Sáb Nov 10, 2012 7:16 pm
Bueno hace un tiempo vi un zone-h reporter hecho en perl por Dedalo y hoy aburrido pues me puse a hacer una similar en python.
Quien no sepa lo que es zone-h que se muera no más o que lo busque...
Aqui os dejo el código , es algo extenso y directamente no lo comente.
Quien no sepa lo que es zone-h que se muera no más o que lo busque...
Aqui os dejo el código , es algo extenso y directamente no lo comente.
- Código:
###################
#!/usr/bin/python #
# Zone-H Reporter #
# Coded by Sanko #
###################
import urllib,urllib2
def main():
options = """
#######################
# #
# Zone - H Reporter #
# [0] Login #
# [1] Single Deface #
# [2] Mass Deface #
# [i] info methods #
# #
#######################"""
print options
entrada = raw_input("Choose an option -> ")
if entrada == 0:
login('user','password')
elif entrada == 1:
uploadsingle('defacer','http://web.com/','15','1')
elif entrada == 2:
uploadmass('defacer','15','1') #Deben indicar en la funcion los domains defaceados
elif entrada == 'i':
info()
else:
print "Error , try again\n"
main()
def login(user,password):
url = 'http://www.zone-h.org/login'
values = {'user':user,
'password':password}
data = urllib.urlencode(values)
req = urllib2.Request(url, data)
resp = urllib2.urlopen(req)
page = resp.read()
print page
def uploadsingle(defacer,domain,hackmode,reason):
url = 'http://www.zone-h.org/notify/single'
values = {'defacer':defacer,
'domain1':domain,
'hackmode':hackmode,
'reason':reason,
'submit':'Send'}
data = urllib.urlencode(values)
req = urllib2.Request(url, data)
resp = urllib2.urlopen(req)
page = resp.read()
print page
def uploadmass(defacer,hackmode,reason):
url = 'http://www.zone-h.org/notify/mass'
values = {'defacer':defacer,
'domain1':'',
'domain2':'',
'domain3':'',
'domain4':'',
'domain5':'',
'domain6':'',
'domain7':'',
'domain8':'',
'domain9':'',
'domain10':'',
'domain1':domain,
'hackmode':hackmode,
'reason':reason,
'submit':'Send'}
data = urllib.urlencode(values)
req = urllib2.Request(url, data)
resp = urllib2.urlopen(req)
page = resp.read()
print page
def info():
hackmodes = """
[1] known vulnerability (i.e. unpatched system)
[2] undisclosed (new) vulnerability
[3] configuration / admin. mistake
[4] brute force attack
[5] social engineering
[6] Web Server intrusion
[7] Web Server external module intrusion
[8] Mail Server intrusion
[9] FTP Server intrusion
[10] SSH Server intrusion
[11] Telnet Server intrusion
[12] RPC Server intrusion
[13] Shares misconfiguration
[14] Other Server intrusion
[15] SQL Injection
[16] URL Poisoning
[17] File Inclusion
[18] Other Web Application bug
[19] Remote administrative panel access through bruteforcing
[20] Remote administrative panel access through password guessing
[21] Remote administrative panel access through social engineering
[22] Attack against the administrator/user (password stealing/sniffing)
[23] Access credentials through Man In the Middle attack
[24] Remote service password guessing
[25] Remote service password bruteforce
[26] Rerouting after attacking the Firewall
[27] Rerouting after attacking the Router
[28] DNS attack through social engineering
[29] DNS attack through cache poisoning
[30] Not available
[31] Cross-Site Scripting"""
reasons = """
[1] Heh...just for fun!
[2] Revenge against that website
[3] Political reasons
[4] As a challenge
[5] I just want to be the best defacer
[6] Patriotism
[7] Not available"""
entrada = raw_input("info hackmodes | info reasons --- > ")
if entrada == "hackmodes":
print hackmodes
elif entrada == "reasons":
print reasons
else:
print "Error"
main()