Crashes any macOS High Sierra or iOS 11 device that is on the same WiFi network# Apple-Remote-Crash-Tool-CVE-2018-4407
Crashes any macOS High Sierra or iOS 11 device that is on the same WiFi network
Just a small Tool that uses a public 'heap buffer overflow vulnerability' (CVE-2018-4407) and makes it easier to exploit whole networks.
## Requirements
- MacOS
- Python installed
- Scapy installed (`pip install scapy`)
## Basics
Sends a malicious ICMP packet to the IP address of the target device
## Works on
- Apple iOS 11 and earlier: all devices (upgrade to iOS 12)
- Apple macOS High Sierra, up to and including 10.13.6: all devices (patched in security update 2018-001 )
- Apple macOS Sierra, up to and including 10.12.6: all devices (patched in security update 2018-005 )
- Apple OS X El Capitan and earlier: all devices
## Notes
- Port Feature is useless
- Network Scan only adds Devices from the ARP cache (devices that the mac communicated with since last reboot)
A short networkscan with any IP Scanner is recommended before pressing the button
## Features
**Extra Ping Methods:**
Sometimes Devices don't react to the malicious packet. That is fixed when it recieves a valid ICMP packet (ping) before
- Extra Ping Method 1:
Concurrently pings alls devices in the Background (only for a couple of IPs! - With more IPs, nothing works)
- Extra Ping Method 2:
Pings every Device once before sending the malicious ICMP packet (might be slow)
## Screenshot

[4.0K] /data/pocs/8105f9a656fd777bd749d9426b47e88f28be3be8
├── [4.3M] ExploitTest.app.zip
├── [1.5K] README.md
└── [479K] Screenshot.png
0 directories, 3 files