Skip to content

This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.

License

Notifications You must be signed in to change notification settings

KernelKraze/CVE-2024-38063_PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Warning: This vulnerability's remote code execution exploit is potentially volatile!

🚀 Windows TCP/IP Remote Code Execution Vulnerability CVE-2024-38063 Packet Sender

🎭 Are you ready to unleash chaos in a controlled environment? Look no further! This program is your ticket to sending custom-crafted IPv6 packets and exploiting the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It's like sending a digital love letter, but instead of poetry, you're sending panic! 💌💥

🚨 Important Note: This tool is for educational purposes only. Using it without permission is like borrowing your neighbor's Wi-Fi without asking - illegal, unethical, and bound to make family barbecues awkward. 😬

🎉 Features

  • Sends custom IPv6 packets faster than you can say "oops!"
  • Reads payload data from shellcode.txt (because typing it manually is so 2023)
  • Configurable network interface and target address (for when you want to be precise about your chaos)

🛠️ Prerequisites

  • Operating System: Unix-like systems (Linux). Sorry Windows users, the irony is not lost on us! 🤷‍♂️ (to add Windows programmer code)
  • Privileges: Root access required. Time to dust off that sudo password!
  • Dependencies: GCC or another C compiler. Because we're old school cool. 'scapy' python module 😎

🏗️ Setup

  1. Clone the Repository:

    git clone <repository_url>
    cd <repository_directory>

    Welcome to the danger zone! 🎵

  2. Prepare the Payload: Create shellcode.txt in the same directory. Fill it with raw binary shellcode. It's like stuffing a digital piñata! 🪅

  3. Compile the Program(There is a problem with the C language version, trying to update and modify):

    gcc -o ipv6_packet_sender ipv6_packet_sender.c -Wall

    Congratulations! You've just created a digital grenade! 💣

🎮 Usage (Python)

Command-line Arguments

sudo file [-h] [-i INTERFACE] [-a ADDRESS] [-m MAC] [-t TRIES] [-b BATCHES] [-c SHELLCODE]

It's like a game of digital hot potato! 🥔

Example

sudo <file> -i wlan0 -a ::1 -m AA:BB:CC:DD:EE:FF -t 10 -b 10 

Replace with your target's details. No, your ex's IP address doesn't count! 🙅‍♂️

Output

Watch as the program sends packets and displays a countdown timer. It's like New Year's Eve, but for hackers! 🎆

⚠️ Important Notes

  • Root Privileges: We need the big guns for this one. Sudo me, baby! 💪
  • Promiscuous Mode: Your network card is about to see things it can't unsee. 👀
  • Ethical Usage: Don't be that guy at the party. Get permission before you start poking around! 🎭

Scan local intranet devices

sudo nmap -6 -sn -T4 --min-rate=1000 [The 'ip -6 addr show' command can be used to obtain]

🔧 Troubleshooting

  • Permission Denied: Did you forget the magic word? (It's "sudo") 🧙‍♂️
  • Compilation Errors: Time to update your C game. It's not just for history books! 📚
  • Payload File Issues: Make sure shellcode.txt exists and isn't just full of your grocery list. 🛒

📜 License

This project is licensed under the MIT License. See the LICENSE file for more details. It's like a prenup for your code! 💍

🎭 Disclaimer

Remember, with great power comes great responsibility. And potential jail time if misused. So let's keep it legal and ethical, folks! 🦸‍♂️🦸‍♀️

Now go forth and exploit responsibly! May your packets fly true and your exploits be mighty! 🚀🎯

Windows Version(Under development...)

APT Install

sudo apt-get install mingw-w64

Recommended instructions for cross-compilation

i686-w64-mingw32-gcc main_WindowsVersion.c -o program.exe -lws2_32 -liphlpapi

About

This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published