import_code("/tool/nmap.src") import_code("/tool/get_bank.src") target_ip = params[0] if not (is_valid_ip(target_ip)) then target_ip = nslookup(target_ip) if not (is_valid_ip(target_ip)) then exit("That domain is not valid.") end if router_data = nmap(target_ip) metaxploit = include_lib("/lib/metaxploit.so") if not metaxploit then metaxploit = include_lib(current_path + "/metaxploit.so") end if if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder") local_ip = [] for item in router_data known = false for ip in local_ip if ip == item.lan_ip then known = true end if end for if not known then local_ip.push(item.lan_ip) end if end for net_session = metaxploit.net_use(target_ip,80) lib = net_session.dump_lib memList = metaxploit.scan(lib) vuln = [] for address in memList keys = metaxploit.scan_address(lib,address) keys = metaxploit.scan_address(lib,address) vulns = keys.split("Unsafe check: ") keyList =[] for string in vulns keyList.push(string[string.indexOf("")+3:string.indexOf("")]) end for for key in keyList result = lib.overflow(address,key,local_ip[0]) if typeof(result) == "computer" or typeof(result) == "shell" then vuln.push(address) vuln.push(key) break end if end for end for if not len(vuln) == 0 then for ip in local_ip details = get_bank(target_ip, ip , vuln[0], vuln[1]) end for end if