## https://sploitus.com/exploit?id=A59B5F6D-2953-50CE-BF0B-3004CD04BDED
> Warning: This vulnerability's remote code execution exploit is potentially volatile!
# ๐ Windows TCP/IP Remote Code Execution Vulnerability CVE-2024-38063 Packet Sender
๐ญ Are you ready to unleash chaos in a controlled environment? Look no further! This program is your ticket to sending custom-crafted IPv6 packets and exploiting the [Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063)](https://nvd.nist.gov/vuln/detail/CVE-2024-38063). It's like sending a digital love letter, but instead of poetry, you're sending panic! ๐๐ฅ
**๐จ Important Note:** This tool is for educational purposes only. Using it without permission is like borrowing your neighbor's Wi-Fi without asking - illegal, unethical, and bound to make family barbecues awkward. ๐ฌ
## ๐ Features
- Sends custom IPv6 packets faster than you can say "oops!"
- Reads payload data from `shellcode.txt` (because typing it manually is so 2023)
- Configurable network interface and target address (for when you want to be precise about your chaos)
## ๐ ๏ธ Prerequisites
- **Operating System**: Unix-like systems (Linux). Sorry Windows users, the irony is not lost on us! ๐คทโโ๏ธ (to add Windows programmer code)
- **Privileges**: Root access required. Time to dust off that sudo password!
- **Dependencies**: GCC or another C compiler. Because we're old school cool. 'scapy' python module ๐
## ๐๏ธ Setup
1. **Clone the Repository**:
```bash
git clone <repository_url>
cd <repository_directory>
```
Welcome to the danger zone! ๐ต
2. **Prepare the Payload**:
Create `shellcode.txt` in the same directory. Fill it with raw binary shellcode. It's like stuffing a digital piรฑata! ๐ช
3. **Compile the Program(There is a problem with the C language version, trying to update and modify)**:
```bash
gcc -o ipv6_packet_sender ipv6_packet_sender.c -Wall
```
Congratulations! You've just created a digital grenade! ๐ฃ
## ๐ฎ Usage (Python)
### Command-line Arguments
```bash
sudo file [-h] [-i INTERFACE] [-a ADDRESS] [-m MAC] [-t TRIES] [-b BATCHES] [-c SHELLCODE]
```
It's like a game of digital hot potato! ๐ฅ
### Example
```bash
sudo <file> -i wlan0 -a ::1 -m AA:BB:CC:DD:EE:FF -t 10 -b 10
```
Replace with your target's details. No, your ex's IP address doesn't count! ๐ โโ๏ธ
### Output
Watch as the program sends packets and displays a countdown timer. It's like New Year's Eve, but for hackers! ๐
## โ ๏ธ Important Notes
- **Root Privileges**: We need the big guns for this one. Sudo me, baby! ๐ช
- **Promiscuous Mode**: Your network card is about to see things it can't unsee. ๐
- **Ethical Usage**: Don't be that guy at the party. Get permission before you start poking around! ๐ญ
## Scan local intranet devices
```bash
sudo nmap -6 -sn -T4 --min-rate=1000 [The 'ip -6 addr show' command can be used to obtain]
```
## ๐ง Troubleshooting
- **Permission Denied**: Did you forget the magic word? (It's "sudo") ๐งโโ๏ธ
- **Compilation Errors**: Time to update your C game. It's not just for history books! ๐
- **Payload File Issues**: Make sure `shellcode.txt` exists and isn't just full of your grocery list. ๐
## ๐ License
This project is licensed under the MIT License. See the LICENSE file for more details. It's like a prenup for your code! ๐
## ๐ญ Disclaimer
Remember, with great power comes great responsibility. And potential jail time if misused. So let's keep it legal and ethical, folks! ๐ฆธโโ๏ธ๐ฆธโโ๏ธ
Now go forth and exploit responsibly! May your packets fly true and your exploits be mighty! ๐๐ฏ
# Windows Version(Under development...)
## APT Install
```sudo apt-get install mingw-w64```
## Recommended instructions for cross-compilation
```i686-w64-mingw32-gcc main_WindowsVersion.c -o program.exe -lws2_32 -liphlpapi```