Tools ini untuk scan web yang vuln dengan exploit com_user jadi tidak perlu memakai dork tinggal masukkan ip saja. Cara pemakaiannyahampir sama dengan scanner jce.
Berikut script pythonnya:
import socket
from urlparse import urlparse
import time, urllib2, re, httplib
#SurabayaBlackhat ,
#Greetz : xF-Frizzy, Barrabravaz, Rebels,
#web - http://surabayablackhat.org
print 'Com_User Server Scanner'
file2=open('com_user.txt','a')
def check(site) :
try :
w = urllib2.urlopen(site).read()
except urllib2.URLError, (err):
pass
except socket.error , v :
pass
except urllib2.HTTPError, err:
pass
except IOError, e:
pass
except httplib.IncompleteRead ,e:
pass
else :
if re.findall('Joomla! - Open Source Content Management',w) :
ox= urlparse(site)
print 'good ! com_user Found In => ' + ox[1]
file2.write(ox[1]+'\n')
def xlol(site):
try:
urllib2.urlopen(site)
except urllib2.URLError, (err):
pass
except socket.error , v :
pass
except urllib2.HTTPError, err:
pass
except IOError, e:
pass
else:
check(site)
def bing_it(ip):
page = 0
while(page <= 200):
try :
bing = "http://www.bing.com/search?q=ip%3A"+ip+"+index.php?option=com_&first="+str(page)
openbing = urllib2.urlopen(bing)
readbing = openbing.read()
findbing = re.findall('
print 'checking ' + o[1]
check('http://'+o[1]+y+'/index.php?option=com_users&view=registration')
check('http://'+o[1]+y+'/portal/index.php?option=com_users&view=registration')
check('http://'+o[1]+y+'/joomla/index.php?option=com_users&view=registration')
page = page + 10
except httplib.IncompleteRead ,e:
pass
except urllib2.URLError, (err):
pass
except socket.error , v :
pass
except urllib2.HTTPError, err:
pass
except IOError, e:
pass
Xip = raw_input('IP :')
bing_it(Xip)
0 komentar:
Post a Comment
Komentar anda sangat bermanfaat untuk kemajuan blog ini.. terimakasih.