Warning: This vulnerability's remote code execution exploit is potentially volatile!
🎭 Are you ready to unleash chaos in a controlled environment? Look no further! This program is your ticket to sending custom-crafted IPv6 packets and exploiting the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It's like sending a digital love letter, but instead of poetry, you're sending panic! 💌💥
🚨 Important Note: This tool is for educational purposes only. Using it without permission is like borrowing your neighbor's Wi-Fi without asking - illegal, unethical, and bound to make family barbecues awkward. 😬
- Sends custom IPv6 packets faster than you can say "oops!"
- Reads payload data from
shellcode.txt
(because typing it manually is so 2023) - Configurable network interface and target address (for when you want to be precise about your chaos)
- Operating System: Unix-like systems (Linux). Sorry Windows users, the irony is not lost on us! 🤷♂️ (to add Windows programmer code)
- Privileges: Root access required. Time to dust off that sudo password!
- Dependencies: GCC or another C compiler. Because we're old school cool. 'scapy' python module 😎
-
Clone the Repository:
git clone <repository_url> cd <repository_directory>
Welcome to the danger zone! 🎵
-
Prepare the Payload: Create
shellcode.txt
in the same directory. Fill it with raw binary shellcode. It's like stuffing a digital piñata! 🪅 -
Compile the Program(There is a problem with the C language version, trying to update and modify):
gcc -o ipv6_packet_sender ipv6_packet_sender.c -Wall
Congratulations! You've just created a digital grenade! 💣
sudo file [-h] [-i INTERFACE] [-a ADDRESS] [-m MAC] [-t TRIES] [-b BATCHES] [-c SHELLCODE]
It's like a game of digital hot potato! 🥔
sudo <file> -i wlan0 -a ::1 -m AA:BB:CC:DD:EE:FF -t 10 -b 10
Replace with your target's details. No, your ex's IP address doesn't count! 🙅♂️
Watch as the program sends packets and displays a countdown timer. It's like New Year's Eve, but for hackers! 🎆
- Root Privileges: We need the big guns for this one. Sudo me, baby! 💪
- Promiscuous Mode: Your network card is about to see things it can't unsee. 👀
- Ethical Usage: Don't be that guy at the party. Get permission before you start poking around! 🎭
sudo nmap -6 -sn -T4 --min-rate=1000 [The 'ip -6 addr show' command can be used to obtain]
- Permission Denied: Did you forget the magic word? (It's "sudo") 🧙♂️
- Compilation Errors: Time to update your C game. It's not just for history books! 📚
- Payload File Issues: Make sure
shellcode.txt
exists and isn't just full of your grocery list. 🛒
This project is licensed under the MIT License. See the LICENSE file for more details. It's like a prenup for your code! 💍
Remember, with great power comes great responsibility. And potential jail time if misused. So let's keep it legal and ethical, folks! 🦸♂️🦸♀️
Now go forth and exploit responsibly! May your packets fly true and your exploits be mighty! 🚀🎯
sudo apt-get install mingw-w64
i686-w64-mingw32-gcc main_WindowsVersion.c -o program.exe -lws2_32 -liphlpapi