what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

cgichk1.51.1.c

cgichk1.51.1.c
Posted Aug 17, 1999
Authored by su1d sh3ll

CGI scanner v1.51.11 is a program that scans remote hosts for over 70 common CGI security holes.

tags | exploit, remote, cgi
SHA-256 | c4e04d8838c3318d58216a0baa1077b4a320c7850d0d539dd176e0302ef20ffb

cgichk1.51.1.c

Change Mirror Download
/* ---------------------------------------------------------------------- */
/* CGI scanner v1.51.11 (c) su1d sh3ll //UnlG 1999 */
/* Tested on Slackware linux with kernel 2.0.35;RH 5.2(2.0.36); */
/* FreeBSD 2.2.2-3.2;IRIX 5.3 */
/* Source c0de by [CKS & Fdisk] */
/* gr33tz to: Packet St0rm and Ken, ADM crew, ech0 security and CKS, ch4x,*/
/* el8.org users, #c0de, rain.forest.puppy/[WT], MnemoniX , */
/* hypoclear of lUSt,codex ;-) , K.A.L.U.G.,Epicurus */
/* fuck to: all russian script kiddiez! like CHC,KPZ etc */
/* c0ming s00n:rootkit add-on */
/* -----------------------------------------------[19:32 08.06.99 UnlG]- */

#include <fcntl.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <signal.h>
#include <stdio.h>
#include <string.h>
#include <netdb.h>
#include <ctype.h>
#include <arpa/nameser.h>
#include <sys/stat.h>
#include <strings.h>
#include <stdio.h>
#include <stdlib.h>
#include <unistd.h>
#include <sys/socket.h>

void main(int argc, char *argv[])
{
int sock,debugm=0;
struct in_addr addr;
struct sockaddr_in sin;
struct hostent *he;
unsigned long start;
unsigned long end;
unsigned long counter;
char foundmsg[] = "200";
char *cgistr;
char buffer[1024];
int count=0;
int numin,suxes=0;
char cgibuff[1024];
char *buff[100]; /* Don't u think 100 is enought? ;-)*/
char *cginame[100]; /* Don't u think 100 is enought? */

buff[1] = "GET /cgi-bin/unlg1.1 HTTP/1.0\n\n";

