Complete Manual
WesternGuy
iolaka
12/9/2010
Index
1) Main Features Page 3
2) Program Functional Pages 4-7
General Settings Page 4-5
Automatic IP Grabber Page 5
WebDAV Dir Finder Page 6
Vulnerable Scanner Page 6-7
Shell Uploader Page 7
3) Contract Us Page 8
2|P ag e
Main Features:
3|P ag e
Program Functionality:
General Settings
Image Explanation:
1) The amount of threads that the application will use. The threads are used in IP
Grabber and in WebDAV Dir Finder
2) Timeout option. How many seconds will the application wait for the IP/webdav/ to
get a response. NOTE: For some IP’s the application will wait a LOT of time till the
got a response and that could delay the application (Used in IP Grabber and WebDAV
Finder).
3) Shows the path to Shell ( .php ) ( Shell Uploader )
4) Drive Letter for temporary connection in order to upload the shell . ( Shell Uploader)
5) Username to achieve the connection to IP/webdav/ folder . (Vulnerable Scanner ,
Shell Uploader)
6) Password to achieve the connection to IP/webdav/ folder. (Vulnerable Scanner ,
Shell Uploader)
7) Browse for Shell file (.php) ( Shell Uploader )
8) Suffix for Auto Page changer. (IP Grabber)
9) Starting Page for Auto Page changer. (IP Grabber)
10) Ending Page for Auto Page changer. (IP Grabber)
11) Base URL. (IP Grabber)
4|P ag e
Auto Page Changer Example:
Let “ http://css.setti.info/servers/cs16 ” be the main URL, and when we change
to page 2, the URL becomes ” http://css.setti.info/servers/cs16/page/2 “ .And
we want to reach the page 20. So in order to achieve this we will need to give
this input:
URL: http://css.setti.info/servers/cs16
From (Page): 2
To (Page): 20
Suffix: /page/*
The program automatically will replace “*” with the page number
Automatic IP Grabber
Image Explanation:
5|P ag e
WebDAV Dir Finder
After the IP have grabbed you have to find if WebDAV directory exists.
Image Explanation:
1) The Textbox where the checked and Working IP’s will be shown
2) The Textbox where the checked and Non-Working IP’s will be shown
3) Button to start scanning
Vulnerable Scanner
This process will check the Working IP’s if there are Vulnerable.
6|P ag e
Image Explanation:
Shell Uploader
This process will Upload your Shell file (.php) to the Vulnerable IP’s
Image Explanation:
NOTE: For this process you need to define the Shell Path, the Drive Letter ,the
Username and the Password.
7|P ag e
Contact Us:
Developer #1:
HF Username: WesternGuy
MSN: compileGuy@hotmail.com
Developer #2:
HF Username: iolaka
MSN: iolakahf@hotmail.com
8|P ag e