Path: blob/master/modules/exploits/local_host/window_mail_client_dos/config.yaml
1154 views
#1# Copyright (c) 2006-2025 Wade Alcorn - [email protected]2# Browser Exploitation Framework (BeEF) - https://beefproject.com3# See the file 'doc/COPYING' for copying permission4#5beef:6module:7windows_mail_client_dos:8enable: true9category: ["Exploits", "Local Host"]10name: "Windows Mail Client DoS"11description: "This module exploits an unhandled exception in Windows Mail to crash the client remotely.<br /><br />Windows Mail is launched and then crashed if it is not already open. It comes installed by default on Windows Vista (but it's also vulnerable on Windows 7 SP2).<br /><br />The protocol handler used will be: nntp."12authors: ["bcoles"]13target:14user_notify: ["FF"]15not_working: ["All"]161718