Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
61aefbba
Commit
61aefbba
authored
Apr 29, 2016
by
Marcin Bury
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Adding stop on success option.
parent
0212c827
Hide whitespace changes
Inline
Side-by-side
Showing
11 changed files
with
40 additions
and
14 deletions
+40
-14
ftp_bruteforce.py
routersploit/modules/creds/ftp_bruteforce.py
+4
-1
ftp_default.py
routersploit/modules/creds/ftp_default.py
+4
-1
http_basic_bruteforce.py
routersploit/modules/creds/http_basic_bruteforce.py
+4
-1
http_basic_default.py
routersploit/modules/creds/http_basic_default.py
+4
-1
http_form_bruteforce.py
routersploit/modules/creds/http_form_bruteforce.py
+4
-1
http_form_default.py
routersploit/modules/creds/http_form_default.py
+4
-1
snmp_bruteforce.py
routersploit/modules/creds/snmp_bruteforce.py
+2
-2
ssh_bruteforce.py
routersploit/modules/creds/ssh_bruteforce.py
+3
-2
ssh_default.py
routersploit/modules/creds/ssh_default.py
+3
-2
telnet_bruteforce.py
routersploit/modules/creds/telnet_bruteforce.py
+4
-1
telnet_default.py
routersploit/modules/creds/telnet_default.py
+4
-1
No files found.
routersploit/modules/creds/ftp_bruteforce.py
View file @
61aefbba
...
@@ -35,6 +35,7 @@ class Exploit(exploits.Exploit):
...
@@ -35,6 +35,7 @@ class Exploit(exploits.Exploit):
usernames
=
exploits
.
Option
(
'admin'
,
'Username or file with usernames (file://)'
)
usernames
=
exploits
.
Option
(
'admin'
,
'Username or file with usernames (file://)'
)
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -107,7 +108,9 @@ class Exploit(exploits.Exploit):
...
@@ -107,7 +108,9 @@ class Exploit(exploits.Exploit):
try
:
try
:
ftp
.
login
(
user
,
password
)
ftp
.
login
(
user
,
password
)
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
except
:
except
:
...
...
routersploit/modules/creds/ftp_default.py
View file @
61aefbba
...
@@ -33,6 +33,7 @@ class Exploit(exploits.Exploit):
...
@@ -33,6 +33,7 @@ class Exploit(exploits.Exploit):
threads
=
exploits
.
Option
(
8
,
'Numbers of threads'
)
threads
=
exploits
.
Option
(
8
,
'Numbers of threads'
)
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass pair or file with default credentials (file://)'
)
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass pair or file with default credentials (file://)'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -99,7 +100,9 @@ class Exploit(exploits.Exploit):
...
@@ -99,7 +100,9 @@ class Exploit(exploits.Exploit):
try
:
try
:
ftp
.
login
(
user
,
password
)
ftp
.
login
(
user
,
password
)
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
except
:
except
:
...
...
routersploit/modules/creds/http_basic_bruteforce.py
View file @
61aefbba
...
@@ -36,6 +36,7 @@ class Exploit(exploits.Exploit):
...
@@ -36,6 +36,7 @@ class Exploit(exploits.Exploit):
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
path
=
exploits
.
Option
(
'/'
,
'URL Path'
)
path
=
exploits
.
Option
(
'/'
,
'URL Path'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -92,7 +93,9 @@ class Exploit(exploits.Exploit):
...
@@ -92,7 +93,9 @@ class Exploit(exploits.Exploit):
response
=
http_request
(
method
=
"GET"
,
url
=
url
,
auth
=
(
user
,
password
))
response
=
http_request
(
method
=
"GET"
,
url
=
url
,
auth
=
(
user
,
password
))
if
response
.
status_code
!=
401
:
if
response
.
status_code
!=
401
:
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
else
:
else
:
...
...
routersploit/modules/creds/http_basic_default.py
View file @
61aefbba
...
@@ -33,6 +33,7 @@ class Exploit(exploits.Exploit):
...
@@ -33,6 +33,7 @@ class Exploit(exploits.Exploit):
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass or file with default credentials (file://)'
)
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass or file with default credentials (file://)'
)
path
=
exploits
.
Option
(
'/'
,
'URL Path'
)
path
=
exploits
.
Option
(
'/'
,
'URL Path'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -85,7 +86,9 @@ class Exploit(exploits.Exploit):
...
@@ -85,7 +86,9 @@ class Exploit(exploits.Exploit):
response
=
http_request
(
method
=
"GET"
,
url
=
url
,
auth
=
(
user
,
password
))
response
=
http_request
(
method
=
"GET"
,
url
=
url
,
auth
=
(
user
,
password
))
if
response
.
status_code
!=
401
:
if
response
.
status_code
!=
401
:
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
else
:
else
:
...
...
routersploit/modules/creds/http_form_bruteforce.py
View file @
61aefbba
...
