关联漏洞
标题:
Microsoft Windows TCP/IP component 数字错误漏洞
(CVE-2024-38063)
描述:Microsoft Windows tcp/ip是美国微软(Microsoft)公司的一个 Windows 的 Tcp/Ip 支持服务。 Microsoft Windows TCP/IP component存在数字错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 f
描述
This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.
介绍
# 🚀 Windows TCP/IP Remote Code Execution Vulnerability CVE-2024-38063 Packet Sender
🎭 Are you ready to unleash chaos in a controlled environment? Look no further! This program is your ticket to sending custom-crafted IPv6 packets and exploiting the [Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063)](https://nvd.nist.gov/vuln/detail/CVE-2024-38063). It's like sending a digital love letter, but instead of poetry, you're sending panic! 💌💥
**🚨 Important Note:** This tool is for educational purposes only. Using it without permission is like borrowing your neighbor's Wi-Fi without asking - illegal, unethical, and bound to make family barbecues awkward. 😬
## 🎉 Features
- Sends custom IPv6 packets faster than you can say "oops!"
- Reads payload data from `shellcode.txt` (because typing it manually is so 2023)
- Configurable network interface and target address (for when you want to be precise about your chaos)
## 🛠️ Prerequisites
- **Operating System**: Unix-like systems (Linux). Sorry Windows users, the irony is not lost on us! 🤷♂️
- **Privileges**: Root access required. Time to dust off that sudo password!
- **Dependencies**: GCC or another C compiler. Because we're old school cool. 😎
## 🏗️ Setup
1. **Clone the Repository**:
```bash
git clone <repository_url>
cd <repository_directory>
```
Welcome to the danger zone! 🎵
2. **Prepare the Payload**:
Create `shellcode.txt` in the same directory. Fill it with raw binary shellcode. It's like stuffing a digital piñata! 🪅
3. **Compile the Program**:
```bash
gcc -o ipv6_packet_sender ipv6_packet_sender.c -Wall
```
Congratulations! You've just created a digital grenade! 💣
## 🎮 Usage
### Command-line Arguments
```bash
sudo ./ipv6_packet_sender <interface> <ipv6_address> <mac_address>
```
It's like a game of digital hot potato! 🥔
### Interactive Mode
```bash
sudo ./ipv6_packet_sender
```
For those who like to take things slow and steady. We'll hold your hand through this digital adventure! 🖐️
### Example
```bash
sudo ./ipv6_packet_sender wlo1 fe80::1ff:fe23:4567:890a 00:1a:2b:3c:4d:5e
```
Replace with your target's details. No, your ex's IP address doesn't count! 🙅♂️
### Output
Watch as the program sends packets and displays a countdown timer. It's like New Year's Eve, but for hackers! 🎆
## ⚠️ Important Notes
- **Root Privileges**: We need the big guns for this one. Sudo me, baby! 💪
- **Promiscuous Mode**: Your network card is about to see things it can't unsee. 👀
- **Ethical Usage**: Don't be that guy at the party. Get permission before you start poking around! 🎭
## 🔧 Troubleshooting
- **Permission Denied**: Did you forget the magic word? (It's "sudo") 🧙♂️
- **Compilation Errors**: Time to update your C game. It's not just for history books! 📚
- **Payload File Issues**: Make sure `shellcode.txt` exists and isn't just full of your grocery list. 🛒
## 📜 License
This project is licensed under the MIT License. See the LICENSE file for more details. It's like a prenup for your code! 💍
## 🎭 Disclaimer
Remember, with great power comes great responsibility. And potential jail time if misused. So let's keep it legal and ethical, folks! 🦸♂️🦸♀️
Now go forth and exploit responsibly! May your packets fly true and your exploits be mighty! 🚀🎯
文件快照
[4.0K] /data/pocs/5148da6cda79e6b139827dcecc1b333e281e135f
├── [1.0K] LICENSE
├── [7.0K] main.c
├── [3.4K] README.md
└── [ 23] shellcode.txt
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。