Skip to main content
Fortra Data Classification Core Security Logo
Secondary Navigation
  • Fortra.com
  • Contact Us
  • Support
  • PRICING
    • Column 1
      • Core Solutions
        • Core Impact
        • Penetration Testing Services
    • Column 2
      • Interoperable Solutions
        • Cobalt Strike
        • Outflank Security Tooling (OST)
        • Bundles and Suites
    • View all Solutions
    • Column 1
      • Healthcare
      • Financial Services
      • Federal Government
    • View all Industries
    • Blogs
    • Guides
    • Training
    • Webinars & Events
    • View all Resources
    • Exploits
    • Impacket
    • View all
  • About

Read more about Microsoft Windows Remote Desktop Protocol DoS (MS12-036)
This modules exploits a kernel vulnerability in Microsoft Remote Desktop server by sending a sequence of specially crafted RDP packets to the target system.
Read more about Microsoft Windows Remote Desktop Protocol DoS (MS12-020)
This module triggers a memory corruption vulnerability in the Remote Desktop Service by sending a malformed packet to the 3389/TCP port.
Read more about Microsoft Windows Print Spooler Service Format String Vulnerability DoS (MS12-054)
This module exploits a vulnerability in "spoolsv.exe" answering a crafted packet to the target, upon success it will leave the service unavailable.
Read more about Microsoft Windows NFS NULL Dereference DoS (MS13-014)
This modules exploits a Windows kernel vulnerability in "nfssvr.sys" by sending a NFS file renaming crafted request to the target.
Read more about Microsoft Windows ICMPv6 Router Advertisement Remote DoS (MS10-009)
This module exploits a memory corruption in the Microsoft Windows TCP/IP implementation of ICMPv6 by sending a sequence of TCP/IP packets with a specially crafted Router Advertisement packet. The attack must be issued from the same local net of the target host.
Read more about Microsoft Windows HTTP Services UPnP Integer Underflow DoS (MS09-013)
This module broadcasts a UDP packet in the net redirecting all the Windows machines to the Impact HTTP server. When the target is connected to HTTP server, the HTTP server responses a page with malformed encoded data ( gzip ). This module exploits a remote vulnerability on 'SSDP Discovery Service'.
Read more about Microsoft Windows DNS Server NAPTR Record DoS (MS11-058)
This module exploits a remote DoS vulnerability in Microsoft Windows DNS server by sending a specially crafted request with a malformed NAPTR record.
Read more about Microsoft Windows DNS Resolution Remote DoS (MS11-030)
This module exploits a memory corruption in the DNS Client Service by sending a specially crafted LLMNR broadcast queries to crash the service. The attack must be issued from the same local net of the target host.
Read more about Microsoft Windows Active Directory Remote DoS (MS09-066)
This module exploits an error in the Windows Active Directory implementation by sending a specially crafted LDAP request to crash the lsass.exe process, leading to the reboot of the target machine.
Read more about Microsoft Windows Active Directory Lightweight Directory Service DoS (MS13-079)
This module exploits a vulnerability in "Microsoft Windows Active Directory Lightweight Directory" service by sending UDP requests to the LDAP port (usually 389) and then sending ICMP error messages producing a LDAP Stop Responding behavior.

Pagination

  • Previous page ‹‹
  • Page 80
  • Next page ››
Subscribe to Remote
Fortra logo
  • Email Core Security Email Us
  • X Find us on X
  • LinkedIn Find us on LinkedIn
  • YouTube Find us on YouTube
  • Reddit Find us on Reddit
Footer

AREAS OF EXPERTISE

  • Penetration Testing
  • Offensive Cybersecurity
  • Red Teaming
  • Compliance

IDENTITY SOLUTIONS

  • Access Assurance Suite
  • Core Password & Secure Reset
  • Core Privileged Access Manager (BoKS)

EXPERIENCE CORE

  • Watch our Core Impact Demo
  • Give Core Impact a Try
  • Compare Core Impact Pricing
  • Explore Core Impact Bundles & Suites

TOP RESOURCES

  • Must Read Blog
  • Must Read Guide
  • Must Read Case Study
  • Must Watch Webinar

ABOUT

  • About Us
  • Partners
  • Careers
  • [email protected]

Privacy Policy

Cookie Policy

Terms of Service

Accessibility

Impressum

Copyright © Fortra, LLC and its group of companies. Fortra®, the Fortra® logos, and other identified marks are proprietary trademarks of Fortra, LLC.