def attackIP(self, ip, max, mode): ut = Utils() info = self.myinfo() info = json.loads(info) uhash = info['uhash'] if mode == "Secure": time.sleep(1) temp = ut.requestStringNoWait( "user::::pass::::uhash::::target", self.api.getUsername() + "::::" + self.api.getPassword() + "::::" + str(uhash) + "::::" + ip, "vh_loadRemoteData.php") jsons = json.loads(temp) o = OCR() imgs = o.getSolution(str(temp)) if imgs != None: try: user = jsons['username'] winchance = jsons['winchance'] except TypeError: return False try: if winchance: fwlevel = jsons['fw'] avlevel = jsons['av'] spamlevel = jsons['spam'] sdklevel = jsons['sdk'] ipsplevel = jsons['sdk'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] winlo = jsons['winelo'] winchance = jsons['winchance'] spywarelevel = jsons['spyware'] else: avlevel = "????" winchance = 0 print "no scan username" return False except TypeError: fwlevel = jsons['fw'] avlevel = jsons['av'] spamlevel = jsons['spam'] sdklevel = jsons['sdk'] ipsplevel = jsons['sdk'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] winlo = jsons['winelo'] winchance = jsons['winchance'] spywarelevel = jsons['spyware'] if type(winchance) == "str": if "?" in winchance: winchance = 0 print "no chance" return False if mode == "Potator": if winchance > 20: password = self.enterPassword(imgs, ip, uhash) jsons = json.loads(password) if password: try: if not "?" in str(money) and str( jsons['result']) == 0: print "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel ) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + "{:11,}".format( int(money) ) + "\n YourWinChance: " + str( winchance) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" return True else: print "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + str( money ) + "\n YourWinChance: " + str( winchance ) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" return True except KeyError: print "Bad attack" return False except ValueError as e: print "error" return True else: print "Password Wrong" return False else: print "winchance is poor: " + str(winchance) return False if not "?" in str(avlevel) and not "?" in str( winchance) and mode == "Secure": if int(avlevel) < max and int(winchance) > 75 and str( anonymous) == "YES": time.sleep(random.randint(2, 3)) password = self.enterPassword(imgs, ip, uhash) jsons = json.loads(password) if password: try: if not "?" in str(money) and str( jsons['result']) == 0: print "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel ) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + "{:11,}".format( int(money) ) + "\n YourWinChance: " + str( winchance) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" return True else: print "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + str( money ) + "\n YourWinChance: " + str( winchance ) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" return True except KeyError: print "Bad attack" return False else: print "Password Wrong" return False else: #print "\n" if int(avlevel) > max: print "Antivir to high " + str(avlevel) #print "passed" return False if int(winchance) < 75: print "winchance is poor: " + str(winchance) #print "passed" return False if str(anonymous) == "NO": print "No Anonymous need" #print "passed" return False else: if len(avlevel) == 4: print "Cant load User" return False else: print "Scan to low" return False else: print "Password Error" return False
def attackIP(self, ip, max, mode): ut = Utils() info = self.myinfo() info = json.loads(info) uhash = info['uhash'] temp = ut.requestString( "user::::pass::::uhash::::target", self.api.getUsername() + "::::" + self.api.getPassword() + "::::" + uhash + "::::" + ip, "vh_loadRemoteData.php") jsons = json.loads(temp) o = OCR() imgs = o.getSolution(str(temp)) if imgs is not None: try: # user = jsons['username'] winchance = jsons['winchance'] except TypeError: return False try: if "?" not in str(winchance): fwlevel = jsons['fw'] avlevel = jsons['av'] # spamlevel = jsons['spam'] sdklevel = jsons['sdk'] # ipsplevel = jsons['sdk'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] # winlo = jsons['winelo'] winchance = jsons['winchance'] # spywarelevel = jsons['spyware'] else: avlevel = "????" winchance = 0 print "no scan username" return False except TypeError: fwlevel = jsons['fw'] avlevel = jsons['av'] # spamlevel = jsons['spam'] sdklevel = jsons['sdk'] # ipsplevel = jsons['sdk'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] # winlo = jsons['winelo'] winchance = jsons['winchance'] # spywarelevel = jsons['spyware'] if type(winchance) == "int": if "?" in winchance: winchance = 0 print "no chance" return False if mode == "Potator": if winchance > 49: password = self.enterPassword(imgs, ip, uhash) jsons = json.loads(password) if password: try: if "?" not in str(money) and str( jsons['result']) == 0: print( "\n[TargetIP: {}]\n\nMade {:11,} and {:2d} Rep.\n Antivirus: {} Firewall: {} Sdk: {} TotalMoney: {:11,}\n YourWinChance: {} Anonymous: {} username: {} saving: {}" .format(ip, jsons['amount'], jsons['eloch'], avlevel, fwlevel, sdklevel, money, winchance, anonymous, username, saving)) return True else: print( "\n[TargetIP: {}]\n\nMade {:11,} and {:2d} Rep.\n Antivirus: {} Firewall: {} Sdk: {} TotalMoney: {:11,}\n YourWinChance: {} Anonymous: {} username: {} saving: {}" .format(ip, jsons['amount'], jsons['eloch'], avlevel, fwlevel, sdklevel, money, winchance, anonymous, username, saving)) return True except KeyError: print "Bad attack" return False except ValueError as e: print "Error: " + e return True else: print "Password Wrong" return False else: print "winchance is poor: " + str(winchance) if "?" not in str(avlevel) and mode == "Secure": if int(avlevel) < max and int(winchance) > 75 and str( anonymous) == "YES": password = self.enterPassword(imgs, ip, uhash) jsons = json.loads(password) if password: try: if "?" not in str(money) and str( jsons['result']) == 0: print( "\n[TargetIP: {}]\n\nMade {:11,} and {:2d} Rep.\n Antivirus: {} Firewall: {} Sdk: {} TotalMoney: {:11,}\n YourWinChance: {} Anonymous: {} username: {} saving: {}" .format(ip, jsons['amount'], jsons['eloch'], avlevel, fwlevel, sdklevel, money, winchance, anonymous, username, saving)) return True else: print( "\n[TargetIP: {}]\n\nMade {:11,} and {:2d} Rep.\n Antivirus: {} Firewall: {} Sdk: {} TotalMoney: {:11,}\n YourWinChance: {} Anonymous: {} username: {} saving: {}" .format(ip, jsons['amount'], jsons['eloch'], avlevel, fwlevel, sdklevel, money, winchance, anonymous, username, saving)) except KeyError: print "Bad attack" return False else: print "Password Wrong" return False else: # print "\n" if int(avlevel) > max: print "Antivir to high " + str(avlevel) # print "passed" return False if int(winchance) < 75: print "winchance is poor: " + str(winchance) # print "passed" return False if str(anonymous) == "NO": print "No Anonymous needed" # print "passed" return False else: if len(avlevel) == 4: print "Cant load User" return False else: print "Scan to low" return False else: print "Password Error" return False
def attackIP(self, ip, max, mode): info = self.myinfo() info = json.loads(info) uhash = info['uhash'] if mode == "Secure": time.sleep(1) temp = self.ut.requestString( "user::::pass::::uhash::::target", self.username + "::::" + self.password + "::::" + str(uhash) + "::::" + ip, "vh_loadRemoteData.php") jsons = json.loads(temp) o = OCR() imgs = o.getSolution(str(temp)) if imgs != None: try: user = jsons['username'] winchance = jsons['winchance'] except TypeError: return False try: if winchance: fwlevel = jsons['fw'] avlevel = jsons['av'] spamlevel = jsons['spam'] sdklevel = jsons['sdk'] ipsplevel = jsons['ipsp'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] winlo = jsons['winelo'] winchance = jsons['winchance'] spywarelevel = jsons['spyware'] else: avlevel = "????" winchance = 0 print "no scan username" return False except TypeError: fwlevel = jsons['fw'] avlevel = jsons['av'] spamlevel = jsons['spam'] sdklevel = jsons['sdk'] ipsplevel = jsons['ipsp'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] winlo = jsons['winelo'] winchance = jsons['winchance'] spywarelevel = jsons['spyware'] if type(winchance) == "str": if "?" in winchance: winchance = 0 print "no chance" return False if mode == "Potator": if winchance > 20: password = self.enterPassword(imgs, ip, uhash) jsons = json.loads(password) if