https://github.com/ValtteriL/UPnProxyChain
从 UPnProxy 易受攻击的设备中创建 SOCKS 代理服务器的工具
使用方法:
_ _ ___ ___ ___ _ _| | | | _ _ _ | _ _ _ _____ ___ _ / *| |* __ *(*) _| |_| | _/ ' | */ '*/ _ \ \ / || | (__| ' / _` | | ' \ */|*| ||||*| |*| ***/***, |***|*****||***,*|*|*||_| |__/ Author: Valtteri Lehtinen [[email protected]](mailto:[email protected]) Writeup: [https://shufflingbytes.com/posts/upnproxychain-a-tool-to-exploit-devices-vulnerable-to-upnproxy/](https://shufflingbytes.com/posts/upnproxychain-a-tool-to-exploit-devices-vulnerable-to-upnproxy/)usage: [upnproxychain.py](http://upnproxychain.py) [-h] [-p PORT] [-l LISTENADDRESS] [-c] [-v] host [host ...]A SOCKS proxy server that forwards traffic through a chain of exposed WANIP- or WANPPPConnection UPnP servicespositional arguments: host hosts to use as proxy chain links in orderoptional arguments: -h, --help show this help message and exit -p PORT, --port PORT port for SOCKS proxy to listen on -l LISTENADDRESS, --listenaddress LISTENADDRESS address for SOCKS proxy to listen on -c, --check only check for UPnProxy vulnerability -v, --verbose increase output verbosity
# start proxy./upnproxychain.py <IP># use the proxy to curl example.comcurl socks5h://localhost:1080 http://example.com
# start proxy
./upnproxychain.py <IP1> <IP2> <IP3> <IP4> <IP5>
# use the proxy to curl example.com
curl socks5h://localhost:1080 http://example.com
./upnproxychain.py -v -c <IP>
侵权请私聊公众号删文
热文推荐