hackedteam/vector-exploit

View on GitHub
src/exploit_vps/genera_hash_scout/genera_hash_vps_exploit.py

Summary

Maintainability
A
0 mins
Test Coverage
import sha

# 82b2fd999784
# ef989a998689
# 85cdb6b3f582
# c6c1cab58faf
# f2fff2e1c2d0

#a38cafacb6ca == Toaster
#cdf09abec1ef == iFrmewrk
#ca929db697c8 == btplayerctrl
#8be9e6d89cac == rusb3mon
#89f1e9e1b699 == HydraDM
#81f1dfc4e5fa == SynTPEnh


names = ( 'Toaster', 'iFrmewrk', 'btplayerctrl', 'rusb3mon', 'HydraDM', 'SynTPEnh' )
version = "7\x0a"

for name in names:
    hash_obj = sha.new(version + name)
    my_hash = hash_obj.hexdigest()
    hash_array = [my_hash[i:i+2] for i in range(0, len(my_hash), 2)]
    
    string = ""
    for h in hash_array:
        if int(h, 16) > 128:
            string += h
    string = string[:12];
    
    print "'" + string + "' => '"+name+".exe'";