Tu comunidad de Seguridad Informatica

[Python] Zone-H Reporter | Sanko Info1810 Para ver Todo el contenido del foro es necesario estar Registrado! [Python] Zone-H Reporter | Sanko Info1810
[Python] Zone-H Reporter | Sanko Info1810 Antes de comentar o Aportar es Obligado Leer Las: Reglas | Rules [Python] Zone-H Reporter | Sanko Info1810
[Python] Zone-H Reporter | Sanko Info1810Ya Esta Disponible al publico "LeProject" el Videojuego del Foro Click Aquí Para Ver el Post. [Python] Zone-H Reporter | Sanko Info1810
[Python] Zone-H Reporter | Sanko Info1810Pitbull Security Labs "Extras" Esta Disponible! [ENTRA][Python] Zone-H Reporter | Sanko Info1810

No estás conectado. Conéctate o registrate

Ver el tema anterior Ver el tema siguiente Ir abajo  Mensaje [Página 1 de 1.]

1sanko 

sanko
Usuario
Usuario

Sáb Nov 10, 2012 7:16 pm
Bueno hace un tiempo vi un zone-h reporter hecho en perl por Dedalo y hoy aburrido pues me puse a hacer una similar en python.
Quien no sepa lo que es zone-h que se muera no más o que lo busque...

Aqui os dejo el código , es algo extenso y directamente no lo comente.

Código:
###################
#!/usr/bin/python #
# Zone-H Reporter #
# Coded by Sanko  #
###################

import urllib,urllib2

def main():
    options = """
#######################
#              #
#  Zone - H Reporter  #
#  [0] Login          #
#  [1] Single Deface  #
#  [2] Mass Deface    #
#  [i] info methods  #
#                  #
#######################"""

    print options
    entrada = raw_input("Choose an option -> ")
    if entrada == 0:
        login('user','password')
    elif entrada == 1:
        uploadsingle('defacer','http://web.com/','15','1')
    elif entrada == 2:
        uploadmass('defacer','15','1') #Deben indicar en la funcion los domains defaceados
    elif entrada == 'i':
        info()
    else:
        print "Error , try again\n"
        main()

def login(user,password):
    url = 'http://www.zone-h.org/login'
    values = {'user':user,
        'password':password}

    data = urllib.urlencode(values)
    req = urllib2.Request(url, data)
    resp = urllib2.urlopen(req)
    page = resp.read()
    print page

def uploadsingle(defacer,domain,hackmode,reason):
    url = 'http://www.zone-h.org/notify/single'
    values = {'defacer':defacer,
              'domain1':domain,
              'hackmode':hackmode,
          'reason':reason,
          'submit':'Send'}

    data = urllib.urlencode(values)
    req = urllib2.Request(url, data)
    resp = urllib2.urlopen(req)
    page = resp.read()
    print page


def uploadmass(defacer,hackmode,reason):
    url = 'http://www.zone-h.org/notify/mass'
    values = {'defacer':defacer,
          'domain1':'',
          'domain2':'',
          'domain3':'',
          'domain4':'',
          'domain5':'',
          'domain6':'',
          'domain7':'',
          'domain8':'',
          'domain9':'',
          'domain10':'',
              'domain1':domain,
              'hackmode':hackmode,
          'reason':reason,
          'submit':'Send'}

    data = urllib.urlencode(values)
    req = urllib2.Request(url, data)
    resp = urllib2.urlopen(req)
    page = resp.read()
    print page

def info():
    hackmodes = """
    [1] known vulnerability (i.e. unpatched system)
    [2] undisclosed (new) vulnerability
    [3] configuration / admin. mistake
    [4] brute force attack
    [5] social engineering
    [6] Web Server intrusion
    [7] Web Server external module intrusion
    [8] Mail Server intrusion
    [9] FTP Server intrusion
    [10] SSH Server intrusion
    [11] Telnet Server intrusion
    [12] RPC Server intrusion
    [13] Shares misconfiguration
    [14] Other Server intrusion
    [15] SQL Injection
    [16] URL Poisoning
    [17] File Inclusion
    [18] Other Web Application bug
    [19] Remote administrative panel access through bruteforcing
    [20] Remote administrative panel access through password guessing
    [21] Remote administrative panel access through social engineering
    [22] Attack against the administrator/user (password stealing/sniffing)
    [23] Access credentials through Man In the Middle attack
    [24] Remote service password guessing
    [25] Remote service password bruteforce
    [26] Rerouting after attacking the Firewall
    [27] Rerouting after attacking the Router
    [28] DNS attack through social engineering
    [29] DNS attack through cache poisoning
    [30] Not available
    [31] Cross-Site Scripting"""

    reasons = """
    [1] Heh...just for fun!
    [2] Revenge against that website
    [3] Political reasons
    [4] As a challenge
    [5] I just want to be the best defacer
    [6] Patriotism
    [7] Not available"""
   
    entrada = raw_input("info hackmodes | info reasons  --- > ")
    if entrada == "hackmodes":
        print hackmodes
    elif entrada == "reasons":
        print reasons
    else:
        print "Error"
       

main()

Ver el tema anterior Ver el tema siguiente Volver arriba  Mensaje [Página 1 de 1.]

Permisos de este foro:
No puedes responder a temas en este foro.