Com_user Scanner IP with Python

Tools ini untuk scan web yang vuln dengan exploit com_user jadi tidak perlu memakai dork tinggal masukkan ip saja. Cara pemakaiannyahampir sama dengan scanner jce.

Berikut script pythonnya:

import socket
from urlparse import urlparse
import time, urllib2, re, httplib
#SurabayaBlackhat , 
#Greetz : xF-Frizzy, Barrabravaz, Rebels,
#web - http://surabayablackhat.org
print 'Com_User Server Scanner'
file2=open('com_user.txt','a')



def check(site) :
try :



w = urllib2.urlopen(site).read()
except urllib2.URLError, (err):
pass
except socket.error , v :
pass
except urllib2.HTTPError, err:
pass
except IOError, e:
pass
except httplib.IncompleteRead ,e:
pass
else :
if re.findall('Joomla! - Open Source Content Management',w) :
ox= urlparse(site)
print 'good ! com_user Found In => ' + ox[1]
file2.write(ox[1]+'\n')

def xlol(site):
try:

urllib2.urlopen(site)

except urllib2.URLError, (err):
pass
except socket.error , v :
pass
except urllib2.HTTPError, err:
pass
except IOError, e:
pass
else:
check(site)
def bing_it(ip):

page = 0
while(page <= 200):
try :
bing = "http://www.bing.com/search?q=ip%3A"+ip+"+index.php?option=com_&first="+str(page)

openbing = urllib2.urlopen(bing)

readbing = openbing.read()
findbing = re.findall('


print 'checking ' + o[1]
check('http://'+o[1]+y+'/index.php?option=com_users&view=registration')
check('http://'+o[1]+y+'/portal/index.php?option=com_users&view=registration')
check('http://'+o[1]+y+'/joomla/index.php?option=com_users&view=registration') 
page = page + 10
except httplib.IncompleteRead ,e:
pass 
except urllib2.URLError, (err):
pass
except socket.error , v :
pass
except urllib2.HTTPError, err:
pass
except IOError, e:
pass


Xip = raw_input('IP :')

bing_it(Xip)



0 komentar:

Post a Comment

Komentar anda sangat bermanfaat untuk kemajuan blog ini.. terimakasih.