This Metasploit module exploits the MS12-020 RDP vulnerability originally discovered and reported by Luigi Auriemma. The flaw can be found in the way the T.125 ConnectMCSPDU packet is handled in the maxChannelIDs field, which will result an invalid pointer being used, therefore causing a denial-of-service condition.
65f6cf47ec80739aebde264685f63dfdec8a0624d51f0c15702c7607a260ba99
ARM shellcode that binds to port 0x1337 on any local interface, listens for a connection, receives the payload and passes execution to it.
be6d79f5477b1683b472f86413127af192f551f073f3e001e5a1a0cf4b5c55ba
ARM shellcode that will bring up eth0 and assign it the address 192.168.0.2.
58ec29ed3d0ca3eeb8006b294e3bf14dbc87cf8f480f39d5b6e663aceb294975
ARM shellcode that will bind to port 68 on any local address and plug a UDP shell onto port 67 on 192.168.0.1.
ea55946f1d2135c2f64a2b75dd4d650fe47934b1e2ddaf8df4468700d0dc0010
ARM shellcode that binds a shell to port 0x1337 on any local address and waits for a connection.
221ed20bbd37d60e3897a978ea438c38acd1ee8dfc4ca56f72ee0c746f8870da