Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
4ca0bd85
Commit
4ca0bd85
authored
9 years ago
by
Marcin Bury
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Removing double running module status.
parent
6ae68c48
Show whitespace changes
Inline
Side-by-side
Showing
12 changed files
with
0 additions
and
18 deletions
+0
-18
ftp_bruteforce.py
routersploit/modules/creds/ftp_bruteforce.py
+0
-2
ftp_default.py
routersploit/modules/creds/ftp_default.py
+0
-2
http_basic_bruteforce.py
routersploit/modules/creds/http_basic_bruteforce.py
+0
-2
http_basic_default.py
routersploit/modules/creds/http_basic_default.py
+0
-2
http_form_bruteforce.py
routersploit/modules/creds/http_form_bruteforce.py
+0
-2
http_form_default.py
routersploit/modules/creds/http_form_default.py
+0
-2
snmp_bruteforce.py
routersploit/modules/creds/snmp_bruteforce.py
+0
-1
ssh_bruteforce.py
routersploit/modules/creds/ssh_bruteforce.py
+0
-1
ssh_default.py
routersploit/modules/creds/ssh_default.py
+0
-1
telnet_bruteforce.py
routersploit/modules/creds/telnet_bruteforce.py
+0
-1
telnet_default.py
routersploit/modules/creds/telnet_default.py
+0
-1
dwr_932_info_disclosure.py
...rsploit/modules/exploits/dlink/dwr_932_info_disclosure.py
+0
-1
No files found.
routersploit/modules/creds/ftp_bruteforce.py
View file @
4ca0bd85
...
@@ -36,8 +36,6 @@ class Exploit(exploits.Exploit):
...
@@ -36,8 +36,6 @@ class Exploit(exploits.Exploit):
credentials
=
[]
credentials
=
[]
def
run
(
self
):
def
run
(
self
):
print_status
(
"Running module..."
)
self
.
credentials
=
[]
self
.
credentials
=
[]
ftp
=
ftplib
.
FTP
()
ftp
=
ftplib
.
FTP
()
try
:
try
:
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/ftp_default.py
View file @
4ca0bd85
...
@@ -34,8 +34,6 @@ class Exploit(exploits.Exploit):
...
@@ -34,8 +34,6 @@ class Exploit(exploits.Exploit):
credentials
=
[]
credentials
=
[]
def
run
(
self
):
def
run
(
self
):
print_status
(
"Running module..."
)
self
.
credentials
=
[]
self
.
credentials
=
[]
ftp
=
ftplib
.
FTP
()
ftp
=
ftplib
.
FTP
()
try
:
try
:
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/http_basic_bruteforce.py
View file @
4ca0bd85
...
@@ -36,8 +36,6 @@ class Exploit(exploits.Exploit):
...
@@ -36,8 +36,6 @@ class Exploit(exploits.Exploit):
credentials
=
[]
credentials
=
[]
def
run
(
self
):
def
run
(
self
):
print_status
(
"Running module..."
)
self
.
credentials
=
[]
self
.
credentials
=
[]
url
=
sanitize_url
(
"{}:{}"
.
format
(
self
.
target
,
self
.
port
))
url
=
sanitize_url
(
"{}:{}"
.
format
(
self
.
target
,
self
.
port
))
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/http_basic_default.py
View file @
4ca0bd85
...
@@ -33,8 +33,6 @@ class Exploit(exploits.Exploit):
...
@@ -33,8 +33,6 @@ class Exploit(exploits.Exploit):
credentials
=
[]
credentials
=
[]
def
run
(
self
):
def
run
(
self
):
print_status
(
"Running module..."
)
self
.
credentials
=
[]
self
.
credentials
=
[]
url
=
sanitize_url
(
"{}:{}"
.
format
(
self
.
target
,
self
.
port
))
url
=
sanitize_url
(
"{}:{}"
.
format
(
self
.
target
,
self
.
port
))
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/http_form_bruteforce.py
View file @
4ca0bd85
...
@@ -40,8 +40,6 @@ class Exploit(exploits.Exploit):
...
@@ -40,8 +40,6 @@ class Exploit(exploits.Exploit):
invalid
=
{
"min"
:
0
,
"max"
:
0
}
invalid
=
{
"min"
:
0
,
"max"
:
0
}
def
run
(
self
):
def
run
(
self
):
print_status
(
"Running module..."
)
self
.
credentials
=
[]
self
.
credentials
=
[]
url
=
sanitize_url
(
"{}:{}{}"
.
format
(
self
.
target
,
self
.
port
,
self
.
path
))
url
=
sanitize_url
(
"{}:{}{}"
.
format
(
self
.
target
,
self
.
port
,
self
.
path
))
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/http_form_default.py
View file @
4ca0bd85
...
@@ -38,8 +38,6 @@ class Exploit(exploits.Exploit):
...