@@ -38,6 +38,7 @@ class Exploit(exploits.Exploit):
...
@@ -38,6 +38,7 @@ class Exploit(exploits.Exploit):
path
=
exploits
.
Option
(
'/login.php'
,
'URL Path'
)
path
=
exploits
.
Option
(
'/login.php'
,
'URL Path'
)
form_path
=
exploits
.
Option
(
'same'
,
'same as path or URL Form Path'
)
form_path
=
exploits
.
Option
(
'same'
,
'same as path or URL Form Path'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
data
=
""
data
=
""
...
@@ -172,7 +173,9 @@ class Exploit(exploits.Exploit):
...
@@ -172,7 +173,9 @@ class Exploit(exploits.Exploit):
l
=
len
(
r
.
text
)
l
=
len
(
r
.
text
)
if
l
<
self
.
invalid
[
"min"
]
or
l
>
self
.
invalid
[
"max"
]:
if
l
<
self
.
invalid
[
"min"
]
or
l
>
self
.
invalid
[
"max"
]:
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
else
:
else
:
...
...
routersploit/modules/creds/http_form_default.py
View file @
61aefbba
...
@@ -36,6 +36,7 @@ class Exploit(exploits.Exploit):
...
@@ -36,6 +36,7 @@ class Exploit(exploits.Exploit):
path
=
exploits
.
Option
(
'/login.php'
,
'URL Path'
)
path
=
exploits
.
Option
(
'/login.php'
,
'URL Path'
)
form_path
=
exploits
.
Option
(
'same'
,
'same as path or URL Form Path'
)
form_path
=
exploits
.
Option
(
'same'
,
'same as path or URL Form Path'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
data
=
""
data
=
""
...
@@ -165,7 +166,9 @@ class Exploit(exploits.Exploit):
...
@@ -165,7 +166,9 @@ class Exploit(exploits.Exploit):
l
=
len
(
r
.
text
)
l
=
len
(
r
.
text
)
if
l
<
self
.
invalid
[
"min"
]
or
l
>
self
.
invalid
[
"max"
]:
if
l
<
self
.
invalid
[
"min"
]
or
l
>
self
.
invalid
[
"max"
]:
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
else
:
else
:
...
...
routersploit/modules/creds/snmp_bruteforce.py
View file @
61aefbba
...
@@ -29,7 +29,7 @@ class Exploit(exploits.Exploit):
...
@@ -29,7 +29,7 @@ class Exploit(exploits.Exploit):
threads
=
exploits
.
Option
(
8
,
'Number of threads'
)
threads
=
exploits
.
Option
(
8
,
'Number of threads'
)
snmp
=
exploits
.
Option
(
wordlists
.
snmp
,
'Community string or file with community strings (file://)'
)
snmp
=
exploits
.
Option
(
wordlists
.
snmp
,
'Community string or file with community strings (file://)'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
exit_on_success
=
exploits
.
Option
(
'yes'
,
'Exit
on first valid community string'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop
on first valid community string'
)
strings
=
[]
strings
=
[]
def
run
(
self
):
def
run
(
self
):
...
@@ -76,7 +76,7 @@ class Exploit(exploits.Exploit):
...
@@ -76,7 +76,7 @@ class Exploit(exploits.Exploit):
if
errorIndication
or
errorStatus
:
if
errorIndication
or
errorStatus
:
print_error
(
"Target: {}:{} {}: Invalid community string - String: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
string
),
verbose
=
module_verbosity
)
print_error
(
"Target: {}:{} {}: Invalid community string - String: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
string
),
verbose
=
module_verbosity
)
else
:
else
:
if
boolify
(
self
.
exit
_on_success
):
if
boolify
(
self
.
stop
_on_success
):
running
.
clear
()
running
.
clear
()
print_success
(
"Target: {}:{} {}: Valid community string found - String: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
string
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Valid community string found - String: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
string
),
verbose
=
module_verbosity
)
self
.
strings
.
append
((
self
.
target
,
self
.
port
,
string
))
self
.
strings
.
append
((
self
.
target
,
self
.
port
,
string
))
...
...
routersploit/modules/creds/ssh_bruteforce.py
View file @
61aefbba
...
@@ -33,6 +33,7 @@ class Exploit(exploits.Exploit):
...
@@ -33,6 +33,7 @@ class Exploit(exploits.Exploit):
usernames
=
exploits
.
Option
(
'admin'
,
'Username or file with usernames (file://)'
)
usernames
=
exploits
.
Option
(
'admin'
,
'Username or file with usernames (file://)'
)
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -95,10 +96,10 @@ class Exploit(exploits.Exploit):
...
