Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/r3dxpl0it/CVE-2018-4407
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
https://github.com/r3dxpl0it/CVE-2018-4407
attack blueteam cve cyber-security cybersecurity denial-of-service exploit hacking hacking-tool ios macos network penetration-testing poc redteam security
Last synced: about 2 months ago
JSON representation
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
- Host: GitHub
- URL: https://github.com/r3dxpl0it/CVE-2018-4407
- Owner: r3dxpl0it
- License: agpl-3.0
- Created: 2018-11-04T01:47:05.000Z (about 6 years ago)
- Default Branch: master
- Last Pushed: 2018-11-04T02:25:08.000Z (about 6 years ago)
- Last Synced: 2024-01-25T01:08:06.979Z (11 months ago)
- Topics: attack, blueteam, cve, cyber-security, cybersecurity, denial-of-service, exploit, hacking, hacking-tool, ios, macos, network, penetration-testing, poc, redteam, security
- Language: Python
- Homepage:
- Size: 111 KB
- Stars: 30
- Watchers: 6
- Forks: 9
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-scapy - CVE-2018-4407 - A heap buffer overflow in the networking code in the XNU operating system kernel (iOS and macOS). (Exploits)
README
# CVE-2018-4407 Massive IOS/MAC Attack Exploit
CVE-2018-4407 is a Simple and Very Fast BOF attack Against IOS/MAC that can lead to DOS. The vulnerability is a heap buffer overflow in the networking code in the XNU operating system kernel. XNU is used by both iOS and macOS, which is why iPhones, iPads, and Macbooks are all affected.##### Usage
```
apt-get install nmap
git clone https://github.com/r3dxpl0it/CVE-2018-4407.git && cd CVE-2018-4407 && pip install -r requirements.txt
```
##### Options :
```
usage: test.py [-h] [-s IP] [-p PLAYLOAD] targetpositional arguments:
target Target Ip or Network Ip Rangeoptional arguments:
-h, --help show this help message and exit
-s IP, --sourceip IP Source Ip Adress
-p PLAYLOAD, --payload PLAYLOAD
Number of Payload Loop
```
* "PlayLoad" is Not a Miss-Type Nor a Mistake, Just a Joke ;)
##### Screen :
* This ScreenShot Has Been Taken from the "Virtual Lab".
[![CVE-2018-4407](https://github.com/r3dxpl0it/CVE-2018-4407/blob/master/vb_sc.png)]##### Disclaimer :
* Read The Licence