Unverified Commit b292f4e5 by Marcin Bury Committed by GitHub

Fixing wordlist creds parsing (#609)

* Fixing wordlist creds parsing

* Pinning requests package because of URL normalization in new version
parent e781f498
future future
requests requests==2.21.0
paramiko paramiko
pysnmp==4.4.6 pysnmp==4.4.6
pycryptodome pycryptodome
......
...@@ -48,7 +48,7 @@ class Exploit(HTTPClient): ...@@ -48,7 +48,7 @@ class Exploit(HTTPClient):
def target_function(self, running, creds): def target_function(self, running, creds):
while running.is_set(): while running.is_set():
try: try:
username, password = creds.next().split(":") username, password = creds.next().split(":", 1)
data = { data = {
"LOGIN_ACCOUNT": username, "LOGIN_ACCOUNT": username,
......
...@@ -48,7 +48,7 @@ class Exploit(HTTPClient): ...@@ -48,7 +48,7 @@ class Exploit(HTTPClient):
def target_function(self, running, creds): def target_function(self, running, creds):
while running.is_set(): while running.is_set():
try: try:
username, password = creds.next().split(":") username, password = creds.next().split(":", 1)
data = { data = {
"Auth.Username": username, "Auth.Username": username,
......
...@@ -49,7 +49,7 @@ class Exploit(FTPClient): ...@@ -49,7 +49,7 @@ class Exploit(FTPClient):
def target_function(self, running, data): def target_function(self, running, data):
while running.is_set(): while running.is_set():
try: try:
username, password = data.next().split(":") username, password = data.next().split(":", 1)
except StopIteration: except StopIteration:
break break
else: else:
......
...@@ -56,7 +56,7 @@ class Exploit(HTTPClient): ...@@ -56,7 +56,7 @@ class Exploit(HTTPClient):
def target_function(self, running, data): def target_function(self, running, data):
while running.is_set(): while running.is_set():
try: try:
username, password = data.next().split(":") username, password = data.next().split(":", 1)
if self.auth_type == "digest": if self.auth_type == "digest":
auth = HTTPDigestAuth(username, password) auth = HTTPDigestAuth(username, password)
......
...@@ -50,7 +50,7 @@ class Exploit(SSHClient): ...@@ -50,7 +50,7 @@ class Exploit(SSHClient):
def target_function(self, running, data): def target_function(self, running, data):
while running.is_set(): while running.is_set():
try: try:
username, password = data.next().split(":") username, password = data.next().split(":", 1)
ssh_client = self.ssh_create() ssh_client = self.ssh_create()
if ssh_client.login(username, password): if ssh_client.login(username, password):
if self.stop_on_success: if self.stop_on_success:
......
...@@ -50,7 +50,7 @@ class Exploit(TelnetClient): ...@@ -50,7 +50,7 @@ class Exploit(TelnetClient):
def target_function(self, running, data): def target_function(self, running, data):
while running.is_set(): while running.is_set():
try: try:
username, password = data.next().split(":") username, password = data.next().split(":", 1)
telnet_client = self.telnet_create() telnet_client = self.telnet_create()
if telnet_client.login(username, password, retries=3): if telnet_client.login(username, password, retries=3):
if self.stop_on_success: if self.stop_on_success:
......
...@@ -47,7 +47,7 @@ class Exploit(TCPClient): ...@@ -47,7 +47,7 @@ class Exploit(TCPClient):
def target_function(self, running, creds): def target_function(self, running, creds):
while running.is_set(): while running.is_set():
try: try:
username, password = creds.next().split(":") username, password = creds.next().split(":", 1)
tcp_client = self.tcp_create() tcp_client = self.tcp_create()
tcp_sock = tcp_client.connect() tcp_sock = tcp_client.connect()
......
...@@ -45,7 +45,7 @@ class Exploit(HTTPClient): ...@@ -45,7 +45,7 @@ class Exploit(HTTPClient):
print_error("Credentials not found") print_error("Credentials not found")
def target_function(self, data): def target_function(self, data):
username, password = data.split(":") username, password = data.split(":", 1)
def check(self): def check(self):
response = self.http_request( response = self.http_request(
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment