Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
d1430bc0
Unverified
Commit
d1430bc0
authored
6 years ago
by
Marcin Bury
Committed by
GitHub
6 years ago
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Adding tests for Billion 5200W RCE module (#527)
* Adding tests for Billion 5200W RCE module * Trigger Travis
parent
dd9b4f20
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
23 additions
and
0 deletions
+23
-0
test_billion_5200w_rce.py
tests/exploits/routers/billion/test_billion_5200w_rce.py
+23
-0
No files found.
tests/exploits/routers/billion/test_billion_5200w_rce.py
0 → 100644
View file @
d1430bc0
from
routersploit.modules.exploits.routers.billion.billion_5200w_rce
import
Exploit
def
test_check_success
(
target
):
""" Test scenario - successful check """
route_mock
=
target
.
get_route_mock
(
"/cgi-bin/adv_remotelog.asp"
,
methods
=
[
"POST"
])
route_mock
.
return_value
=
(
"TEST"
)
exploit
=
Exploit
()
assert
exploit
.
target
==
""
assert
exploit
.
port
==
80
exploit
.
target
=
target
.
host
exploit
.
port
=
target
.
port
assert
exploit
.
check
()
is
None
assert
exploit
.
run
()
is
None
assert
exploit
.
execute1
(
"utelnetd -l /bin/sh -p 9998 -d"
)
assert
exploit
.
execute2
(
"utelnetd -l /bin/sh -p 9998 -d"
)
This diff is collapsed.
Click to expand it.
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment