71 lines
1.5 KiB
Plaintext
71 lines
1.5 KiB
Plaintext
import_code("/tool/nmap.src")
|
|
import_code("/tool/get_bank.src")
|
|
|
|
target_ip = params[0]
|
|
|
|
if not (is_valid_ip(target_ip)) then target_ip = nslookup(target_ip)
|
|
|
|
if not (is_valid_ip(target_ip)) then
|
|
exit("<color=red><b>That domain is not valid.</b></color>")
|
|
end if
|
|
|
|
router_data = nmap(target_ip)
|
|
|
|
metaxploit = include_lib("/lib/metaxploit.so")
|
|
if not metaxploit then
|
|
metaxploit = include_lib(current_path + "/metaxploit.so")
|
|
end if
|
|
if not metaxploit then exit("Error: Can't find metaxploit library in the /lib path or the current folder")
|
|
|
|
|
|
local_ip = []
|
|
|
|
for item in router_data
|
|
known = false
|
|
for ip in local_ip
|
|
if ip == item.lan_ip then
|
|
known = true
|
|
end if
|
|
end for
|
|
if not known then
|
|
local_ip.push(item.lan_ip)
|
|
end if
|
|
end for
|
|
|
|
net_session = metaxploit.net_use(target_ip,80)
|
|
|
|
lib = net_session.dump_lib
|
|
memList = metaxploit.scan(lib)
|
|
|
|
vuln = []
|
|
|
|
for address in memList
|
|
keys = metaxploit.scan_address(lib,address)
|
|
keys = metaxploit.scan_address(lib,address)
|
|
vulns = keys.split("Unsafe check: ")
|
|
keyList =[]
|
|
|
|
for string in vulns
|
|
keyList.push(string[string.indexOf("<b>")+3:string.indexOf("</b>")])
|
|
end for
|
|
|
|
for key in keyList
|
|
result = lib.overflow(address,key,local_ip[0])
|
|
if typeof(result) == "computer" or typeof(result) == "shell" then
|
|
vuln.push(address)
|
|
vuln.push(key)
|
|
break
|
|
end if
|
|
end for
|
|
end for
|
|
|
|
|
|
if not len(vuln) == 0 then
|
|
for ip in local_ip
|
|
details = get_bank(target_ip, ip , vuln[0], vuln[1])
|
|
end for
|
|
end if
|
|
|
|
|
|
|