Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-2169 PoC — User Datagram Protocol 安全漏洞

Source
Associated Vulnerability
Title:User Datagram Protocol 安全漏洞 (CVE-2024-2169)
Description:User Datagram Protocol是用户数据报协议(UDP)。 User Datagram Protocol (UDP)存在安全漏洞,该漏洞源于容易受到网络循环的影响,攻击者利用该漏洞可以使用恶意制作的数据包来攻击设备,从而导致拒绝服务。
Description
This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.
Readme
# G3-Loop-DoS
Python Script for Automated Vulnerability Detection of Loop DoS and CVE-2024-2169

Description:

This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.

Key Features:

Efficient Scanning: Scans a range of IP addresses and ports associated with vulnerable protocols.
Multi-protocol Support: Supports protocols like NTP, DNS, and SNMP, with options for customization.
Custom Payload: Allows users to define custom payloads for testing specific protocol vulnerabilities.
Adjustable Parameters: Lets users adjust response timeout and number of threads to optimize the scan.
Detailed Results: Provides clear information about the response of each system tested.
Ethical Usage:

It is crucial to use this tool responsibly and ethically. It should never be used on targets without proper authorization. Its use is recommended only in controlled environments, such as for educational activities or authorized security testing.

How to Use:

Using the script is straightforward. Here's a basic example:

Python
python cve_scanner.py

# Set target as the 192.168.1.0/24 network
(G3-Loop-DoS) set_target 192.168.1.0/24

# Start the scan
(G3-Loop-DoS) scan
File Snapshot

[4.0K] /data/pocs/9ff511d139e1bee63b4f4db637b0fe0763e4d38e ├── [2.9K] G3-Loop-DoS-EN.py ├── [5.8K] G3-Loop-DoS.py └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.