This module exploits a remote vulnerability that could allow an attacker to send a specially crafted SMB message to an affected system causing a denial of service.
This module exploits a vulnerability on smtpsvc.dll ( "Simple Mail Transfer Protocol" service ) via a malformed MX response packet sent by the spoofed DNS Server. This module exploits a vulnerability on smtpsvc.dll ("Simple Mail Transfer Protocol" service) via a malformed MX response packet sent by the spoofed DNS Server. When the SMTP Client ( this module ) sends an email to "[email protected]" ( "XXXXX" is a random number between 0 and 65536 ), the SMTP Server tries to resolve the IP of "dominioXXXXX.com" domain. In that moment, the SMTP Server sends a DNS request to the configurated DNS Server. This module tries to send a response to the SMTP Server before the configurated DNS Server does.
This module exploits a remote vulnerability on the CreateWithSdOrEa SMB command on the srv.sys driver. It could allow an attacker to connect to a shared folder and send a specially crafted SMB message to an affected system causing a denial of service.
This module exploits a vulnerability on "srvnet.sys" sending to the target incomplete packets via SMB v1. Once the bug was triggered, this module keeps the target unavailable until the block time is over.
This module exploits a Windows kernel remote vulnerability on the srv.sys driver via a malformed SMB packet. It could allow an attacker to connect to a shared folder and send a specially crafted SMB message to an affected system causing a denial of service.
This module creates many subfolders into a writeable shared folder in the target. After that it sends an equivalent command like "move \\target_ip\shared_folder\folder1\folder2\..\foldern\*.* \\target_ip\shared_folder" producing an integer underflow in "srv.sys".
This module exploits a remote vulnerability in Microsoft Windows SMB client allowing the attacker to cause a DoS in the remote host.
This module exploits a vulnerability in mrxsmb.sys when it responses to the client with a malformed SMB packet.
This module exploits a remote vulnerability on the FIND_FIRTS2 SMB subcommand on the srv.sys driver. It could allow an attacker to connect to a shared folder and send a specially crafted SMB message to an affected system causing a denial of service.
This module sends a "SMB Browser Election" UDP packet to the "Active Directory" service running in the target. When the Windows kernel processes this crafted packet, the "bowser.sys" kernel module finishes calling to "memcpy" function with the length parameter of 4.294.967.295 bytes. After that, the "memcpy" function corrupts all the kernel heap and finish crashing the target kernel.
Pagination
- Previous page
- Page 11
- Next page