Osep Resources
Osep Resources
/usr/bin/python3
import argparse
import requests
import sys
def header(self):
print('\n >> Advanced Web Attacks and Exploitation')
print(' >> Python Skeleton Script\n')
def main():
# Parse Arguments
parser = argparse.ArgumentParser()
parser.add_argument('-t', '--target', help='Target ip address or hostname',
required=True)
parser.add_argument('-li', '--ipaddress', help='Listening IP address for
reverse shell', required=False)
parser.add_argument('-lp', '--port', help='Listening port for reverse shell',
required=False)
parser.add_argument('-u', '--username', help='Username to target',
required=False)
parser.add_argument('-p', '--password', help='Password value to set',
required=False)
parser.add_argument('-d', '--debug', help='Instruct our web requests to use our
defined proxy', action='store_true', required=False)
args = parser.parse_args()
# Banner
output.header()
# Debugging
if args.debug:
for k,v in sorted(vars(args).items()):
if k == 'debug':
output.warning(f"Debugging Mode: {v}")
else:
output.info(f"{k}: {v}")
# Authentication Bypass
sendGet(f"http://{args.target}", args.debug)
# Try Harder
output.success('Exploit has been successfully executed. :eyes: on your
listener!')
if __name__ == '__main__':
main()