/* v0rt-fu when u modify source, check this first line.... that's my 8-) */

buff[2] = "GET /cgi-bin/rwwwshell.pl HTTP/1.0\n\n";
buff[3] = "GET /cgi-bin/phf HTTP/1.0\n\n";
buff[4] = "GET /cgi-bin/Count.cgi HTTP/1.0\n\n";
buff[5] = "GET /cgi-bin/test-cgi HTTP/1.0\n\n";
buff[6] = "GET /cgi-bin/nph-test-cgi HTTP/1.0\n\n";
buff[7] = "GET /cgi-bin/nph-publish HTTP/1.0\n\n";
buff[8] = "GET /cgi-bin/php.cgi HTTP/1.0\n\n";
buff[9] = "GET /cgi-bin/handler HTTP/1.0\n\n";
buff[10] = "GET /cgi-bin/webgais HTTP/1.0\n\n";
buff[11] = "GET /cgi-bin/websendmail HTTP/1.0\n\n";
buff[12] = "GET /cgi-bin/webdist.cgi HTTP/1.0\n\n";
buff[13] = "GET /cgi-bin/faxsurvey HTTP/1.0\n\n";
buff[14] = "GET /cgi-bin/htmlscript HTTP/1.0\n\n";
buff[15] = "GET /cgi-bin/pfdispaly.cgi HTTP/1.0\n\n";
buff[16] = "GET /cgi-bin/perl.exe HTTP/1.0\n\n";
buff[17] = "GET /cgi-bin/wwwboard.pl HTTP/1.0\n\n";
buff[18] = "GET /cgi-bin/www-sql HTTP/1.0\n\n";
buff[19] = "GET /cgi-bin/view-source HTTP/1.0\n\n";
buff[20] = "GET /cgi-bin/campas HTTP/1.0\n\n";
buff[21] = "GET /cgi-bin/aglimpse HTTP/1.0\n\n";
buff[22] = "GET /cgi-bin/glimpse HTTP/1.0\n\n";
buff[23] = "GET /cgi-bin/man.sh HTTP/1.0\n\n";
buff[24] = "GET /cgi-bin/AT-admin.cgi HTTP/1.0\n\n";
buff[25] = "GET /cgi-bin/filemail.pl HTTP/1.0\n\n";
buff[26] = "GET /cgi-bin/maillist.pl HTTP/1.0\n\n";
buff[27] = "GET /cgi-bin/jj HTTP/1.0\n\n";
buff[28] = "GET /cgi-bin/info2www HTTP/1.0\n\n";
buff[29] = "GET /cgi-bin/files.pl HTTP/1.0\n\n";
buff[30] = "GET /cgi-bin/finger HTTP/1.0\n\n";
buff[31] = "GET /cgi-bin/bnbform.cgi HTTP/1.0\n\n";
buff[32] = "GET /cgi-bin/survey.cgi HTTP/1.0\n\n";
buff[33] = "GET /cgi-bin/AnyForm2 HTTP/1.0\n\n";
buff[34] = "GET /cgi-bin/textcounter.pl HTTP/1.0\n\n";
buff[35] = "GET /cgi-bin/classifieds.cgi HTTP/1.0\n\n";
buff[36] = "GET /cgi-bin/environ.cgi HTTP/1.0\n\n";
buff[37] = "GET /cgi-bin/wrap HTTP/1.0\n\n";
buff[38] = "GET /cgi-bin/cgiwrap HTTP/1.0\n\n";
buff[39] = "GET /cgi-bin/guestbook.cgi HTTP/1.0\n\n";
buff[40] = "GET /cgi-bin/edit.pl HTTP/1.0\n\n";
buff[41] = "GET /cgi-bin/perlshop.cgi HTTP/1.0\n\n";
buff[42] = "GET /cgi-bin/anyboard.cgi HTTP/1.0\n\n";
buff[43] = "GET /cgi-bin/webbbs.cgi HTTP/1.0\n\n";
buff[44] = "GET /cgi-bin/environ.cgi HTTP/1.0\n\n";
buff[45] = "GET /cgi-bin/whois_raw.cgi HTTP/1.0\n\n";
buff[46] = "GET /_vti_inf.html HTTP/1.0\n\n";
buff[47] = "GET /_vti_pvt/service.pwd HTTP/1.0\n\n";
buff[48] = "GET /_vti_pvt/users.pwd HTTP/1.0\n\n";
buff[49] = "GET /_vti_pvt/authors.pwd HTTP/1.0\n\n";
buff[50] = "GET /_vti_pvt/administrators.pwd HTTP/1.0\n\n";
buff[51] = "GET /_vti_bin/shtml.dll HTTP/1.0\n\n";
buff[52] = "GET /_vti_bin/shtml.exe HTTP/1.0\n\n";
buff[53] = "GET /cgi-dos/args.bat HTTP/1.0\n\n";
buff[54] = "GET /cgi-win/uploader.exe HTTP/1.0\n\n";
buff[55] = "GET /cgi-bin/rguest.exe HTTP/1.0\n\n";
buff[56] = "GET /cgi-bin/wguest.exe HTTP/1.0\n\n";
buff[57] = "GET /scripts/issadmin/bdir.htr HTTP/1.0\n\n";
buff[58] = "GET /scripts/CGImail.exe HTTP/1.0\n\n";
buff[59] = "GET /scripts/tools/newdsn.exe HTTP/1.0\n\n";
buff[60] = "GET /scripts/fpcount.exe HTTP/1.0\n\n";
buff[61] = "GET /scripts/counter.exe HTTP/1.0\n\n";
buff[62] = "GET /cgi-bin/visadmin.exe HTTP/1.0\n\n";
buff[63] = "GET /cfdocs/expelval/openfile.cfm HTTP/1.0\n\n";
buff[64] = "GET /cfdocs/expelval/exprcalc.cfm HTTP/1.0\n\n";
buff[65] = "GET /cfdocs/expelval/displayopenedfile.cfm HTTP/1.0\n\n";
buff[66] = "GET /cfdocs/expelval/sendmail.cfm HTTP/1.0\n\n";
buff[67] = "GET /iissamples/exair/howitworks/codebrws.asp HTTP/1.0\n\n";
buff[68] = "GET /iissamples/sdk/asp/docs/codebrws.asp HTTP/1.0\n\n";
buff[69] = "GET /msads/Samples/SELECTOR/showcode.asp HTTP/1.0\n\n";
buff[70] = "GET /search97.vts HTTP/1.0\n\n";
buff[71] = "GET /carbo.dll HTTP/1.0\n\n"; /* we have at archive about 70 CGi ,
rule? ;-) */