password: try: if not "?" in str(money) and str( jsons['result']) == 0: print "\nYour Money: " + "{:11,}".format( int(jsons['newmoney']) ) + "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel ) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + "{:11,}".format( int(money) ) + "\n YourWinChance: " + str( winchance) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" try: ip = re.search( r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}', username).group() except AttributeError: pass # print ip, type(ip), username, type(username) s = requests.session() if ip == username: print "send to database" s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() else: print "send to database" s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&USR="******"&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() else: print "\nYour Money: " + "{:11,}".format( int(jsons['newmoney']) ) + "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + str( money ) + "\n YourWinChance: " + str( winchance ) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" try: ip = re.search( r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}', username).group() except AttributeError: pass # print ip, type(ip), username, type(username) s = requests.session() if ip == username: print "send to database" s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() else: print "send to database" s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&USR="******"&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() return True except KeyError: print "Bad attack" return False except ValueError as e: print "error" return True else: print "Password Wrong" return False else: print "winchance is poor: " + str(winchance) return False if not "?" in str(avlevel) and not "?" in str( winchance) and mode == "Secure": if int(avlevel) < max and int(winchance) > 75 and str( anonymous) == "YES": time.sleep(random.randint(2, 3)) password = self.enterPassword(imgs, ip, uhash) jsons = json.loads(password) if password: try: if not "?" in str(money) and str( jsons['result']) == 0: print "\nYour Money: " + "{:11,}".format( int(jsons['newmoney']) ) + "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel ) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + "{:11,}".format( int(money) ) + "\n YourWinChance: " + str( winchance) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" try: ip = re.search( r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}', username).group() except AttributeError: pass # print ip, type(ip), username, type(username) s = requests.session() if ip == username: print "send to database" print s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() else: print "send to database" print s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&USR="******"&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() return True else: print "\nYour Money: " + "{:11,}".format( int(jsons['newmoney']) ) + "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + str( money ) + "\n YourWinChance: " + str( winchance ) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) + "\n" try: ip = re.search( r'\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}', username).group() except AttributeError: pass # print ip, type(ip), username, type(username) s = requests.session() if ip == username: print "send to database" s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() else: print "send to database" s.get( "https://vhack.olympiccode.ga/database/submit.php?IP=" + str(ip) + "&USR="******"&MONEY=" + str(money) + "&IPSP=" + str(ipsplevel) + "&FW=" + str(fwlevel) + "&AV=" + str(avlevel)) s.close() return True except KeyError: print "Bad attack" return False else: print "Password Incorrect" return False else: # print "\n" if int(avlevel) > max: print "Antivir to high " + str(avlevel) # print "passed" return False if int(winchance) < 75: print "winchance is poor: " + str(winchance) # print "passed" return False if str(anonymous) == "NO": print "Anonymous not needed" # print "passed" return False else: if len(avlevel) == 4: print "Cant load User" return False else: print "Scan to low" return False else: print "Password Error" return False