@@ -38,8 +38,6 @@ class Exploit(exploits.Exploit):
invalid
=
{
"min"
:
0
,
"max"
:
0
}
invalid
=
{
"min"
:
0
,
"max"
:
0
}
def
run
(
self
):
def
run
(
self
):
print_status
(
"Running module..."
)
self
.
credentials
=
[]
self
.
credentials
=
[]
url
=
sanitize_url
(
"{}:{}{}"
.
format
(
self
.
target
,
self
.
port
,
self
.
path
))
url
=
sanitize_url
(
"{}:{}{}"
.
format
(
self
.
target
,
self
.
port
,
self
.
path
))
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/snmp_bruteforce.py
View file @
4ca0bd85
...
@@ -25,7 +25,6 @@ class Exploit(exploits.Exploit):
...
@@ -25,7 +25,6 @@ class Exploit(exploits.Exploit):
def
run
(
self
):
def
run
(
self
):
self
.
strings
=
[]
self
.
strings
=
[]
print_status
(
"Running module..."
)
# todo: check if service is up
# todo: check if service is up
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/ssh_bruteforce.py
View file @
4ca0bd85
...
@@ -35,7 +35,6 @@ class Exploit(exploits.Exploit):
...
@@ -35,7 +35,6 @@ class Exploit(exploits.Exploit):
def
run
(
self
):
def
run
(
self
):
self
.
credentials
=
[]
self
.
credentials
=
[]
print_status
(
"Running module..."
)
ssh
=
paramiko
.
SSHClient
()
ssh
=
paramiko
.
SSHClient
()
try
:
try
:
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/ssh_default.py
View file @
4ca0bd85
...
@@ -34,7 +34,6 @@ class Exploit(exploits.Exploit):
...
@@ -34,7 +34,6 @@ class Exploit(exploits.Exploit):
def
run
(
self
):
def
run
(
self
):
self
.
credentials
=
[]
self
.
credentials
=
[]
print_status
(
"Running module..."
)
ssh
=
paramiko
.
SSHClient
()
ssh
=
paramiko
.
SSHClient
()
try
:
try
:
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/telnet_bruteforce.py
View file @
4ca0bd85
...
@@ -34,7 +34,6 @@ class Exploit(exploits.Exploit):
...
@@ -34,7 +34,6 @@ class Exploit(exploits.Exploit):
def
run
(
self
):
def
run
(
self
):
self
.
credentials
=
[]
self
.
credentials
=
[]
print_status
(
"Running module..."
)
try
:
try
:
tn
=
telnetlib
.
Telnet
(
self
.
target
,
self
.
port
)
tn
=
telnetlib
.
Telnet
(
self
.
target
,
self
.
port
)
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/creds/telnet_default.py
View file @
4ca0bd85
...
@@ -34,7 +34,6 @@ class Exploit(exploits.Exploit):
...
@@ -34,7 +34,6 @@ class Exploit(exploits.Exploit):
def
run
(
self
):
def
run
(
self
):
self
.
credentials
=
[]
self
.
credentials
=
[]
print_status
(
"Running module..."
)
try
:
try
:
tn
=
telnetlib
.
Telnet
(
self
.
target
,
self
.
port
)
tn
=
telnetlib
.
Telnet
(
self
.
target
,
self
.
port
)
...
...
This diff is collapsed.
Click to expand it.
routersploit/modules/exploits/dlink/dwr_932_info_disclosure.py
View file @
4ca0bd85
...
@@ -37,7 +37,6 @@ class Exploit(exploits.Exploit):
...
@@ -37,7 +37,6 @@ class Exploit(exploits.Exploit):
def
run
(
self
):
def
run
(
self
):
url
=
sanitize_url
(
"{}:{}/cgi-bin/dget.cgi?cmd=wifi_AP1_ssid,wifi_AP1_hidden,wifi_AP1_passphrase,wifi_AP1_passphrase_wep,wifi_AP1_security_mode,wifi_AP1_enable,get_mac_filter_list,get_mac_filter_switch,get_client_list,get_mac_address,get_wps_dev_pin,get_wps_mode,get_wps_enable,get_wps_current_time&_=1458458152703"
.
format
(
self
.
target
,
self
.
port
))
url
=
sanitize_url
(
"{}:{}/cgi-bin/dget.cgi?cmd=wifi_AP1_ssid,wifi_AP1_hidden,wifi_AP1_passphrase,wifi_AP1_passphrase_wep,wifi_AP1_security_mode,wifi_AP1_enable,get_mac_filter_list,get_mac_filter_switch,get_client_list,get_mac_address,get_wps_dev_pin,get_wps_mode,get_wps_enable,get_wps_current_time&_=1458458152703"
.
format
(
self
.
target
,
self
.
port
))
print_status
(
"Running module..."
)
try
:
try
:
r
=
requests
.
get
(
url
)
r
=
requests
.
get
(
url
)
res
=
r
.
text
res
=
r
.
text
...
...
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment