Beefy Boxes and Bandwidth Generously Provided by pair Networks
Syntactic Confectionery Delight
 
PerlMonks  

Reaped: Re^2: when i add file.txt he tell me add file again not work for me :/

by NodeReaper (Curate)
on Dec 16, 2019 at 00:13 UTC ( [id://11110205]=note: print w/replies, xml ) Need Help??


in reply to Re: when i add file.txt he tell me add file again not work for me :/
in thread Reaped: when i add file.txt he tell me add file again not work for me :/

This node falls below the community's threshold of quality. You may see it by logging in.
  • Comment on Reaped: Re^2: when i add file.txt he tell me add file again not work for me :/

Replies are listed 'Best First'.
Re^3: when i add file.txt he tell me add file again not work for me :/
by pryrt (Abbot) on Dec 16, 2019 at 02:37 UTC
    What does the script do?

    my initial guess was born out by the text and car/sub names:

    $mrspy ... Drupal Mass Exploiter print "\t"; open(tarrget, sub ninja($site) sub Hakc_Drupal() my $exploit = print "Cehck Password And User\n" $brute = POST ...

    ... Looks like they are trying to catch Drupal systems that haven't updated the default password. Please edit your post to not contain a prettified version of the hacking script. And here's hoping that people vote reap rather than edit on the consideration

Re^3: when i add file.txt he tell me add file again not work for me :/
by jcb (Parson) on Dec 18, 2019 at 00:22 UTC

    After deobfuscation, it appears to be a pathetically-bad example of script-kiddie code that attempts some kind of exploit on Drupal sites. It does not actually contain the exploit however, instead relying on a remote PHP script sitting on teod.com.ar that appears to perform some kind of exploit that resets the Drupal site's admin password — or it is just our script-kiddie trying to get a list of sites cracked with his "4|\/|4Z1|\|G!!11!!11!" exploit tool.

    In short, it is either a really pathetic admin login bruteforce tool that only tries admin:admin or it is a client for an "Exploit-as-a-Service" with the actual exploit running on teod.com.ar.

    As for the quality of the code, it is garbage. No warnings, no strict, numerous unneeded use statements, and that is before we even get to any of the actual code. My guess is that it has been pasted together from fragments of several other "1337 |-|4><0R" tools by yet another clueless clown.

    Laymenos, you really need to start by reading perlintro and perlsub. Named subs do not nest like that in Perl, although perl will accept the syntax to allow closures to be easily produced. And find something better to do than trying to break into people's Web sites; some of those defacements were funny years ago, but that's just lame now.

Log In?
Username:
Password:

What's my password?
Create A New User
Domain Nodelet?
Node Status?
node history
Node Type: note [id://11110205]
help
Chatterbox?
and the web crawler heard nothing...

How do I use this?Last hourOther CB clients
Other Users?
Others romping around the Monastery: (2)
As of 2024-04-19 21:15 GMT
Sections?
Information?
Find Nodes?
Leftovers?
    Voting Booth?

    No recent polls found