cginame[1] = "UnlG - backd00r ";
cginame[2] = "THC - backd00r ";
cginame[3] = "phf..classic :) ";
cginame[4] = "Count.cgi ";
cginame[5] = "test-cgi ";
cginame[6] = "nph-test-cgi ";
cginame[7] = "nph-publish ";
cginame[8] = "php.cgi ";
cginame[9] = "handler ";
cginame[10] = "webgais ";
cginame[11] = "websendmail ";
cginame[12] = "webdist.cgi ";
cginame[13] = "faxsurvey ";
cginame[14] = "htmlscript ";
cginame[15] = "pfdisplay ";
cginame[16] = "perl.exe ";
cginame[17] = "wwwboard.pl ";
cginame[18] = "www-sql ";
cginame[19] = "view-source ";
cginame[20] = "campas ";
cginame[21] = "aglimpse ";
cginame[22] = "glimpse ";
cginame[23] = "man.sh ";
cginame[24] = "AT-admin.cgi ";
cginame[25] = "filemail.pl ";
cginame[26] = "maillist.pl ";
cginame[27] = "jj ";
cginame[28] = "info2www ";
cginame[29] = "files.pl ";
cginame[30] = "finger ";
cginame[31] = "bnbform.cgi ";
cginame[32] = "survey.cgi ";
cginame[33] = "AnyForm2 ";
cginame[34] = "textcounter.pl ";
cginame[35] = "classifields.cgi";
cginame[36] = "environ.cgi ";
cginame[37] = "wrap ";
cginame[38] = "cgiwrap ";
cginame[39] = "guestbook.cgi ";
cginame[40] = "edit.pl ";
cginame[41] = "perlshop.cgi ";
cginame[42] = "anyboard.cgi ";
cginame[43] = "webbbs.cgi ";
cginame[44] = "environ.cgi ";
cginame[45] = "whois_raw.cgi ";
cginame[46] = "_vti_inf.html ";
cginame[47] = "service.pwd ";
cginame[48] = "users.pwd ";
cginame[49] = "authors.pwd ";
cginame[50] = "administrators ";
cginame[51] = "shtml.dll ";
cginame[52] = "shtml.exe ";
cginame[53] = "args.bat ";
cginame[54] = "uploader.exe ";
cginame[55] = "rguest.exe ";
cginame[56] = "wguest.exe ";
cginame[57] = "bdir - samples ";
cginame[58] = "CGImail.exe ";
cginame[59] = "newdsn.exe ";
cginame[60] = "fpcount.exe ";
cginame[61] = "counter.exe ";
cginame[62] = "visadmin.exe ";
cginame[63] = "openfile.cfm ";
cginame[64] = "exprcalc.cfm ";
cginame[65] = "dispopenedfile ";
cginame[66] = "sendmail.cfm ";
cginame[67] = "codebrws.asp ";
cginame[68] = "codebrws.asp 2 ";
cginame[69] = "showcode.asp ";
cginame[70] = "search97.vts ";
cginame[71] = "carbo.dll ";

if (argc<2)
{
printf("\n [-- CGI Checker 1.51.1 (c) su1d sh3ll //UnlG --]");
printf("\n [-- last public release.... --]");
printf("\nusage : %s host ",argv[0]);
printf("\n Or : %s host -d for debug mode\n\n",argv[0]);
exit(0);
}

if (argc>2)
{
if(strstr("-d",argv[2]))
{
debugm=1;
}
}

if ((he=gethostbyname(argv[1])) == NULL)
{
herror("gethostbyname");
exit(0);
}

printf("\n\n\t CGI Checker - (c) su1d sh3ll //UnlG\n\n\n");
start=inet_addr(argv[1]);
counter=ntohl(start);

sock=socket(AF_INET, SOCK_STREAM, 0);
bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length);
sin.sin_family=AF_INET;
sin.sin_port=htons(80); /* <--- if u want scan another port change it */
/* codex when u again change this code pls call
proggi like this 1.35.1 or 1.35.[a..z] ;-) */

if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0)
{
perror("connect");
}
printf("\n\n\t [ Press any key to check out the httpd version...... ]\n");
getchar(); /* CKS sorry, but ur new piece of code don't work :-( */
send(sock, "HEAD / HTTP/1.0\n\n",17,0);
recv(sock, buffer, sizeof(buffer),0);
printf("%s",buffer);
close(sock);

printf("\n\t [ Press any key to search 4 CGI stuff...... ]\n");
getchar();

while(count++ < 71) /* huh! 71 cgi..... no secur1ty in th1s w0rld ;-)*/
{
sock=socket(AF_INET, SOCK_STREAM, 0);
bcopy(he->h_addr, (char *)&sin.sin_addr, he->h_length);
sin.sin_family=AF_INET;
sin.sin_port=htons(80);
if (connect(sock, (struct sockaddr*)&sin, sizeof(sin))!=0)
{
perror("connect");
}
printf("Searching for %s : ",cginame[count]);

for(numin=0;numin < 1024;numin++)
{
cgibuff[numin] = '\0';
}

send(sock, buff[count],strlen(buff[count]),0);
recv(sock, cgibuff, sizeof(cgibuff),0);
cgistr = strstr(cgibuff,foundmsg);
if( cgistr != NULL) {
printf("Found !! ;)\n");++suxes; }
else
printf("Not Found\n");

if(debugm==1)
{
printf("\n\n ------------------------\n %s \n ------------------------\n",cgibuff);
printf("Press any key to continue....\n"); getchar();
}
close(sock);
}
if (suxes){ printf("...have a nice hack... ;-)\n");}
else {printf ("...n0thing wr0ng on server..... hmm...sucks!\n");}
}
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close