UPn代理鏈(SOCKS 代理服務器的工具)
VSole2022-12-28 13:46:11
從 UPnProxy 易受攻擊的設備中創建 SOCKS 代理服務器的工具

使用方法:
_ _ ___ ___ ___ _ _| | | | _ _ _ | _ _ _ _____ ___ _ / *| |* __ *(*) _| |_| | _/ ' | */ '*/ _ \ \ / || | (__| ' / _` | | ' \ */|*| ||||*| |*| ***/***, |***|*****||***,*|*|*||_| |__/ Author: Valtteri Lehtinen [valtteri@shufflingbytes.com](mailto:valtteri@shufflingbytes.com) Writeup: [https://shufflingbytes.com/posts/upnproxychain-a-tool-to-exploit-devices-vulnerable-to-upnproxy/](https://shufflingbytes.com/posts/upnproxychain-a-tool-to-exploit-devices-vulnerable-to-upnproxy/)usage: [upnproxychain.py](http://upnproxychain.py) [-h] [-p PORT] [-l LISTENADDRESS] [-c] [-v] host [host ...]A SOCKS proxy server that forwards traffic through a chain of exposed WANIP- or WANPPPConnection UPnP servicespositional arguments: host hosts to use as proxy chain links in orderoptional arguments: -h, --help show this help message and exit -p PORT, --port PORT port for SOCKS proxy to listen on -l LISTENADDRESS, --listenaddress LISTENADDRESS address for SOCKS proxy to listen on -c, --check only check for UPnProxy vulnerability -v, --verbose increase output verbosity
通過單主機代理:
# start proxy./upnproxychain.py # use the proxy to curl example.comcurl socks5h://localhost:1080 http://example.com
通過多個主機代理:
# start proxy ./upnproxychain.py <IP1> <IP2> <IP3> <IP4> <IP5> # use the proxy to curl example.com curl socks5h://localhost:1080 http://example.com
檢查主機是否存在漏洞:
./upnproxychain.py -v -c <IP>
VSole
網絡安全專家