def attackIP(self, ip, max): ut = Utils() info = self.myinfo() info = json.loads(info) uhash = info['uhash'] temp = ut.requestString( "user::::pass::::uhash::::target", self.api.getUsername() + "::::" + self.api.getPassword() + "::::" + uhash + "::::" + ip, "vh_loadRemoteData.php") jsons = json.loads(temp) s = requests.Session() datasubmit = { 'uName': 'username', 'pWord': 'password', } r = s.post('https://www.echoofamarok.com/RedX/assets/php/login', data=datasubmit) try: pat = re.compile("^\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}$") test = pat.match(jsons['username']) if test: try: datasubmit = { 'nIP': jsons['ipaddress'], 'nName': '', 'nSpam': jsons['spam'], 'nIPSpoof': jsons['spam'], 'nFirewall': jsons['fw'], 'nAntivirus': jsons['av'], 'nSDK': jsons['sdk'], 'nSpyware': jsons['spyware'], 'nBalance': jsons['money'], 'nAddedBy': 'ULTIMATE' } except TypeError: print "DATA FALSE" return False else: try: datasubmit = { 'nIP': jsons['ipaddress'], 'nName': jsons['username'], 'nSpam': jsons['spam'], 'nIPSpoof': jsons['spam'], 'nFirewall': jsons['fw'], 'nAntivirus': jsons['av'], 'nSDK': jsons['sdk'], 'nSpyware': jsons['spyware'], 'nBalance': jsons['money'], 'nAddedBy': 'ULTIMATE' } except TypeError: print "DATA FALSE" return False except TypeError: try: datasubmit = { 'nIP': jsons['ipaddress'], 'nName': '', 'nSpam': jsons['spam'], 'nIPSpoof': jsons['spam'], 'nFirewall': jsons['fw'], 'nAntivirus': jsons['av'], 'nSDK': jsons['sdk'], 'nSpyware': jsons['spyware'], 'nBalance': jsons['money'], 'nAddedBy': 'ULTIMATE' } except TypeError: print "DATA FALSE" return False r = s.post('https://www.echoofamarok.com/RedX/assets/php/AddEntry', data=datasubmit) print "\nAdd to database " + str(jsons['ipaddress']) r.connection.close() o = OCR() imgs = o.getSolution(str(temp)) if imgs != None: user = jsons['username'] winchance = jsons['winchance'] try: if not "?" in str(winchance): fwlevel = jsons['fw'] avlevel = jsons['av'] spamlevel = jsons['spam'] sdklevel = jsons['sdk'] ipsplevel = jsons['sdk'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] winlo = jsons['winelo'] winchance = jsons['winchance'] spywarelevel = jsons['spyware'] else: avlevel = "????" winchance = 0 print "no scan username" return False except TypeError: fwlevel = jsons['fw'] avlevel = jsons['av'] spamlevel = jsons['spam'] sdklevel = jsons['sdk'] ipsplevel = jsons['sdk'] money = jsons['money'] saving = jsons['savings'] anonymous = jsons['anonymous'] username = jsons['username'] winlo = jsons['winelo'] winchance = jsons['winchance'] spywarelevel = jsons['spyware'] if type(winchance) == "int": if "?" in winchance: winchance = 0 print "no chance" return False if not "?" in str(avlevel): if int(avlevel) < max and int(winchance) > 75 and str( anonymous) == "YES": password = self.enterPassword(imgs, ip, uhash) jsons = json.loads(password) if password: try: if not "?" in str(money) and str( jsons['result']) == 0: print "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel ) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + "{:11,}".format( int(money) ) + "\n YourWinChance: " + str( winchance) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) return True else: print "\n[TargetIP: " + str( ip) + "]\n\nMade " + "{:11,}".format( int(jsons['amount']) ) + " and " + "{:2d}".format( int(jsons['eloch']) ) + " Rep." + "\n Antivirus: " + str( avlevel) + " Firewall: " + str( fwlevel ) + " Sdk: " + str( sdklevel ) + " TotalMoney: " + "{:11,}".format( int(money) ) + "\n YourWinChance: " + str( winchance) + " Anonymous: " + str( anonymous ) + " username: "******" saving: " + str( saving) except KeyError: print "Bad attack" return False else: print "Password Wrong" return False else: #print "\n" if int(avlevel) > max: print "Antivir to high " + str(avlevel) #print "passed" return False if int(winchance) < 75: print "winchance is poor: " + str(winchance) #print "passed" return False if str(anonymous) == "NO": print "No Anonymous need" #print "passed" return False else: print avlevel if len(avlevel) == 4: print avlevel print "Cant load User" return False else: print "Scan to low" return False else: print "Password Error" return False