POC详情: 5148da6cda79e6b139827dcecc1b333e281e135f

来源
关联漏洞
标题: Microsoft Windows TCP/IP component 数字错误漏洞 (CVE-2024-38063)
描述:Microsoft Windows tcp/ip是美国微软(Microsoft)公司的一个 Windows 的 Tcp/Ip 支持服务。 Microsoft Windows TCP/IP component存在数字错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 f
描述
This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.
介绍
# 🚀 Windows TCP/IP Remote Code Execution Vulnerability CVE-2024-38063 Packet Sender

🎭 Are you ready to unleash chaos in a controlled environment? Look no further! This program is your ticket to sending custom-crafted IPv6 packets and exploiting the [Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063)](https://nvd.nist.gov/vuln/detail/CVE-2024-38063). It's like sending a digital love letter, but instead of poetry, you're sending panic! 💌💥

**🚨 Important Note:** This tool is for educational purposes only. Using it without permission is like borrowing your neighbor's Wi-Fi without asking - illegal, unethical, and bound to make family barbecues awkward. 😬

## 🎉 Features

- Sends custom IPv6 packets faster than you can say "oops!"
- Reads payload data from `shellcode.txt` (because typing it manually is so 2023)
- Configurable network interface and target address (for when you want to be precise about your chaos)

## 🛠️ Prerequisites

- **Operating System**: Unix-like systems (Linux). Sorry Windows users, the irony is not lost on us! 🤷‍♂️
- **Privileges**: Root access required. Time to dust off that sudo password!
- **Dependencies**: GCC or another C compiler. Because we're old school cool. 😎

## 🏗️ Setup

1. **Clone the Repository**:
   ```bash
   git clone <repository_url>
   cd <repository_directory>
   ```
   Welcome to the danger zone! 🎵

2. **Prepare the Payload**:
   Create `shellcode.txt` in the same directory. Fill it with raw binary shellcode. It's like stuffing a digital piñata! 🪅

3. **Compile the Program**:
   ```bash
   gcc -o ipv6_packet_sender ipv6_packet_sender.c -Wall
   ```
   Congratulations! You've just created a digital grenade! 💣

## 🎮 Usage

### Command-line Arguments

```bash
sudo ./ipv6_packet_sender <interface> <ipv6_address> <mac_address>
```
It's like a game of digital hot potato! 🥔

### Interactive Mode

```bash
sudo ./ipv6_packet_sender
```
For those who like to take things slow and steady. We'll hold your hand through this digital adventure! 🖐️

### Example

```bash
sudo ./ipv6_packet_sender wlo1 fe80::1ff:fe23:4567:890a 00:1a:2b:3c:4d:5e
```
Replace with your target's details. No, your ex's IP address doesn't count! 🙅‍♂️

### Output

Watch as the program sends packets and displays a countdown timer. It's like New Year's Eve, but for hackers! 🎆

## ⚠️ Important Notes

- **Root Privileges**: We need the big guns for this one. Sudo me, baby! 💪
- **Promiscuous Mode**: Your network card is about to see things it can't unsee. 👀
- **Ethical Usage**: Don't be that guy at the party. Get permission before you start poking around! 🎭

## 🔧 Troubleshooting

- **Permission Denied**: Did you forget the magic word? (It's "sudo") 🧙‍♂️
- **Compilation Errors**: Time to update your C game. It's not just for history books! 📚
- **Payload File Issues**: Make sure `shellcode.txt` exists and isn't just full of your grocery list. 🛒

## 📜 License

This project is licensed under the MIT License. See the LICENSE file for more details. It's like a prenup for your code! 💍

## 🎭 Disclaimer

Remember, with great power comes great responsibility. And potential jail time if misused. So let's keep it legal and ethical, folks! 🦸‍♂️🦸‍♀️

Now go forth and exploit responsibly! May your packets fly true and your exploits be mighty! 🚀🎯
文件快照

[4.0K] /data/pocs/5148da6cda79e6b139827dcecc1b333e281e135f ├── [1.0K] LICENSE ├── [7.0K] main.c ├── [3.4K] README.md └── [ 23] shellcode.txt 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。