@@ -95,10 +96,10 @@ class Exploit(exploits.Exploit):
ssh
.
close
()
ssh
.
close
()
print_error
(
"Target: {}:{} {}: {} Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
err
,
user
,
password
),
verbose
=
module_verbosity
)
print_error
(
"Target: {}:{} {}: {} Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
err
,
user
,
password
),
verbose
=
module_verbosity
)
else
:
else
:
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {} Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {} Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
print_status
(
name
,
'thread is terminated.'
,
verbose
=
module_verbosity
)
print_status
(
name
,
'thread is terminated.'
,
verbose
=
module_verbosity
)
routersploit/modules/creds/ssh_default.py
View file @
61aefbba
...
@@ -32,6 +32,7 @@ class Exploit(exploits.Exploit):
...
@@ -32,6 +32,7 @@ class Exploit(exploits.Exploit):
threads
=
exploits
.
Option
(
8
,
'Numbers of threads'
)
threads
=
exploits
.
Option
(
8
,
'Numbers of threads'
)
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass or file with default credentials (file://)'
)
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass or file with default credentials (file://)'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -90,10 +91,10 @@ class Exploit(exploits.Exploit):
...
@@ -90,10 +91,10 @@ class Exploit(exploits.Exploit):
print_error
(
"Target: {}:{} {}: {} Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
err
,
user
,
password
),
verbose
=
module_verbosity
)
print_error
(
"Target: {}:{} {}: {} Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
err
,
user
,
password
),
verbose
=
module_verbosity
)
else
:
else
:
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {} Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {} Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
print_status
(
name
,
'process is terminated.'
,
verbose
=
module_verbosity
)
print_status
(
name
,
'process is terminated.'
,
verbose
=
module_verbosity
)
routersploit/modules/creds/telnet_bruteforce.py
View file @
61aefbba
...
@@ -32,6 +32,7 @@ class Exploit(exploits.Exploit):
...
@@ -32,6 +32,7 @@ class Exploit(exploits.Exploit):
usernames
=
exploits
.
Option
(
'admin'
,
'Username or file with usernames (file://)'
)
usernames
=
exploits
.
Option
(
'admin'
,
'Username or file with usernames (file://)'
)
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
passwords
=
exploits
.
Option
(
wordlists
.
passwords
,
'Password or file with passwords (file://)'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -100,7 +101,9 @@ class Exploit(exploits.Exploit):
...
@@ -100,7 +101,9 @@ class Exploit(exploits.Exploit):
print_error
(
"Target: {}:{} {}: Authentication Failed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_error
(
"Target: {}:{} {}: Authentication Failed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
else
:
else
:
if
any
(
map
(
lambda
x
:
x
in
res
,
[
"#"
,
"$"
,
">"
]))
or
len
(
res
)
>
500
:
# big banner e.g. mikrotik
if
any
(
map
(
lambda
x
:
x
in
res
,
[
"#"
,
"$"
,
">"
]))
or
len
(
res
)
>
500
:
# big banner e.g. mikrotik
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
tn
.
close
()
tn
.
close
()
...
...
routersploit/modules/creds/telnet_default.py
View file @
61aefbba
...
@@ -32,6 +32,7 @@ class Exploit(exploits.Exploit):
...
@@ -32,6 +32,7 @@ class Exploit(exploits.Exploit):
threads
=
exploits
.
Option
(
8
,
'Numbers of threads'
)
threads
=
exploits
.
Option
(
8
,
'Numbers of threads'
)
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass or file with default credentials (file://)'
)
defaults
=
exploits
.
Option
(
wordlists
.
defaults
,
'User:Pass or file with default credentials (file://)'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
verbosity
=
exploits
.
Option
(
'yes'
,
'Display authentication attempts'
)
stop_on_success
=
exploits
.
Option
(
'yes'
,
'Stop on first valid authentication attempt'
)
credentials
=
[]
credentials
=
[]
...
@@ -94,7 +95,9 @@ class Exploit(exploits.Exploit):
...
@@ -94,7 +95,9 @@ class Exploit(exploits.Exploit):
print_error
(
"Target: {}:{} {}: Authentication Failed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_error
(
"Target: {}:{} {}: Authentication Failed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
else
:
else
:
if
any
(
map
(
lambda
x
:
x
in
res
,
[
"#"
,
"$"
,
">"
]))
or
len
(
res
)
>
500
:
# big banner e.g. mikrotik
if
any
(
map
(
lambda
x
:
x
in
res
,
[
"#"
,
"$"
,
">"
]))
or
len
(
res
)
>
500
:
# big banner e.g. mikrotik
running
.
clear
()
if
boolify
(
self
.
stop_on_success
):
running
.
clear
()
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
print_success
(
"Target: {}:{} {}: Authentication Succeed - Username: '{}' Password: '{}'"
.
format
(
self
.
target
,
self
.
port
,
name
,
user
,
password
),
verbose
=
module_verbosity
)
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
self
.
credentials
.
append
((
self
.
target
,
self
.
port
,
user
,
password
))
tn
.
close
()
tn
.
close
()
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment