KernelKraze / CVE-2024-38063_PoC

This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.

Repository from Github https://github.comKernelKraze/CVE-2024-38063_PoCRepository from Github https://github.comKernelKraze/CVE-2024-38063_PoC

Warning: This vulnerability's remote code execution exploit is potentially volatile!

๐Ÿš€ Windows TCP/IP Remote Code Execution Vulnerability CVE-2024-38063 Packet Sender

๐ŸŽญ Are you ready to unleash chaos in a controlled environment? Look no further! This program is your ticket to sending custom-crafted IPv6 packets and exploiting the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It's like sending a digital love letter, but instead of poetry, you're sending panic! ๐Ÿ’Œ๐Ÿ’ฅ

๐Ÿšจ Important Note: This tool is for educational purposes only. Using it without permission is like borrowing your neighbor's Wi-Fi without asking - illegal, unethical, and bound to make family barbecues awkward. ๐Ÿ˜ฌ

๐ŸŽ‰ Features

  • Sends custom IPv6 packets faster than you can say "oops!"
  • Reads payload data from shellcode.txt (because typing it manually is so 2023)
  • Configurable network interface and target address (for when you want to be precise about your chaos)

๐Ÿ› ๏ธ Prerequisites

  • Operating System: Unix-like systems (Linux). Sorry Windows users, the irony is not lost on us! ๐Ÿคทโ€โ™‚๏ธ (to add Windows programmer code)
  • Privileges: Root access required. Time to dust off that sudo password!
  • Dependencies: GCC or another C compiler. Because we're old school cool. 'scapy' python module ๐Ÿ˜Ž

๐Ÿ—๏ธ Setup

  1. Clone the Repository:

    git clone <repository_url>
    cd <repository_directory>

    Welcome to the danger zone! ๐ŸŽต

  2. Prepare the Payload: Create shellcode.txt in the same directory. Fill it with raw binary shellcode. It's like stuffing a digital piรฑata! ๐Ÿช…

  3. Compile the Program(There is a problem with the C language version, trying to update and modify):

    gcc -o ipv6_packet_sender ipv6_packet_sender.c -Wall

    Congratulations! You've just created a digital grenade! ๐Ÿ’ฃ

๐ŸŽฎ Usage (Python)

Command-line Arguments

sudo file [-h] [-i INTERFACE] [-a ADDRESS] [-m MAC] [-t TRIES] [-b BATCHES] [-c SHELLCODE]

It's like a game of digital hot potato! ๐Ÿฅ”

Example

sudo <file> -i wlan0 -a ::1 -m AA:BB:CC:DD:EE:FF -t 10 -b 10 

Replace with your target's details. No, your ex's IP address doesn't count! ๐Ÿ™…โ€โ™‚๏ธ

Output

Watch as the program sends packets and displays a countdown timer. It's like New Year's Eve, but for hackers! ๐ŸŽ†

โš ๏ธ Important Notes

  • Root Privileges: We need the big guns for this one. Sudo me, baby! ๐Ÿ’ช
  • Promiscuous Mode: Your network card is about to see things it can't unsee. ๐Ÿ‘€
  • Ethical Usage: Don't be that guy at the party. Get permission before you start poking around! ๐ŸŽญ

Scan local intranet devices

sudo nmap -6 -sn -T4 --min-rate=1000 [The 'ip -6 addr show' command can be used to obtain]

๐Ÿ”ง Troubleshooting

  • Permission Denied: Did you forget the magic word? (It's "sudo") ๐Ÿง™โ€โ™‚๏ธ
  • Compilation Errors: Time to update your C game. It's not just for history books! ๐Ÿ“š
  • Payload File Issues: Make sure shellcode.txt exists and isn't just full of your grocery list. ๐Ÿ›’

๐Ÿ“œ License

This project is licensed under the MIT License. See the LICENSE file for more details. It's like a prenup for your code! ๐Ÿ’

๐ŸŽญ Disclaimer

Remember, with great power comes great responsibility. And potential jail time if misused. So let's keep it legal and ethical, folks! ๐Ÿฆธโ€โ™‚๏ธ๐Ÿฆธโ€โ™€๏ธ

Now go forth and exploit responsibly! May your packets fly true and your exploits be mighty! ๐Ÿš€๐ŸŽฏ

Windows Version(Under development...)

APT Install

sudo apt-get install mingw-w64

Recommended instructions for cross-compilation

i686-w64-mingw32-gcc main_WindowsVersion.c -o program.exe -lws2_32 -liphlpapi

About

This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.

License:MIT License


Languages

Language:C 59.2%Language:Python 40.8%