Skip to content

evank800/Windows_DoS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

24 Commits
 
 
 
 

Repository files navigation

This is a PoC(Proof of Concpet) for the Windows vunerability CVE-2024-38063

LAYER 2 vulnerability includes the Windows' inability to process incoming IPv6 Packets properly and graciously, when being sent custom packets (here via Scpay) with the extraheaderextension with an improper padding, causing an integer underflow.

You can find their original code under https://www.exploit-db.com/exploits/52075 The codes for the actual exploitation is written by Photubias from Exploitdb.

This project is a tweaking of/expansion to the orignal codes for better performance, as well as additional functionalities such as searching through the local link(Layer 2) to find vulnerable targets, better address parsing schemes, letting the user choose the network interface, as well as automating the exploitation.

CAUTION: DO NOT RUN THIS CODE IN AN UNSUPERVISED ENVIRONMENT.

Demo

This is a demo of the code on the windows 10 virtual machine running on linux

I have chosen the virtual network interface vnet0 as interface that will be sending the custom packets. After exactly 60 seconds, the windows machine crashes, causing BSoD(Blue Screen of Death)

video-output-8064C322-4A9A-445F-8ABC-381A33C41E61.mp4

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages