -> Busco ser el mejor defacer
    [6] Patriotism -> Patriotismo
    [7] Not available -> Ninguna.
    </pre>
     
    <?php
    if(isset($_POST['report']))
    {
    @$rason=is_numeric(htmlentities($_POST['rason']));
    @$modohackeo=htmlentities($_POST['mode']);
    @$defacer = htmlentities($_POST['nick']);
    @$url = htmlentities($_POST['report']);
    @$url2 = htmlentities($_POST['report1']);
    @$url3 = htmlentities($_POST['report2']);
    @$url4 = htmlentities($_POST['report3']);
    @$url5 = htmlentities($_POST['report4']);
    @$url6 = htmlentities($_POST['report5']);
    @$url7 = htmlentities($_POST['report6']);
    @$url8 = htmlentities($_POST['report7']);
    @$url9 = htmlentities($_POST['report8']);
    @$url10 = htmlentities($_POST['report9']);
    function ReportarSuperCaker($url,$url2,$url3,$url4,$url5,$url6,$url7,$url8,$url9,$url10,$defacer,$modohackeo,$rason)
    { 
     
    $ch = curl_init("http://zone-h.com/notify/mass");
    curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
    curl_setopt($ch, CURLOPT_POST, 1);
    curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$defacer&domain1=$url&domain2=$url2&domain3=$url3&domain4=$url4&domain5=$url5&domain6=$url6&domain7=$url7&domain8=$url8&domain9=$url9&domain10=$url10&hackmode=$modohackeo&reason=$rason");
    curl_exec($ch);
    curl_close($ch);
    }
     
    ReportarSuperCaker("$url","$url2","$url3","$url4","$url5","$url6","$url7","$url8","$url9","$url10","$defacer","$modohackeo","$rason");
     
    }
     

    ?>
l6 = htmlentities($_POST['report5']);
@$url7 = htmlentities($_POST['report6']);
@$url8 = htmlentities($_POST['report7']);
@$url9 = htmlentities($_POST['report8']);
@$url10 = htmlentities($_POST['report9']);
function ReportarSuperCaker($url,$url2,$url3,$url4,$url5,$url6,$url7,$url8,$url9,$url10,$defacer,$modohackeo,$rason)
{

$ch = curl_init("http://zone-h.com/notify/mass");
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_POST, 1);
curl_setopt($ch, CURLOPT_POSTFIELDS, "defacer=$defacer&domain1=$url&domain2=$url2&domain3=$url3&domain4=$url4&domain5=$url5&domain6=$url6&domain7=$url7&domain8=$url8&domain9=$url9&domain10=$url10&hackmode=$modohackeo&reason=$rason");
curl_exec($ch);
curl_close($ch);
}

ReportarSuperCaker("$url","$url2","$url3","$url4","$url5","$url6","$url7","$url8","$url9","$url10","$defacer","$modohackeo","$rason");

}


?>[/code]



Link English: http://pastebin.com/RCmCtg8J
Link Download PHP: http://www.mediafire.com/view/?d0l0c4t986aj9zz

Enjoy and Good Luck!



#SkarY

Welcome to my world
Anti-armenia.ORG
    

Istifadəçi
    2013-01-30 01:48 GMT                 

BlackMinD



Pr0grammer
Mesaj Sayı : 1677
Mövzu Sayı :
Rep Ver : 
Rep Sayı :   62  
Indi Saytda : Durum
Cinsiyyət : Oğlan
Şəhər : KARABAKH IS AZERBAIJAN!
Ölkə :
Məslək :
Yaş :
Mesaj :

Mövzunu Paylaş!


Thx) But here is few things.
I don't know who coded it but it is so lame)
Kod:
url7:<br><input type="text" name="report6" value="http://"><br>

No need to create separate input box for every domain.
Just textarea and thats all.


This is also so lame:
Kod:
if(isset($_POST['report']))
    {
    @$rason=is_numeric(htmlentities($_POST['rason']));
    @$modohackeo=htmlentities($_POST['mode']);
    @$defacer = htmlentities($_POST['nick']);
    @$url = htmlentities($_POST['report']);
    @$url2 = htmlentities($_POST['report1']);
    @$url3 = htmlentities($_POST['report2']);
    @$url4 = htmlentities($_POST['report3']);
    @$url5 = htmlentities($_POST['report4']);
    @$url6 = htmlentities($_POST['report5']);
    @$url7 = htmlentities($_POST['report6']);
    @$url8 = htmlentities($_POST['report7']);
    @$url9 = htmlentities($_POST['report8']);
    @$url10 = htmlentities($_POST['report9']);


No need to hardcode it like this (Just use textarea and on fly explode input by PHP_EOL or by \r\n

then simply walk against array using foreach and create your submit urls.And once done ( exit from foreach) simpy curl it to remote server.
Thats all.No need to use such hardcode "ways".(It sucks really)

Ana VƏTƏN!
Anti-armenia.ORG
    

Istifadəçi
    2013-01-30 02:15 GMT                 

SkarY



VIP
Mesaj Sayı : 19
Mövzu Sayı :
Rep Ver : 
Rep Sayı :   0  
Indi Saytda : Durum
Cinsiyyət : Oğlan
Şəhər :
Ölkə :
Məslək : SkarY
Yaş : 31
Mesaj :

Mövzunu Paylaş!


Sitat
#14595 BlackMinD :
Thx) But here is few things.
I don't know who coded it but it is so lame)
Kod:
url7:<br><input type="text" name="report6" value="http://"><br>

No need to create separate input box for every domain.
Just textarea and thats all.


This is also so lame:
Kod:
if(isset($_POST['report']))
    {
    @$rason=is_numeric(htmlentities($_POST['rason']));
    @$modohackeo=htmlentities($_POST['mode']);
    @$defacer = htmlentities($_POST['nick']);
    @$url = htmlentities($_POST['report']);
    @$url2 = htmlentities($_POST['report1']);
    @$url3 = htmlentities($_POST['report2']);
    @$url4 = htmlentities($_POST['report3']);
    @$url5 = htmlentities($_POST['report4']);
    @$url6 = htmlentities($_POST['report5']);
    @$url7 = htmlentities($_POST['report6']);
    @$url8 = htmlentities($_POST['report7']);
    @$url9 = htmlentities($_POST['report8']);
    @$url10 = htmlentities($_POST['report9']);


No need to hardcode it like this (Just use textarea and on fly explode input by PHP_EOL or by \r\n

then simply walk against array using foreach and create your submit urls.And once done ( exit from foreach) simpy curl it to remote server.
Thats all.No need to use such hardcode "ways".(It sucks really)




Thanks for your advice now editare better, did not think it would look like shit this script but hey thanks for your comment.

Welcome to my world
Anti-armenia.ORG