[Python] Zone-H Reporter | Sanko

Iniciado por Sanko, Noviembre 10, 2012, 08:48:18 PM

Tema anterior - Siguiente tema

0 Miembros y 1 Visitante están viendo este tema.

Bueno hace un tiempo vi un zone-h reporter hecho en perl por Dedalo y hoy aburrido pues me puse a hacer una similar en python.
Quien no sepa lo que es zone-h que se muera no más o que lo busque...

Aqui os dejo el código , es algo extenso y directamente no lo comente.

Código: python
###################
#!/usr/bin/python #
# Zone-H Reporter #
# Coded by Sanko  #
###################

import urllib,urllib2

def main():
options = """
#######################
#       #
#  Zone - H Reporter  #
#  [0] Login          #
#  [1] Single Deface  #
#  [2] Mass Deface    #
#  [i] info methods   #
#               #
#######################"""

print options
entrada = raw_input("Choose an option -> ")
if entrada == 0:
login('user','password')
elif entrada == 1:
uploadsingle('defacer','http://web.com/','15','1')
elif entrada == 2:
uploadmass('defacer','15','1') #Deben indicar en la funcion los domains defaceados
elif entrada == 'i':
info()
else:
print "Error , try again\n"
main()

def login(user,password):
url = 'http://www.zone-h.org/login'
values = {'user':user,
'password':password}

data = urllib.urlencode(values)
req = urllib2.Request(url, data)
resp = urllib2.urlopen(req)
page = resp.read()
print page

def uploadsingle(defacer,domain,hackmode,reason):
url = 'http://www.zone-h.org/notify/single'
values = {'defacer':defacer,
          'domain1':domain,
          'hackmode':hackmode,
  'reason':reason,
  'submit':'Send'}

data = urllib.urlencode(values)
req = urllib2.Request(url, data)
resp = urllib2.urlopen(req)
page = resp.read()
print page


def uploadmass(defacer,hackmode,reason):
url = 'http://www.zone-h.org/notify/mass'
values = {'defacer':defacer,
  'domain1':'',
  'domain2':'',
  'domain3':'',
  'domain4':'',
  'domain5':'',
  'domain6':'',
  'domain7':'',
  'domain8':'',
  'domain9':'',
  'domain10':'',
          'domain1':domain,
          'hackmode':hackmode,
  'reason':reason,
  'submit':'Send'}

data = urllib.urlencode(values)
req = urllib2.Request(url, data)
resp = urllib2.urlopen(req)
page = resp.read()
print page

def info():
hackmodes = """
[1] known vulnerability (i.e. unpatched system)
[2] undisclosed (new) vulnerability
[3] configuration / admin. mistake
[4] brute force attack
[5] social engineering
[6] Web Server intrusion
[7] Web Server external module intrusion
[8] Mail Server intrusion
[9] FTP Server intrusion
[10] SSH Server intrusion
[11] Telnet Server intrusion
[12] RPC Server intrusion
[13] Shares misconfiguration
[14] Other Server intrusion
[15] SQL Injection
[16] URL Poisoning
[17] File Inclusion
[18] Other Web Application bug
[19] Remote administrative panel access through bruteforcing
[20] Remote administrative panel access through password guessing
[21] Remote administrative panel access through social engineering
[22] Attack against the administrator/user (password stealing/sniffing)
[23] Access credentials through Man In the Middle attack
[24] Remote service password guessing
[25] Remote service password bruteforce
[26] Rerouting after attacking the Firewall
[27] Rerouting after attacking the Router
[28] DNS attack through social engineering
[29] DNS attack through cache poisoning
[30] Not available
[31] Cross-Site Scripting"""

reasons = """
[1] Heh...just for fun!
[2] Revenge against that website
[3] Political reasons
[4] As a challenge
[5] I just want to be the best defacer
[6] Patriotism
[7] Not available"""

entrada = raw_input("info hackmodes | info reasons   --- > ")
if entrada == "hackmodes":
print hackmodes
elif entrada == "reasons":
print reasons
else:
print "Error"


main()


Saludos , Sanko.
Sigueme en Twitter : @Sankosk
Estos nuevos staff no tienen puta idea XD

Excelente codigo man!
Te quedo arrechisimo me gusto mucho, sigue asi bro..  Llegarás lejos!

PABLO ESCOBAR.

Pedazo de herramienta brother, No soy Defacer ni nada que se le paresca pero Me agrada que pudiste Implementar una Idea originalmente ya vista en perl & php y plasmarla en python.

Gracias subzer y gracias oggy por vuestros comentarios  :-[
Sigueme en Twitter : @Sankosk
Estos nuevos staff no tienen puta idea XD